name |
Scrambler Board GP-1010 V2.0 for the e-STUDIO 550/650/810 |
Cisco UCS 5100 Series Blade Server Chassis, B-Series Blade Servers, C-Series Rack-Mount Servers, 2100 and 2200 Series Fabric Extenders, and 6100 Series Fabric Interconnects with UCSM 1.4(1m) |
category |
Multi-Function Devices |
Network and Network-Related Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
22.04.2015 |
not_valid_before |
16.03.2004 |
30.12.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0005.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10403-vr.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10403-st.pdf |
manufacturer |
Toshiba TEC Corporation |
Cisco Systems, Inc. |
manufacturer_web |
https://www.toshibatec.co.jp/en/ |
https://www.cisco.com |
security_level |
EAL2 |
EAL4+, ALC_FLR.2 |
dgst |
1ca981c1dbed4283 |
442b9af734a0ecb2 |
heuristics/cert_id |
JISEC-CC-CRP-C0005 |
CCEVS-VR-VID-10403-2011 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
cpe:2.3:h:cisco:ucs_6100:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ALC_CMS.4, ATE_DPT.2, AVA_VAN.3, ATE_FUN.1, ALC_DEL.1, ATE_IND.2, ADV_FSP.4, ALC_LCD.1, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1 |
heuristics/extracted_versions |
2.0 |
1.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0195
- certification_date:
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the system software of the digital multi function device “e-STUDIO2330C/2820C/2830C/3520C/3530C/4520C” manufactured by TOSHIBA TEC CORPORATION. The TOE controls general functions as a digital multi function device (Copy, Scan, Print and Fax), and provides functions of e-Filing Box and Shared folder. TOE Security functions The TOE provides function of data overwrite and complete deletion on the user document data deleted from HDD in the “e-STUDIO2330C/2820C/2830C/3520C/3530C/4520C” (except following data: fax reception; expired user document data stored in e-Filing Box and Shared folder after such data’s effective period). The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Japanese: e-STUDIO 2330C/2820C/2830C/ 3520C/3530C/4520C System Software English: System Software for e-STUDIO 2330C/2820C/2830C/ 3520C/3530C/4520C
- product_type: data protection function in Multi Function Device
- toe_version: V3.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date: 01.03.2013
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: e-STUDIO2330C/2820C/2830C/ 3520C/3530C/4520C System Software V3.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0195_it8200.html
- toe_overseas_name: System Software for e-STUDIO2330C/ 2820C/2830C/3520C/3530C/4520C V3.0
|
- category: Network Management
- certification_date: 30.12.2011
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 18.04.2015
- id: CCEVS-VR-VID10403
- product: Cisco UCS 5100 Series Blade Server Chassis, B-Series Blade Servers, C-Series Rack-Mount Servers, 2100 and 2200 Series Fabric Extenders, and 6100 and 6200 Series Fabric Interconnects with UCSM 2.0(4b)
- scheme: US
- url: https://www.niap-ccevs.org/product/10403
- vendor: Cisco Systems, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
- maintenance_date: 18.04.2013
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10403-add1.pdf
- maintenance_st_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10403-st.pdf
- maintenance_title: Cisco UCS 5100 Series Blade Server Chassis, B-Series Blade Servers, C-Series Rack-Mount Servers, 2100 and 2200 Series Fabric Extenders, and 6100 and 6200 Series Fabric Interconnects with UCSM 2.0(4b) with TOE hardware: Cisco UCS 5108 Blade Server Chassis, Cisco UCS B200 M1/M2/M3, B230 M1/M2, B250 M1/M2, B420 M3, B440 M1/M2, and M22 M3 Blade Servers, Cisco UCS C200 M1/M2/M2SFF, C210 M1/M2, C220 M3, C240 M3, C250 M1/M2, C260 M2, C460 M2, C22 M3, and C24 M3 Rack-Mount Servers, Cisco UCS 6120XP, 6140XP, 6248UP, and 6296UP Fabric Interconnects, Cisco UCS 2104XP, 2204XP, 2208XP and 2232PP Fabric Extenders
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0005.pdf |
st_vid10403-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10403-2011
- cert_item: Cisco Unified Computing System (UCS
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0005: 1
|
- US:
- CCEVS-VR-VID10403-2011: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 11
- EAL 4 augmented: 2
- EAL4: 4
- EAL4 augmented: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Broadcom:
- Cisco:
- Cisco: 134
- Cisco Systems, Inc: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154004+09'00'
- /ModDate: D:20040526154004+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13611
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Evaluation Team
- /CreationDate: D:20120113071326
- /Creator: Microsoft® Office Word 2007
- /Keywords: VR
- /ModDate: D:20120113071326
- /Producer: Microsoft® Office Word 2007
- /Subject: Validator Report
- /Title: Validation Report for IronPort Messaging Gateway
- pdf_file_size_bytes: 412791
- pdf_hyperlinks: http://www.cisco.com/en/US/prod/ps10265/ps10280/cna_models_comparison.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
pdf_data/st_filename |
|
st_vid10403-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.4: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 10
- FAU_SAR.3: 6
- FAU_STG.1: 7
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.4: 7
- FCS_CKM.4.1: 1
- FCS_COP.1: 26
- FCS_COP.1.1: 5
- FDP:
- FDP_ACC.1: 6
- FDP_ACC.2: 16
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 20
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 22
- FDP_IFC.1.1: 2
- FDP_IFF.1: 18
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_ITC.1: 2
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 4
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 2
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 29
- FMT_MSA.1.1: 18
- FMT_MSA.3: 26
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 18
- FMT_MTD.1: 10
- FMT_MTD.1.1: 10
- FMT_SAE.1: 6
- FMT_SAE.1.1: 3
- FMT_SAE.1.2: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 29
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.2: 6
- FPT_ITT.2.1: 1
- FPT_ITT.2.2: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 3
- FTP:
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMIN: 3
- A.AUTHENTICATION_SERVER: 2
- A.BOUNDARY: 3
- A.PHYSICAL: 3
- A.POWER: 3
- A.REDUNDANT_NET: 3
- A.VSAN: 3
- O:
- O.ACCOUN: 5
- O.ADMIN: 4
- O.AUDREC: 8
- O.ENCRYP: 9
- O.IDAUTH: 10
- O.SECFUN: 23
- O.VLANSEC: 4
- O.VSANSEC: 6
- OE:
- OE.ADMIN: 3
- OE.AUTHENTICATION_: 1
- OE.AUTHENTICATION_SERVER: 2
- OE.BOUNDARY: 3
- OE.PHYSICAL: 2
- OE.POWER: 3
- OE.REDUNDANT_NET: 2
- OE.VSAN: 2
- T:
- T.ACCOUNTABILITY: 4
- T.ATTACK_ANOTHER: 4
- T.CONFIGURE_NO: 2
- T.NOAUTH: 5
- T.NORMAL_USE: 2
- T.NORMAL_USER: 2
- T.ROLE_ADMIN: 2
- T.SNIFF: 4
|
pdf_data/st_keywords/vendor |
|
- Broadcom:
- Cisco:
- Cisco: 206
- Cisco Systems: 3
- Cisco Systems, Inc: 64
- Microsoft:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-003: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-2: 2
- FIPS PUB 197: 1
- RFC:
- RFC 2246: 1
- RFC 2631: 1
- RFC 3268: 1
- RFC 3826: 1
- RFC 4251: 1
- RFC 4252: 1
- RFC2401: 1
- RFC3414: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Cisco Systems, Inc.
- /CreationDate: D:20130418125245
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130418125245
- /Producer: Microsoft® Office Word 2007
- /Title: Cisco UCS Security Target
- pdf_file_size_bytes: 1177547
- pdf_hyperlinks: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |