Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IBM Tivoli Netcool OMNIbus v7.1 with Tivoli Netcool Webtop v2.0
CCEVS-VR-VID-10055-2008
Cisco Firewall Services Module (FWSM) Version 3.1.(3.17) for: Cisco Catalyst 6500 Switches and Cisco 7600 Series routers
CCEVS-VR-0027-2007
name IBM Tivoli Netcool OMNIbus v7.1 with Tivoli Netcool Webtop v2.0 Cisco Firewall Services Module (FWSM) Version 3.1.(3.17) for: Cisco Catalyst 6500 Switches and Cisco 7600 Series routers
category Network and Network-Related Devices and Systems Boundary Protection Devices and Systems
not_valid_after 20.07.2012 06.09.2012
not_valid_before 31.07.2008 05.03.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10055-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6015-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10055-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6015-st.pdf
manufacturer IBM Corporation Cisco Systems, Inc.
manufacturer_web https://www.ibm.com https://www.cisco.com
security_level EAL2 EAL4+
dgst 217a610530fdc3fa 56eb8e6d2bd44eed
heuristics/cert_id CCEVS-VR-VID-10055-2008 CCEVS-VR-0027-2007
heuristics/cpe_matches {} cpe:2.3:h:cisco:firewall_services_module:3.1\(5\):*:*:*:*:*:*:*, cpe:2.3:h:cisco:firewall_services_module:3.1:*:*:*:*:*:*:*, cpe:2.3:h:cisco:firewall_services_module:3.1\(6\):*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2013-1195, CVE-2007-5571, CVE-2004-0112, CVE-2007-5570, CVE-2003-1001, CVE-2007-0963, CVE-2007-0962, CVE-2004-0079, CVE-2007-0968, CVE-2007-0964, CVE-2005-3669, CVE-2007-0966, CVE-2007-0965, CVE-2003-1002, CVE-2004-0081, CVE-2007-5568, CVE-2007-0967
heuristics/extracted_sars AGD_USR.1, AVA_VLA.1, ADV_HLD.1, ADV_RCR.1, ATE_COV.1, ATE_IND.2, AGD_ADM.1, ADV_FSP.1, AVA_SOF.1, ATE_FUN.1 ADV_IMP.1, ADV_HLD.2, ATE_IND.2, ATE_DPT.1, ATE_COV.2, ALC_LCD.1, ALC_DVS.1, ADV_FSP.2, ADV_SPM.1, ADV_LLD.1, ADV_RCR.1, AVA_MSU.2, AGD_ADM.1, ALC_FLR.1, ATE_FUN.1, AGD_USR.1, ALC_TAT.1, AVA_VLA.3, AVA_SOF.1
heuristics/extracted_versions 7.1, 2.0 3.1, 3.17
maintenance_updates
pdf_data/report_filename st_vid10055-vr.pdf st_vid6015-vr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10055-2008
    • cert_item: IBM Tivoli Netcool OMNIbus v7.1 with IBM Tivoli Netcool WebTop v2.0
    • cert_lab: US NIAP
  • US:
    • cert_id: CCEVS-VR-07-0027
    • cert_item: Cisco Firewall Services Module (FWSM) Version 3.1 (3.17) for Cisco Catalyst® 6500 switches and Cisco 7600 Series routers
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10055-2008: 1
  • US:
    • CCEVS-VR-07-0027: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 4: 1
    • EAL2: 4
    • EAL3: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 3
    • EAL4: 3
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.1: 1
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_SOF.1: 1
    • AVA_VLA.1: 1
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_FLR.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_STG.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.INSTALL: 1
    • A.LOWEXP: 1
    • A.OSLOGIN: 1
    • A.PHYSEC: 1
    • A.PROBE: 1
    • A.SEL_PRO: 1
    • A.SOLARIS: 1
    • A.TRUSTED: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 17
  • Cisco:
    • Cisco: 55
    • Cisco Systems: 2
    • Cisco Systems, Inc: 1
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 1
pdf_data/report_metadata
  • /Author: dmhale1
  • /CreationDate: D:20081020142813-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20081020142813-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - VID10055-VR-final.doc
  • pdf_file_size_bytes: 379398
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /Author:
  • /CreationDate: D:20070726114739-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20070726115034-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20070726154644
  • /Subject: CCEVS Validation Report - Cisco TPIX Security Appliances 515, 515E, 525, 535 and Adaptive Security Appliances 5510, 5520 and 5540, Version 7.0
  • /Title: VID6016-VR-0001 DRAFT
  • pdf_file_size_bytes: 388339
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename st_vid10055-st.pdf st_vid6015-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 5
  • EAL:
    • EAL4: 11
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ACM:
    • ACM_AUT.1: 12
    • ACM_CAP.3: 3
    • ACM_CAP.4: 21
    • ACM_SCP.1: 1
    • ACM_SCP.2: 7
  • ADO:
    • ADO_DEL.1: 1
    • ADO_DEL.2: 10
    • ADO_IGS.1: 9
  • ADV:
    • ADV_FSP.1: 10
    • ADV_FSP.2: 12
    • ADV_HLD.1: 2
    • ADV_HLD.2: 16
    • ADV_IMP.1: 9
    • ADV_LLD.1: 18
    • ADV_RCR: 2
    • ADV_RCR.1: 10
    • ADV_SPM.1: 11
  • AGD:
    • AGD_ADM.1: 17
    • AGD_USR.1: 14
  • ALC:
    • ALC_DVS.1: 10
    • ALC_FLR.1: 17
    • ALC_LCD.1: 9
    • ALC_TAT: 1
    • ALC_TAT.1: 9
  • ATE:
    • ATE_COV.1: 1
    • ATE_COV.2: 7
    • ATE_DPT.1: 6
    • ATE_FUN.1: 15
    • ATE_IND.2: 9
  • AVA:
    • AVA_MSU.2: 15
    • AVA_SOF.1: 8
    • AVA_VLA.2: 15
    • AVA_VLA.3: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN_EXP.1: 9
    • FAU_GEN_EXP.1.2: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 19
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.4: 2
    • FCS_COP.1: 17
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 11
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 11
    • FDP_IFF.1: 13
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
  • FIA:
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 8
    • FIA_SOS.1: 13
    • FIA_SOS.1.1: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 12
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MSA.1: 21
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 1
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 7
    • FMT_SMR.1: 8
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 7
    • FPT_ITT.1.1: 1
    • FPT_RVM.1: 2
    • FPT_RVM_EXP.1: 8
    • FPT_SEP.1: 2
    • FPT_SEP_EXP.1: 6
    • FPT_SEP_EXP.1.2: 1
    • FPT_STM.1: 6
    • FPT_TRC.1: 7
    • FPT_TRC.1.2: 1
  • FAU:
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 4
    • FDP_IFC.1: 22
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 29
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 4
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 2
    • FDP_ITC.1: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 5
    • FIA_UAU.1: 3
    • FIA_UAU.2: 1
    • FIA_UAU.5: 18
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 3
    • FIA_UID.1: 1
    • FIA_UID.2: 10
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MOF.1: 15
    • FMT_MOF.1.1: 2
    • FMT_MSA: 1
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 4
    • FMT_MSA.2: 2
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 2
    • FMT_MTD.2: 7
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SEP.1.2: 1
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 7
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 6
    • FPT_SEP.1.1: 1
    • FPT_STM.1: 8
    • FPT_STM.1.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.INSTALL: 4
    • A.LOWEXP: 2
    • A.OSLOGIN: 2
    • A.PHYSEC: 2
    • A.PROBE: 2
    • A.SEL_PRO: 4
    • A.SOLARIS: 2
    • A.TRUSTED: 3
  • O:
    • O.AUDITING: 4
    • O.AUDITPROTECT: 4
    • O.AUTHORIZATION: 4
    • O.DISCRETIONARY_ACCESS: 4
    • O.MANAGE: 4
    • O.REPLICATION: 4
    • O.SECURECOMMS: 4
    • O.SEL_PRO: 6
  • OE:
    • OE.CREDEN: 3
    • OE.INSTALL: 5
    • OE.LOWEXP: 3
    • OE.OSLOGIN: 6
    • OE.PAM: 5
    • OE.PHYSICAL: 3
    • OE.PROBE: 3
    • OE.SEL_PRO: 7
  • T:
    • T.AUD: 3
    • T.COMPDATA: 3
    • T.DATABASEFAIL: 4
    • T.DATABSEFAIL: 1
    • T.INSECURE: 4
    • T.LOWEXP: 5
    • T.NETSEC: 9
    • T.SEL_PRO: 2
    • T.UNAUTH: 5
  • A:
    • A.DIRECT: 1
    • A.GENPUR: 1
    • A.MODEXP: 1
    • A.NOEVIL: 1
    • A.NOREMO: 1
    • A.PHYSEC: 1
    • A.PUBLIC: 1
    • A.REMACC: 1
    • A.SINGEN: 1
  • O:
    • O.ACCOUN: 5
    • O.AUDREC: 7
    • O.EAL: 6
    • O.ENCRYP: 4
    • O.IDAUTH: 8
    • O.LIMEXT: 5
    • O.MEDIAT: 14
    • O.SECFUN: 17
    • O.SECSTA: 13
    • O.SELPRO: 8
    • O.SINUSE: 4
  • OE:
    • OE.ADMTRA: 3
    • OE.DIRECT: 2
    • OE.GENPUR: 2
    • OE.GUIDAN: 3
    • OE.IDAUTH: 8
    • OE.MODEXP: 2
    • OE.NOEVIL: 2
    • OE.NOREMO: 2
    • OE.PHYSEC: 3
    • OE.PUBLIC: 3
    • OE.REMACC: 2
    • OE.SINGEN: 2
    • OE.SINUSE: 6
  • T:
    • T.ASPOOF: 2
    • T.AUDACC: 6
    • T.AUDFUL: 3
    • T.MEDIAT: 2
    • T.MODEXP: 2
    • T.NOAUTH: 9
    • T.OLDINF: 2
    • T.PROCOM: 2
    • T.REPEAT: 3
    • T.REPLAY: 5
    • T.SELPRO: 3
    • T.TUSAGE: 3
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 12
  • Cisco:
    • Cisco: 212
    • Cisco Systems: 6
    • Cisco Systems, Inc: 6
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3-DES: 2
    • DES:
      • DES: 7
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • TDEA: 1
      • Triple-DES: 1
    • DES:
      • DES: 4
  • miscellaneous:
    • Skinny:
      • Skinny: 6
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
  • SSH:
    • SSH: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 46-2: 2
  • PKCS:
    • PKCS #1: 2
    • PKCS #3: 2
  • FIPS:
    • FIPS 140-1: 1
    • FIPS 197: 3
    • FIPS 46-3: 3
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 3
  • RFC:
    • RFC 4251: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • these dependencies are addressed by the correct implementation of the standard protocols, which is out of scope of the evaluation of this TOE. Ultimately the validity of the key management for these protocols is: 1
    • to a platform needing to communicate. The destruction of the TOE public/private key pair is also out of scope of the evaluation as once the keys are created they are data files controlled by operating systems: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20081017125000+0500
  • /CreationDate--Text: D:20081017125000+0500
  • /Creator: Windows NT 4.0
  • /ModDate: D:20081020144551-04'00'
  • /Producer: 5D PDF Creator
  • /Title: Microsoft Word - IBM_Netcool-OMNIbus-v7.1_with_Webtop-v2.0_EAL2_ASE_ST_v2.9_Sanitized IBM.doc
  • pdf_file_size_bytes: 838811
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 52
  • /Author: sheema
  • /CreationDate: D:19920624090927Z
  • /Creator: FrameMaker 7.2
  • /ModDate: D:20070725080816-04'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: fwsmstd.fm
  • pdf_file_size_bytes: 1434560
  • pdf_hyperlinks: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different