Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Networks Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3
CCEVS-VR-10452-2012
IBM Tivoli Netcool OMNIbus v7.1 with Tivoli Netcool Webtop v2.0
CCEVS-VR-VID-10055-2008
name Networks Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3 IBM Tivoli Netcool OMNIbus v7.1 with Tivoli Netcool Webtop v2.0
category Boundary Protection Devices and Systems Network and Network-Related Devices and Systems
not_valid_after 01.11.2014 20.07.2012
not_valid_before 28.06.2012 31.07.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10452-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10055-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10452-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10055-st.pdf
manufacturer Juniper Networks, Inc. IBM Corporation
manufacturer_web https://www.juniper.net/ https://www.ibm.com
security_level EAL2+, ALC_FLR.2 EAL2
dgst 2874fcfdedc57721 217a610530fdc3fa
heuristics/cert_id CCEVS-VR-10452-2012 CCEVS-VR-VID-10055-2008
heuristics/cpe_matches cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r25:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r18:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:b:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r11:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r13:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r20:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r23b:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r12:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r25:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r27:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r14:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r19:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r4:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r2:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r22:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r23:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r26:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r24:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r5:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:-:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r1:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r21:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r9:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r14:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r22:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r17:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r16:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r24b:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r8:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r7:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r3:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r6:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r8:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r3:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r2:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r17:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r5:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r11:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r7:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r13:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r12:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:b:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r26:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r15:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r10:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r19:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r1:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r27:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r16:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r10:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:-:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r4:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r9:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r6:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r21:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r18:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r15:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2014-2842, CVE-2015-7755, CVE-2017-2337, CVE-2018-0059, CVE-2015-7750, CVE-2013-7313, CVE-2017-2338, CVE-2017-2339, CVE-2015-7754, CVE-2017-2336, CVE-2016-1268, CVE-2018-0014, CVE-2015-7756, CVE-2017-2335 {}
heuristics/extracted_sars AVA_VAN.2, ADV_ARC.1, ATE_COV.1, ATE_IND.2, AGD_PRE.1, ADV_FSP.2, ALC_FLR.2, ALC_CMS.4, ALC_CMC.2, ALC_DEL.1, ADV_TDS.1, AGD_OPE.1, ATE_FUN.1 AVA_VLA.1, AVA_SOF.1, ATE_COV.1, ATE_IND.2, ADV_FSP.1, ADV_RCR.1, ADV_HLD.1, AGD_ADM.1, AGD_USR.1, ATE_FUN.1
heuristics/extracted_versions 6.3 2.0, 7.1
pdf_data/report_filename st_vid10452-vr.pdf st_vid10055-vr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-10452-2012
    • cert_item: Juniper Networks Security Appliances
    • cert_lab: US NIAP
  • US:
    • cert_id: CCEVS-VR-VID10055-2008
    • cert_item: IBM Tivoli Netcool OMNIbus v7.1 with IBM Tivoli Netcool WebTop v2.0
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10452-2012: 1
  • US:
    • CCEVS-VR-VID10055-2008: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 2
    • EAL4: 2
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 4: 1
    • EAL2: 4
    • EAL3: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 4
  • ATE:
    • ATE_COV: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
  • ACM:
    • ACM_CAP.2: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.1: 1
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_SOF.1: 1
    • AVA_VLA.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.DIRECT: 1
    • A.GENPUR: 1
    • A.LOWEXP: 1
    • A.NOEVIL: 1
    • A.NOREMO: 1
    • A.PHYSEC: 1
    • A.PUBLIC: 1
    • A.REMACC: 1
    • A.SINGEN: 1
  • T:
    • T.ASPOOF: 1
    • T.AUDACC: 1
    • T.AUDFUL: 1
    • T.MEDIAT: 1
    • T.NOAUTH: 1
    • T.OLDINF: 1
    • T.PROCOM: 1
    • T.REPEAT: 1
    • T.REPLAY: 1
    • T.SELPRO: 1
  • A:
    • A.INSTALL: 1
    • A.LOWEXP: 1
    • A.OSLOGIN: 1
    • A.PHYSEC: 1
    • A.PROBE: 1
    • A.SEL_PRO: 1
    • A.SOLARIS: 1
    • A.TRUSTED: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 17
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 8
  • VPN:
    • VPN: 8
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 3
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 1
pdf_data/report_metadata
  • /Author: Mallett, Patrick W.
  • /CreationDate: D:20121005092651
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20121005092651
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 329777
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: dmhale1
  • /CreationDate: D:20081020142813-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20081020142813-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - VID10055-VR-final.doc
  • pdf_file_size_bytes: 379398
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename st_vid10452-st.pdf st_vid10055-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL4: 1
  • EAL:
    • EAL 2: 1
    • EAL2: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.2: 11
    • ADV_TDS: 1
    • ADV_TDS.1: 11
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 8
    • ALC_CMS: 1
    • ALC_CMS.2: 5
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 15
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 4
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 7
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 2
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 8
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 1
    • FAU_SAR.3.1: 1
    • FAU_STG: 8
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 18
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 3
    • FDP_IFC.1: 15
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 14
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 2
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP: 3
    • FDP_RIP.1: 1
    • FDP_RIP.2: 2
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 4
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 1
    • FIA_ATD: 4
    • FIA_ATD.1: 3
    • FIA_ATD.1.1: 2
    • FIA_UAU: 8
    • FIA_UAU.1: 2
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 3
    • FIA_UAU.4.1: 1
    • FIA_UID: 4
    • FIA_UID.2: 3
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 4
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 1
    • FMT_MSA: 4
    • FMT_MSA.3: 3
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 4
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 1
    • FMT_SMR: 4
    • FMT_SMR.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 1
    • FPT_STM: 4
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_GEN_EXP.1: 9
    • FAU_GEN_EXP.1.2: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 19
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.4: 2
    • FCS_COP.1: 17
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 11
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 11
    • FDP_IFF.1: 13
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
  • FIA:
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 8
    • FIA_SOS.1: 13
    • FIA_SOS.1.1: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 12
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MSA.1: 21
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 1
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 7
    • FMT_SMR.1: 8
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 7
    • FPT_ITT.1.1: 1
    • FPT_RVM.1: 2
    • FPT_RVM_EXP.1: 8
    • FPT_SEP.1: 2
    • FPT_SEP_EXP.1: 6
    • FPT_SEP_EXP.1.2: 1
    • FPT_STM.1: 6
    • FPT_TRC.1: 7
    • FPT_TRC.1.2: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.DIRECT: 2
    • A.GENPUR: 2
    • A.LOWEXP: 2
    • A.NOEVIL: 2
    • A.NOREMO: 2
    • A.PHYSEC: 2
    • A.PUBLIC: 2
    • A.REMACC: 2
    • A.SINGEN: 2
  • O:
    • O.ACCOUN: 1
    • O.ADMTRA: 1
    • O.AUDREC: 1
    • O.ENCRYP: 1
    • O.GUIDAN: 1
    • O.IDAUTH: 1
    • O.INTEGRITY: 4
    • O.LIMEXT: 1
    • O.MEDIAT: 1
    • O.SECFUN: 1
    • O.SECSTA: 1
    • O.SELPRO: 1
    • O.SINUSE: 1
  • T:
    • T.ASPOOF: 1
    • T.AUDACC: 1
    • T.AUDFUL: 1
    • T.MEDIAT: 1
    • T.NOAUTH: 1
    • T.OLDINF: 1
    • T.PROCOM: 1
    • T.REPEAT: 1
    • T.REPLAY: 1
    • T.SELPRO: 1
  • A:
    • A.INSTALL: 4
    • A.LOWEXP: 2
    • A.OSLOGIN: 2
    • A.PHYSEC: 2
    • A.PROBE: 2
    • A.SEL_PRO: 4
    • A.SOLARIS: 2
    • A.TRUSTED: 3
  • O:
    • O.AUDITING: 4
    • O.AUDITPROTECT: 4
    • O.AUTHORIZATION: 4
    • O.DISCRETIONARY_ACCESS: 4
    • O.MANAGE: 4
    • O.REPLICATION: 4
    • O.SECURECOMMS: 4
    • O.SEL_PRO: 6
  • OE:
    • OE.CREDEN: 3
    • OE.INSTALL: 5
    • OE.LOWEXP: 3
    • OE.OSLOGIN: 6
    • OE.PAM: 5
    • OE.PHYSICAL: 3
    • OE.PROBE: 3
    • OE.SEL_PRO: 7
  • T:
    • T.AUD: 3
    • T.COMPDATA: 3
    • T.DATABASEFAIL: 4
    • T.DATABSEFAIL: 1
    • T.INSECURE: 4
    • T.LOWEXP: 5
    • T.NETSEC: 9
    • T.SEL_PRO: 2
    • T.UNAUTH: 5
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 12
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 2
  • DES:
    • 3DES:
      • 3-DES: 2
    • DES:
      • DES: 7
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 3
      • SHA256: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 3
  • SSH:
    • SSH: 25
  • VPN:
    • VPN: 76
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • secp256r1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • FI:
    • physical tampering: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 5
    • FIPS 180-2: 1
    • FIPS 186-3: 1
    • FIPS 197: 2
    • FIPS PUB 140-2: 6
  • NIST:
    • SP 800-67: 2
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 2
  • FIPS:
    • FIPS PUB 46-2: 2
  • PKCS:
    • PKCS #1: 2
    • PKCS #3: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • these dependencies are addressed by the correct implementation of the standard protocols, which is out of scope of the evaluation of this TOE. Ultimately the validity of the key management for these protocols is: 1
    • to a platform needing to communicate. The destruction of the TOE public/private key pair is also out of scope of the evaluation as once the keys are created they are data files controlled by operating systems: 1
pdf_data/st_metadata
  • /Author: Neal
  • /CreationDate: D:20121005092759
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20121005092759
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: Security Appliances Security Target
  • pdf_file_size_bytes: 867098
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
  • /Author:
  • /CreationDate: D:20081017125000+0500
  • /CreationDate--Text: D:20081017125000+0500
  • /Creator: Windows NT 4.0
  • /ModDate: D:20081020144551-04'00'
  • /Producer: 5D PDF Creator
  • /Title: Microsoft Word - IBM_Netcool-OMNIbus-v7.1_with_Webtop-v2.0_EAL2_ASE_ST_v2.9_Sanitized IBM.doc
  • pdf_file_size_bytes: 838811
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 52
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different