Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Networks Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3
CCEVS-VR-10452-2012
RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series
None
name Networks Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3 RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series
scheme US TR
not_valid_after 01.11.2014 27.03.2017
not_valid_before 28.06.2012 15.03.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10452-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20CERTIFICATION%20REPORT.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10452-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20ST-%20v0.9.pdf
manufacturer Juniper Networks, Inc. RIOREY Incorporated
manufacturer_web https://www.juniper.net/ https://www.riorey.com/
security_level EAL2+, ALC_FLR.2 ALC_FLR.1, EAL4+
dgst 2874fcfdedc57721 53265b9d283d6074
heuristics/cert_id CCEVS-VR-10452-2012
heuristics/cert_lab US []
heuristics/cpe_matches cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r2:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r17:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r5:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r18:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r9:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r9:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r27:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r4:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r11:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:-:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r3:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r12:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r19:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r23b:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r14:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r25:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r26:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r1:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r20:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r26:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r25:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r10:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r6:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r8:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r2:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r11:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r14:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r1:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r15:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:-:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r7:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r24b:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r3:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r17:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r23:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:b:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r19:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r21:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r15:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r16:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r10:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r13:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r18:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r7:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r5:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r13:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r6:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r16:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:b:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r27:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r22:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r8:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r22:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r21:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r4:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r24:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r12:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2017-2339, CVE-2018-0059, CVE-2015-7756, CVE-2015-7750, CVE-2017-2338, CVE-2015-7755, CVE-2015-7754, CVE-2017-2335, CVE-2014-2842, CVE-2017-2336, CVE-2016-1268, CVE-2017-2337, CVE-2018-0014, CVE-2013-7313 {}
heuristics/extracted_sars ATE_FUN.1, ALC_FLR.2, ALC_CMS.4, ALC_DEL.1, AGD_PRE.1, ADV_ARC.1, ATE_IND.2, ALC_CMC.2, ATE_COV.1, ADV_TDS.1, AGD_OPE.1, ADV_FSP.2, AVA_VAN.2 ADV_ARC.1, AGD_OPE.1, ATE_COV.2, AGD_PRE.1, ALC_DEL.1, ADV_TDS.3, AVA_VAN.3, ASE_SPD.1, ALC_LCD.1, ASE_OBJ.2, ASE_REQ.2, ATE_FUN.1, ASE_TSS.1, ALC_CMS.4, ALC_DVS.1, ATE_IND.2, ALC_CMC.4, ASE_CCL.1, ALC_FLR.1, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ASE_INT.1, ALC_TAT.1, ADV_FSP.4
heuristics/extracted_versions 6.3 -
pdf_data/report_filename st_vid10452-vr.pdf RioRey CERTIFICATION REPORT.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-10452-2012
    • cert_item: Juniper Networks Security Appliances
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10452-2012: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 2
    • EAL4: 2
  • EAL:
    • EAL 4: 2
    • EAL 4+: 5
    • EAL4: 1
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 4
  • ATE:
    • ATE_COV: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
pdf_data/report_keywords/cc_sfr
  • FRU:
    • FRU_DDOS_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.DIRECT: 1
    • A.GENPUR: 1
    • A.LOWEXP: 1
    • A.NOEVIL: 1
    • A.NOREMO: 1
    • A.PHYSEC: 1
    • A.PUBLIC: 1
    • A.REMACC: 1
    • A.SINGEN: 1
  • T:
    • T.ASPOOF: 1
    • T.AUDACC: 1
    • T.AUDFUL: 1
    • T.MEDIAT: 1
    • T.NOAUTH: 1
    • T.OLDINF: 1
    • T.PROCOM: 1
    • T.REPEAT: 1
    • T.REPLAY: 1
    • T.SELPRO: 1
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 8
  • VPN:
    • VPN: 8
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 3
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_metadata
  • /Author: Mallett, Patrick W.
  • /CreationDate: D:20121005092651
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20121005092651
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 329777
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: Tse
  • /CreationDate: D:20130318153433-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130318153433-04'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 1
  • pdf_file_size_bytes: 511380
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename st_vid10452-st.pdf RioRey ST- v0.9.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL4: 1
  • EAL:
    • EAL4+: 6
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.2: 11
    • ADV_TDS: 1
    • ADV_TDS.1: 11
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 8
    • ALC_CMS: 1
    • ALC_CMS.2: 5
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 15
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 4
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 7
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 2
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 8
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 1
    • FAU_SAR.3.1: 1
    • FAU_STG: 8
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 18
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 3
    • FDP_IFC.1: 15
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 14
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 2
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP: 3
    • FDP_RIP.1: 1
    • FDP_RIP.2: 2
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 4
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 1
    • FIA_ATD: 4
    • FIA_ATD.1: 3
    • FIA_ATD.1.1: 2
    • FIA_UAU: 8
    • FIA_UAU.1: 2
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 3
    • FIA_UAU.4.1: 1
    • FIA_UID: 4
    • FIA_UID.2: 3
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 4
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 1
    • FMT_MSA: 4
    • FMT_MSA.3: 3
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 4
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 1
    • FMT_SMR: 4
    • FMT_SMR.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 1
    • FPT_STM: 4
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 13
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 12
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.DIRECT: 2
    • A.GENPUR: 2
    • A.LOWEXP: 2
    • A.NOEVIL: 2
    • A.NOREMO: 2
    • A.PHYSEC: 2
    • A.PUBLIC: 2
    • A.REMACC: 2
    • A.SINGEN: 2
  • O:
    • O.ACCOUN: 1
    • O.ADMTRA: 1
    • O.AUDREC: 1
    • O.ENCRYP: 1
    • O.GUIDAN: 1
    • O.IDAUTH: 1
    • O.INTEGRITY: 4
    • O.LIMEXT: 1
    • O.MEDIAT: 1
    • O.SECFUN: 1
    • O.SECSTA: 1
    • O.SELPRO: 1
    • O.SINUSE: 1
  • T:
    • T.ASPOOF: 1
    • T.AUDACC: 1
    • T.AUDFUL: 1
    • T.MEDIAT: 1
    • T.NOAUTH: 1
    • T.OLDINF: 1
    • T.PROCOM: 1
    • T.REPEAT: 1
    • T.REPLAY: 1
    • T.SELPRO: 1
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 6
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 4
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 3
      • SHA256: 1
  • MD:
    • MD5:
      • MD5: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 3
  • SSH:
    • SSH: 25
  • VPN:
    • VPN: 76
  • SSH:
    • SSH: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • secp256r1: 1
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 5
    • FIPS 180-2: 1
    • FIPS 186-3: 1
    • FIPS 197: 2
    • FIPS PUB 140-2: 6
  • NIST:
    • SP 800-67: 2
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 2
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /Author: Neal
  • /CreationDate: D:20121005092759
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20121005092759
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: Security Appliances Security Target
  • pdf_file_size_bytes: 867098
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
  • /CreationDate: D:20130328162641+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130328162641+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1068348
  • pdf_hyperlinks: https://tools.ietf.org/html/rfc6151
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different