Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Check Point Software Blades R7x
CCEVS-VR-10387-2012
Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
BSI-DSZ-CC-0284-2005
name Check Point Software Blades R7x Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
category Boundary Protection Devices and Systems Operating Systems
scheme US DE
not_valid_after 31.12.2014 01.09.2019
not_valid_before 26.11.2012 09.11.2005
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10387-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10387-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284b.pdf
manufacturer Check Point Software Technologies Ltd. Microsoft Corporation
manufacturer_web https://www.checkpoint.com/ https://www.microsoft.com
dgst 2abffef5c9de3bae bbe326d5bfbd5036
heuristics/cert_id CCEVS-VR-10387-2012 BSI-DSZ-CC-0284-2005
heuristics/cert_lab US BSI
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_ENV.1, ADV_RCR.1, AVA_VLA.2, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ADV_IGS.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ALC_FLR.3, ADV_FUN.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1
heuristics/extracted_versions - 6.5.7226.0
heuristics/scheme_data
  • category: Firewall, Virtual Private Network, Wireless Monitoring
  • certification_date: 26.11.2012
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 26.11.2014
  • id: CCEVS-VR-VID10387
  • product: Check Point Software Blades R7x
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10387
  • vendor: Check Point Software Technologies Ltd
heuristics/protection_profiles f0acae5742fb48a1, 168a407fba56140a, 44cdd911811b36d2 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_fw_tf_br_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_FW_AL_BR_V1.0.pdf {}
pdf_data/report_filename st_vid10387-vr.pdf 0284a.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-10387-2012
    • cert_item: Check Point Software Blades R7x
    • cert_lab: US NIAP
  • DE:
    • cert_id: BSI-DSZ-CC-0284-2005
    • cert_item: Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
    • cert_lab: BSI
    • developer: Microsoft Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10387-2012: 1
  • DE:
    • BSI-DSZ-CC-0284-2005: 19
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 2
    • EAL4: 4
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL4 augmented: 2
    • EAL4+: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.1: 1
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_FLR.3: 3
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.2: 1
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 2
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.LOCATE: 1
    • A.NOEVIL: 1
    • A.SINGEN: 1
  • T:
    • T.ASPOOF: 1
    • T.AUDFUL: 1
    • T.AUMACC: 1
    • T.COMDIS: 1
    • T.COMINT: 1
    • T.FACCNT: 1
    • T.FALACT: 1
    • T.FALASC: 1
    • T.FALREC: 1
    • T.FAULT: 1
    • T.IMPCON: 1
    • T.INADVE: 1
    • T.INFLUX: 1
    • T.LOSSOF: 1
    • T.MEDIAT: 1
    • T.MISACT: 1
    • T.MISUSE: 1
    • T.NACCESS: 1
    • T.NMODIFY: 1
    • T.NOAUTH: 1
    • T.NOHALT: 1
    • T.OLDINF: 1
    • T.PRIVIL: 1
    • T.PROCOM: 1
    • T.REPEAT: 1
    • T.REPLAY: 1
    • T.SELPRO: 1
    • T.TUSAGE: 1
  • A:
    • A.ACCESS_CONTROL: 2
    • A.COM_PROT: 2
    • A.CORRECT_HW: 2
    • A.INSTALL: 2
    • A.MANAGE: 2
    • A.NO_EVIL_ADM: 2
    • A.PHYS_PROTECT: 2
  • T:
    • T.AUTH_DAC: 1
    • T.DL_MISUSE: 1
    • T.OVERFLOW: 1
    • T.SPAM: 1
    • T.UNAUTHUSE: 1
    • T.UNAUTH_DAC: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 17
    • Microsoft Corporation: 6
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • TLS:
    • SSL:
      • SSL: 4
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 15
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 2
    • FIPS 197: 1
    • FIPS PUB 140-1: 1
  • BSI:
    • AIS 32: 1
    • AIS 33: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Technical Report, BSI-DSZ-CC-0284-2005, Version 1, Datum 2005-09-16, TÜV Informationstechnik GmbH (confidential document) [7] Exchange Server 2003 Administration Guide and Exchange Server 2003 product help (part of the: 1
  • OutOfScope:
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation, too. B-11 BSI-DSZ-CC-0284-2005 Certification Report 5 Architectural Information: 1
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The relevant Guidance Documentation is delivered together with the software on: 1
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
    • of Exchange 2003 the components IMAP4, POP3, and X.400 protocol are disabled and therefore out of scope of the evaluation. The TOE runs on the platform Windows Server 2003 operating system (exact: 1
    • out of scope: 4
pdf_data/report_metadata
  • /Author: NIAP CCEVS
  • /CreationDate: D:20121130103410
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20121130103410
  • /Producer: Microsoft® Office Word 2007
  • /Title: VID 10375 VR
  • pdf_file_size_bytes: 401523
  • pdf_hyperlinks: http://www.niap-ccevs.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /Author: Federal Office for Information Security (BSI)
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20051220074356+01'00'
  • /Creator: Acrobat PDFMaker 7.0.5 für Word
  • /ModDate: D:20051220075600+01'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20051220064348
  • /Subject: BSI-DSZ-CC-0284-2005
  • /Title: Certification Report
  • pdf_file_size_bytes: 399534
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 39
pdf_data/st_filename st_vid10387-st.pdf 0284b.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL4: 10
  • EAL:
    • EAL4: 10
    • EAL4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 7
    • ADV_FSP.1: 1
    • ADV_FSP.2: 3
    • ADV_FSP.4: 6
    • ADV_IMP.1: 5
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 8
  • AGD:
    • AGD_OPE.1: 6
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 4
    • ALC_FLR.2: 1
    • ALC_FLR.3: 9
    • ALC_LCD.1: 4
    • ALC_TAT.1: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_COV.2: 4
    • ATE_DPT.1: 2
    • ATE_FUN.1: 8
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.3: 3
    • ACM_SCP.1: 1
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 9
    • ADV_FSP.2: 2
    • ADV_FUN.1: 1
    • ADV_HLD.1: 2
    • ADV_HLD.2: 3
    • ADV_IGS.1: 1
    • ADV_IMP.1: 3
    • ADV_LLD.1: 4
    • ADV_RCR.1: 5
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 4
  • ALC:
    • ALC_DVS.1: 3
    • ALC_FLR.3: 9
    • ALC_LCD.1: 2
    • ALC_TAT.1: 3
  • ASE:
    • ASE_REQ.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 3
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.2: 2
    • AVA_SOF.1: 2
    • AVA_VLA.2: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 29
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 9
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 4
    • FAU_STG.2: 16
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 2
    • FAU_STG.2.3: 1
    • FAU_STG.3: 7
    • FAU_STG.3.1: 1
    • FAU_STG.4: 13
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 27
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 20
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 15
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 70
    • FCS_COP.1.1: 8
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC: 4
    • FDP_IFC.1: 44
    • FDP_IFC.1.1: 6
    • FDP_IFF: 10
    • FDP_IFF.1: 51
    • FDP_IFF.1.1: 6
    • FDP_IFF.1.2: 6
    • FDP_IFF.1.3: 6
    • FDP_IFF.1.4: 4
    • FDP_IFF.1.5: 3
    • FDP_IFF.1.6: 2
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
    • FDP_RIP: 2
    • FDP_RIP.1: 4
    • FDP_RIP.2: 10
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 10
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_ATD.1: 15
    • FIA_ATD.1.1: 3
    • FIA_SOS.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 8
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 24
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
    • FIA_UID: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 16
    • FIA_UID.2.1: 1
    • FIA_USB: 2
    • FIA_USB.1: 14
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 22
    • FMT_MOF.1.1: 1
    • FMT_MSA: 8
    • FMT_MSA.1: 23
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 17
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 19
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 2
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_ITA.1: 1
    • FPT_ITC.1: 1
    • FPT_ITI.1: 1
    • FPT_ITT.1: 10
    • FPT_ITT.1.1: 1
    • FPT_RVM: 1
    • FPT_SEP: 1
    • FPT_STM.1: 12
    • FPT_STM.1.1: 4
    • FPT_TRC.1: 9
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT.2: 9
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FDP:
    • FDP_ACC.1: 42
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 40
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC.1: 25
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 20
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
  • FIA:
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_ACC.1: 1
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 52
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_SMF.1: 21
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FRU:
    • FRU_RSA.1: 18
    • FRU_RSA.1.1: 2
  • FTP:
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.LOCATE: 4
    • A.NOEVIL: 3
    • A.PHYSEC: 2
    • A.SINGEN: 6
  • D:
    • D.INFO: 10
    • D.PACKET: 9
    • D.PACKETS: 1
  • O:
    • O.ACCESS: 3
    • O.ACCOUN: 7
    • O.AUDITS: 3
    • O.AUDREC: 11
    • O.CREDEN: 1
    • O.DAC: 1
    • O.EADMIN: 4
    • O.EAL: 2
    • O.ENCRYP: 9
    • O.EXPORT: 2
    • O.FAULT: 7
    • O.GENPUR: 1
    • O.GUIDANCE: 1
    • O.IDANLZ: 10
    • O.IDAUTH: 19
    • O.IDSCAN: 1
    • O.IDSENS: 8
    • O.INTEGR: 8
    • O.LIMEXT: 8
    • O.MEDIAT: 10
    • O.MEDIATE: 1
    • O.OFLOWS: 9
    • O.PROTCT: 10
    • O.RESPON: 8
    • O.SECFUN: 13
    • O.SECSTA: 8
    • O.SELPRO: 8
    • O.SINUSE: 5
    • O.VPN: 9
  • OE:
    • OE.AUDIT_PROTECTION: 1
    • OE.AUDIT_SORT: 1
    • OE.CREDEN: 3
    • OE.IDAUTH: 9
    • OE.INSTAL: 2
    • OE.PERSON: 2
    • OE.PHYCAL: 2
    • OE.SINGEN: 8
    • OE.TIME: 1
    • OE.VPN: 8
  • T:
    • T.ASPOOF: 1
    • T.AUDACC: 1
    • T.AUDFUL: 1
    • T.COMDIS: 1
    • T.COMINT: 3
    • T.FACCNT: 1
    • T.FALACT: 3
    • T.FALASC: 3
    • T.FALREC: 1
    • T.FAULT: 3
    • T.IMPCON: 1
    • T.INADVE: 3
    • T.INFLUX: 3
    • T.LOSSOF: 3
    • T.LOWEXP: 3
    • T.MEDIAT: 4
    • T.MISACT: 1
    • T.MISUSE: 1
    • T.NACCESS: 4
    • T.NMODIFY: 1
    • T.NOAUTH: 5
    • T.NOHALT: 1
    • T.OLDINF: 1
    • T.PRIVIL: 3
    • T.PROCOM: 3
    • T.REPEAT: 1
    • T.REPLAY: 3
    • T.SCNCFG: 1
    • T.SCNMLC: 1
    • T.SCNVUL: 1
    • T.SELPRO: 3
    • T.TUSAGE: 3
  • A:
    • A.ACCESS_CONTROL: 3
    • A.COM_PROT: 3
    • A.CORRECT_HW: 3
    • A.INSTALL: 4
    • A.MANAGE: 4
    • A.NO_EVIL_ADM: 2
    • A.NO_EVIL_ADMIN: 1
    • A.PHYS_PROTECT: 4
  • O:
    • O.CONBLK: 13
    • O.DAC: 16
    • O.FILTER_EMAIL: 10
    • O.QUOTA: 12
    • O.RESTDIST: 11
  • OE:
    • OE.COM_PROT: 5
    • OE.DAC: 12
    • OE.INSTALL: 3
    • OE.PHYSICAL: 3
    • OE.PLATFORM_: 1
    • OE.PLATFORM_SUPPORT: 4
  • T:
    • T.AUTH_DAC: 4
    • T.DL_MISUSE: 4
    • T.OVERFLOW: 4
    • T.SPAM: 9
    • T.UNAUTHUSE: 3
    • T.UNAUTH_DAC: 3
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 2
  • Microsoft:
    • Microsoft: 7
  • Microsoft:
    • Microsoft: 20
    • Microsoft Corporation: 2
pdf_data/st_keywords/eval_facility
  • TUV:
    • TÜViT: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 16
      • AES-128: 1
  • DES:
    • DES:
      • DES: 14
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 2
  • AES_competition:
    • RC:
      • RC4: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 8
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-256: 9
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • KEX:
    • Key Exchange: 3
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 49
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 4
  • TLS:
    • SSL:
      • SSL: 53
    • TLS:
      • TLS: 32
      • TLS v1.0: 1
      • TLSv1.0: 10
  • VPN:
    • VPN: 336
  • TLS:
    • SSL:
      • SSL: 4
      • SSL 3.0: 1
    • TLS:
      • TLS: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
    • PRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_3DES_EDE_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
  • FIPS:
    • FIPS 140-2: 10
    • FIPS 180-3: 1
    • FIPS 197: 3
    • FIPS PUB 140-1: 1
    • FIPS PUB 140-2: 9
    • FIPS PUB 180-3: 2
    • FIPS PUB 197: 3
    • FIPS PUB 198: 3
    • FIPS PUB 46-3: 4
    • FIPS140: 1
    • FIPS180-3: 1
    • FIPS197: 1
    • FIPS198: 1
    • FIPS46-3: 1
  • NIST:
    • NIST SP 800-67: 2
    • NIST SP 800-90: 3
    • SP 800-67: 3
    • SP 800-90: 5
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 3
    • PKCS#12: 1
  • RFC:
    • RFC 0854: 1
    • RFC 0959: 1
    • RFC 1305: 1
    • RFC 1334: 1
    • RFC 1777: 2
    • RFC 1778: 1
    • RFC 1994: 1
    • RFC 2104: 3
    • RFC 2246: 3
    • RFC 2284: 1
    • RFC 2401: 1
    • RFC 2404: 3
    • RFC 2406: 4
    • RFC 2409: 5
    • RFC 2616: 1
    • RFC 2631: 3
    • RFC 2661: 1
    • RFC 2716: 1
    • RFC 2821: 1
    • RFC 2865: 1
    • RFC 3193: 1
    • RFC 3526: 4
    • RFC 3947: 1
    • RFC 3948: 1
    • RFC 5114: 4
    • RFC 792: 1
    • RFC0854: 1
    • RFC0959: 2
    • RFC1305: 2
    • RFC1334: 2
    • RFC1777: 1
    • RFC1778: 1
    • RFC1994: 1
    • RFC2104: 1
    • RFC2246: 3
    • RFC2284: 1
    • RFC2401: 2
    • RFC2404: 1
    • RFC2406: 1
    • RFC2409: 2
    • RFC2616: 1
    • RFC2631: 1
    • RFC2661: 2
    • RFC2716: 2
    • RFC2821: 2
    • RFC2865: 1
    • RFC3193: 2
    • RFC3526: 1
    • RFC3947: 2
    • RFC3948: 2
    • RFC5114: 1
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • RFC:
    • RFC1725: 1
    • RFC1730: 1
    • RFC821: 11
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
    • out of scope: 2
    • the TOE is Exchange in its default configuration, IMAP4, POP3, and X.400 protocols are disabled and out of scope in the evaluation. Security Target Page 9/64 1. Admin component, which includes the following: 1
pdf_data/st_metadata
  • /Author: Nir Naaman
  • /Classification: NoClassification
  • /ClassificationDisplay: [No Classification] 3rd party or non-work related
  • /ClassificationEntries: 1
  • /Classification_1: XXZreXVmd3RXZVBjf2p2ZW5tSmiViG85JnSLg4qHOyyVISYkIICLnUSCjZNLMSgnUihEXw==
  • /Company: Check Point Software Technologies Ltd.
  • /CreationDate: D:20121127171748+02'00'
  • /Creator: Acrobat PDFMaker 7.0.5 for Word
  • /Keywords: Information flow control, firewall, proxy server, traffic filter, remote access, VPN, SSL VPN, IPSec, IPS, intrusion detection
  • /ModDate: D:20121127171854+02'00'
  • /OS: Check Point SecurePlatform
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Revision: 1.2
  • /Subject: Security Target
  • /TOE: Check Point Software Blades R7x
  • /Title: Software Blades
  • /cp_sk: sk77840
  • /cp_version: R7x
  • /documentDate: 11/8/2012
  • /longDate: November 8, 2012
  • /lqminfo: 4
  • /lqmsess: 1e390c24-5a22-474b-a7d8-73e646d7bb31
  • /smartconsole_version: R71
  • pdf_file_size_bytes: 1383207
  • pdf_hyperlinks: http://www.checkpoint.com/3rd_party_copyright.html, http://www.checkpoint.com/copyright.html
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 173
  • /Author: slabihou
  • /CreationDate: D:20050713145508+02'00'
  • /Creator: pdfFactory Pro www.pdffactory.com
  • /Producer: pdfFactory Pro 2.41 (Windows 2000 Professional German)
  • /Title: MS_EX_ST_1.9.doc
  • pdf_file_size_bytes: 285736
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different