This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
SecureSwitch® Fiber Optic Switch Models 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1, 8:1 Rev A 383-4-410 |
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 CCEVS-VR-VID-10443-2012 |
|
---|---|---|
name | SecureSwitch® Fiber Optic Switch Models 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1, 8:1 Rev A | Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 |
category | Network and Network-Related Devices and Systems | Detection Devices and Systems |
not_valid_before | 2016-10-12 | 2012-10-01 |
not_valid_after | 2021-10-12 | 2014-11-01 |
scheme | CA | US |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Market%20Central%20SecureSwitch%20nto1%20ST_1.1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf |
manufacturer | Market Central, Inc. | Tenable Network Security, Inc. |
manufacturer_web | https://secureswitch.com/ | https://www.tenable.com/ |
security_level | EAL2 | ALC_FLR.2, EAL2+ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-410%20CR%20v1.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-410%20CT%20v1.0e.pdf | None |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile Intrusion Detection System - System for Basic Robustness Environme...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf', 'pp_ids': None}) | |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2018, 2, 20), 'maintenance_title': 'SecureSwitch® Fiber Optic Switch, Models: 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1 and 8:1 (February 2018)', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-7-152%20MR%201.0e.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Market%20Central%20SecureSwitch%20nto1%20ST_2.0.pdf'}) | |
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | 78bb49e353b7020963a71adf3e861292c26ca68e84373111bd93cacbabc38472 | None |
state/cert/txt_hash | 61a6ee43425c8eb474d37bd89baec0fd283f761544ec1613811da98b44d377e5 | None |
state/report/pdf_hash | 7d804a0d917d4b097362ace5ac0b10b3575eda93ff3319c5d2e1436da0af6cd6 | 6bbe4e39fb1e3e1496edb10118d6519fe521fc80f7080eb44d7404caa0dbfbb4 |
state/report/txt_hash | 080c105bf80f3640f01b04be6b87ab2e42cb3cc9d91191bd1894936c324a4874 | 0cc9c7cf65c4283fa42658cbdbdf224629263190e3e25cbfe0a0fd5d7e8152ce |
state/st/pdf_hash | 17d03a6eb50518df3a4c78b1d9bebeada799a7316c80921903c6cae8d52e6bc3 | 3b767d5258133c0eb3601092a8cf7081b94bf08c654a872c21fb6c7e48566775 |
state/st/txt_hash | ee59788b5c07dc8fbd47020ab57402179ff25a45cb3d58541b419befd45f3fae | ac95bdcc32b3b1fa5fb3cb004f461c884649a1e12a831f99e30019259a8b5792 |
heuristics/cert_id | 383-4-410 | CCEVS-VR-VID-10443-2012 |
heuristics/cert_lab | None | US |
heuristics/cpe_matches | None | cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:* |
heuristics/extracted_versions | 2, 1, 7, 5, 4, 6, 3, 8 | 5.0.1, 2.0.1, 4.4, 2.1, 3.6 |
heuristics/related_cves | None | CVE-2018-1141, CVE-2022-22827, CVE-2017-18214, CVE-2017-5179, CVE-2018-20843, CVE-2022-22824, CVE-2016-1000029, CVE-2022-23852, CVE-2020-5774, CVE-2019-3923, CVE-2024-0971, CVE-2018-1148, CVE-2022-28291, CVE-2021-20079, CVE-2022-22825, CVE-2023-6062, CVE-2022-32973, CVE-2019-3962, CVE-2023-3252, CVE-2021-3449, CVE-2023-3251, CVE-2021-3450, CVE-2018-5407, CVE-2021-20106, CVE-2021-46143, CVE-2022-33757, CVE-2016-9260, CVE-2020-5765, CVE-2022-22826, CVE-2022-22822, CVE-2022-23990, CVE-2019-3982, CVE-2016-4055, CVE-2019-3961, CVE-2022-0778, CVE-2019-1559, CVE-2022-22823, CVE-2021-45960, CVE-2023-3253, CVE-2022-3499, CVE-2024-0955, CVE-2023-6178, CVE-2022-4313, CVE-2018-1147, CVE-2021-20135, CVE-2022-32974, CVE-2016-1000028 |
heuristics/scheme_data | None |
|
pdf_data/cert_filename | 383-4-410 CT v1.0e.pdf | None |
pdf_data/cert_keywords |
|
None |
pdf_data/cert_metadata |
|
None |
pdf_data/report_filename | 383-4-410 CR v1.0e.pdf | st_vid10443-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims | |
|
pdf_data/report_keywords/cc_sar | |
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 | 1 | 4 |
pdf_data/report_keywords/crypto_protocol | |
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/vendor | |
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//Author | Shannon, Keith R. | Evaluation Team |
pdf_data/report_metadata//CreationDate | D:20161121085418-05'00' | D:20121024103543 |
pdf_data/report_metadata//Creator | Microsoft® Word 2010 | Microsoft® Office Word 2007 |
pdf_data/report_metadata//ModDate | D:20161121085418-05'00' | D:20121024103543 |
pdf_data/report_metadata//Producer | Microsoft® Word 2010 | Microsoft® Office Word 2007 |
pdf_data/report_metadata//Title | 383-4-XXX CR v0.1 | Validation Report for IronPort Messaging Gateway |
pdf_data/report_metadata/pdf_file_size_bytes | 393824 | 441073 |
pdf_data/report_metadata/pdf_hyperlinks | mailto:[email protected] | |
pdf_data/report_metadata/pdf_number_of_pages | 17 | 25 |
pdf_data/st_filename | Market Central SecureSwitch nto1 ST_1.1.pdf | st_vid10443-st.pdf |
pdf_data/st_keywords/cc_claims/A |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/OE |
|
|
pdf_data/st_keywords/cc_claims/T |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 1 | 22 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.2 | 1 | 12 |
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.1 | 1 | 12 |
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 | 1 | 11 |
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 | 1 | 7 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.2 | 1 | 8 |
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.2 | 1 | 8 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 | 1 | 6 |
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 | 1 | 5 |
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 | 1 | 9 |
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 | 1 | 8 |
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.2 | 1 | 8 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL2 | 2 | 9 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/crypto_library | |
|
pdf_data/st_keywords/crypto_protocol | |
|
pdf_data/st_keywords/side_channel_analysis | |
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Lachlan Turner | ktodd |
pdf_data/st_metadata//CreationDate | D:20161121094840-05'00' | D:20121024103427 |
pdf_data/st_metadata//Creator | Microsoft® Word 2010 | Microsoft® Office Word 2007 |
pdf_data/st_metadata//ModDate | D:20161121094840-05'00' | D:20121024103427 |
pdf_data/st_metadata//Producer | Microsoft® Word 2010 | Microsoft® Office Word 2007 |
pdf_data/st_metadata/pdf_file_size_bytes | 479801 | 1188447 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.arkinfosec.net/ | http://cve.mitre.org/, http://nvd.nist.gov/fdcc/download_fdcc.cfm, http://www.securityfocus.com/bid/ |
pdf_data/st_metadata/pdf_number_of_pages | 20 | 59 |
dgst | 2e7051459bb592f9 | 7a9d9dd29e76bfba |