Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Junos OS 22.2R1 for MX10003
None
Cisco ASA 5510, 5520, and 5540 Adaptive Security Appliances and Cisco PIX 515, 515E, 525, 535 Security Appliances, Version 7.0(6)
CCEVS-VR-0017-2007
name Junos OS 22.2R1 for MX10003 Cisco ASA 5510, 5520, and 5540 Adaptive Security Appliances and Cisco PIX 515, 515E, 525, 535 Security Appliances, Version 7.0(6)
category Network and Network-Related Devices and Systems Boundary Protection Devices and Systems
scheme AU US
status active archived
not_valid_after 22.12.2027 06.09.2012
not_valid_before 22.12.2022 09.03.2007
report_link https://www.commoncriteriaportal.org/files/epfiles/AISEP-CC-CR-2022-EFT-T024-22.2R1_MX10003-CR-V1.0_20231010.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6016-vr.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/Juniper%20Junos%2022.2R1%20for%20MX10003%20%20Security%20Target%20v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6016-st.pdf
manufacturer Juniper Networks, Inc. Cisco Systems, Inc.
manufacturer_web https://www.cisco.com
security_level {} EAL4+
dgst 34b85005f7f4ed15 68779fbe32d5b2d6
heuristics/cert_id CCEVS-VR-0017-2007
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:pix-535:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:adaptive_security_appliance_5540:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:adaptive_security_appliance_5520:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:pix-515:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:pix-515e:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:asa-5540:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:pix-525:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:adaptive_security_appliance_5510:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:asa-5520:-:*:*:*:*:*:*:*
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1
heuristics/extracted_versions 22.2 7.0
heuristics/scheme_data
  • category: Firewall
  • certification_date: 09.03.2007
  • evaluation_facility: Arca CCTL
  • expiration_date:
  • id: CCEVS-VR-VID6016
  • product: Cisco ASA 5510, 5520, and 5540 Adaptive Security Appliances and Cisco PIX 515, 515E, 525, 535 Security Appliances, Version 7.0(6)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/6016
  • vendor: Cisco Systems, Inc.
maintenance_updates

protection_profile_links {} {}
pdf_data/report_filename AISEP-CC-CR-2022-EFT-T024-22.2R1_MX10003-CR-V1.0_20231010.pdf st_vid6016-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-07-0017
    • cert_item: Cisco PIX Security Appliances 515, 515E, 525, 535 and Adaptive Security Appliances 5510, 5520 and 5540, Version 7.0(6
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-07-0017: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 3
    • EAL4: 2
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_STG.1: 1
  • FPT:
    • FPT_SEP: 3
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 60
    • Cisco Systems: 4
    • Cisco Systems, Inc: 1
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • Teron:
    • Teron Labs: 4
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
    • SSHv2: 2
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20070601120725-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20070601120827-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20070601160501
  • /Subject: CCEVS Validation Report - Cisco TPIX Security Appliances 515, 515E, 525, 535 and Adaptive Security Appliances 5510, 5520 and 5540, Version 7.0
  • /Title: VID6016-VR-0001 DRAFT
  • pdf_file_size_bytes: 250226
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename Juniper Junos 22.2R1 for MX10003 Security Target v1.3.pdf st_vid6016-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL4: 6
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 1
  • ACM:
    • ACM_AUT.1: 12
    • ACM_CAP.3: 3
    • ACM_CAP.4: 22
    • ACM_SCP.1: 1
    • ACM_SCP.2: 7
  • ADO:
    • ADO_DEL.1: 1
    • ADO_DEL.2: 10
    • ADO_IGS.1: 9
  • ADV:
    • ADV_FSP.1: 10
    • ADV_FSP.2: 12
    • ADV_HLD.1: 2
    • ADV_HLD.2: 16
    • ADV_IMP.1: 9
    • ADV_LLD.1: 18
    • ADV_RCR: 2
    • ADV_RCR.1: 10
    • ADV_SPM.1: 11
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 16
    • AGD_USR.1: 14
  • ALC:
    • ALC_DVS.1: 10
    • ALC_FLR.1: 17
    • ALC_LCD.1: 9
    • ALC_TAT: 1
    • ALC_TAT.1: 9
  • ATE:
    • ATE_COV.1: 1
    • ATE_COV.2: 7
    • ATE_DPT.1: 7
    • ATE_FUN.1: 14
    • ATE_IND.2: 9
  • AVA:
    • AVA_MSU.2: 15
    • AVA_SOF.1: 8
    • AVA_VLA.2: 15
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 2
    • FAU_STG_EXT.1: 3
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 4
    • FCS_CKM.4.1: 1
    • FCS_COP: 22
    • FCS_COP.1: 10
    • FCS_COP.1.1: 3
    • FCS_MKA: 2
    • FCS_MKA_EXT.1: 5
    • FCS_MKA_EXT.1.1: 1
    • FCS_MKA_EXT.1.2: 1
    • FCS_MKA_EXT.1.3: 1
    • FCS_MKA_EXT.1.4: 1
    • FCS_MKA_EXT.1.5: 1
    • FCS_MKA_EXT.1.6: 1
    • FCS_MKA_EXT.1.7: 1
    • FCS_MKA_EXT.1.8: 1
    • FCS_NTP_EXT.1.4: 2
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHS_EXT: 2
    • FCS_SSHS_EXT.1: 7
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.2.3: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT.1: 3
    • FIA_UAU: 2
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 2
    • FIA_UAU_EXT.2: 4
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 2
    • FIA_UIA_EXT.1: 5
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 17
    • FMT_MOF.1: 3
    • FMT_MTD: 13
    • FMT_MTD.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.2: 6
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 2
    • FPT_APW_EXT.1: 5
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_CAK_EXT.1: 6
    • FPT_CAK_EXT.1.1: 1
    • FPT_FLS: 3
    • FPT_FLS.1: 4
    • FPT_FLS.1.1: 1
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 1
    • FPT_STM_EXT: 2
    • FPT_STM_EXT.1: 5
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 5
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 9
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL.3: 6
    • FTA_SSL.4: 5
    • FTA_SSL_EXT: 2
    • FTA_SSL_EXT.1: 5
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 7
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 7
    • FTP_TRP.1: 4
  • FAU:
    • FAU_GEN.1: 15
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 4
    • FDP_IFC.1: 22
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 23
    • FDP_IFF.1.1: 4
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 2
    • FDP_ITC.1: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 5
    • FIA_UAU.1: 3
    • FIA_UAU.2: 1
    • FIA_UAU.5: 19
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 10
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 2
    • FMT_MSA: 1
    • FMT_MSA.1: 27
    • FMT_MSA.1.1: 4
    • FMT_MSA.2: 2
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 2
    • FMT_MTD.2: 7
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SEP.1.2: 1
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 7
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 6
    • FPT_SEP.1.1: 1
    • FPT_STM.1: 8
    • FPT_STM.1.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINSTRATOR: 1
  • O:
    • O.AUTHENTICATION: 2
    • O.AUTHORIZED_ADMINIS: 1
    • O.AUTHORIZED_ADMINISTRATION: 1
    • O.CRYPTOGRAPHIC_FUN: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.PORT_FILTERING: 2
    • O.REPLAY_DETECTION: 2
    • O.SYSTEM_MONITORING: 2
    • O.TSF_INTEGRITY: 2
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 2
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.DATA_INTEGRITY: 1
    • T.NETWORK_ACCESS: 1
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A.DIRECT: 1
    • A.GENPUR: 1
    • A.MODEXP: 1
    • A.NOEVIL: 1
    • A.NOREMO: 1
    • A.PHYSEC: 1
    • A.PROTECTPF: 2
    • A.PUBLIC: 1
    • A.REMACC: 1
    • A.SINGEN: 1
  • O:
    • O.ACCO: 1
    • O.ACCOUN: 5
    • O.AUDR: 1
    • O.AUDREC: 7
    • O.EAL: 6
    • O.ENCR: 1
    • O.ENCRYP: 4
    • O.IDAU: 1
    • O.IDAUTH: 9
    • O.LIME: 1
    • O.LIMEXT: 5
    • O.MEDI: 1
    • O.MEDIAT: 14
    • O.SECF: 1
    • O.SECFUN: 17
    • O.SECS: 1
    • O.SECSTA: 13
    • O.SELP: 1
    • O.SELPRO: 8
    • O.SINU: 1
    • O.SINUSE: 4
  • OE:
    • OE.ADMTRA: 3
    • OE.DIRECT: 2
    • OE.GENPUR: 2
    • OE.GUIDAN: 3
    • OE.IDAUTH: 8
    • OE.MODEXP: 2
    • OE.NOEVIL: 2
    • OE.NOREMO: 2
    • OE.PHYSEC: 3
    • OE.PUBLIC: 3
    • OE.REMACC: 2
    • OE.SINGEN: 2
    • OE.SINUSE: 6
  • T:
    • T.ASP: 1
    • T.ASPOOF: 2
    • T.AUD: 1
    • T.AUDAC: 1
    • T.AUDACC: 5
    • T.AUDFUL: 3
    • T.MED: 1
    • T.MEDIAT: 2
    • T.MODE: 1
    • T.MODEXP: 2
    • T.NOAUT: 1
    • T.NOAUTH: 8
    • T.OLDI: 1
    • T.OLDINF: 2
    • T.PROCO: 1
    • T.PROCOM: 2
    • T.REPE: 1
    • T.REPEAT: 3
    • T.REPL: 1
    • T.REPLAY: 4
    • T.SELP: 1
    • T.SELPRO: 3
    • T.TUSAGE: 3
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 181
    • Cisco Systems: 5
    • Cisco Systems, Inc: 5
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 29
      • AES-: 4
  • constructions:
    • MAC:
      • CMAC: 8
      • HMAC: 2
      • HMAC-SHA-256: 4
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 2
  • miscellaneous:
    • Skinny:
      • Skinny: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 3
    • SHA2:
      • SHA-256: 5
      • SHA-384: 2
      • SHA-512: 4
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 10
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 11
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 107
    • SSHv2: 11
  • TLS:
    • DTLS:
      • DTLS: 3
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 8
  • SSH:
    • SSH: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RBG: 1
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 4
  • GCM:
    • GCM: 6
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 14
    • P-384: 12
    • P-521: 10
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 186-4: 5
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-38F: 1
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 3526: 2
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4254: 1
    • RFC 5077: 1
    • RFC 5656: 1
    • RFC 6668: 1
    • RFC3526: 1
    • RFC4344: 1
    • RFC5656: 1
  • FIPS:
    • FIPS 140: 3
    • FIPS 140-1: 2
    • FIPS 140-2: 4
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS PUB 140-1: 2
    • FIPS PUB 140-2: 4
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 3
    • FIPS140: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 10 1.6.5 Summary of out of scope items: 1
    • 10 1.6.5 Summary of out of scope items....................................................................................10 2: 1
    • for remote administration; • Serial connection client for local administration. 1.6.5 Summary of out of scope items • Use of telnet, since it violates the Trusted Path requirement set (see Section 5.7.2) • Use: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: sheema
  • /CreationDate: D:20070522104813-07'00'
  • /Creator: FrameMaker 5.5.6p145
  • /ModDate: D:20070601120934-04'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: asastd4.fm
  • pdf_file_size_bytes: 761890
  • pdf_hyperlinks: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 68
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different