Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Youwipe Erasure Tool 4 with WipeCenter 4
NSCIB-CC-0114526-CR
Cisco cEdge Routers running IOS XE 17.12 with SD-WAN 20.12
654-LSS
name Youwipe Erasure Tool 4 with WipeCenter 4 Cisco cEdge Routers running IOS XE 17.12 with SD-WAN 20.12
category Data Protection Boundary Protection Devices and Systems
scheme NL CA
status archived active
not_valid_after 12.08.2025 18.12.2029
not_valid_before 12.08.2020 18.12.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificate%200114526.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/654-LSS%20CT%20v1.0.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0114526-CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/654-LSS%20CR%20v1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/YouWipe_Common_Criteria_EAL3_ST_V6.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/654-LSS%20ST%20v1.2.pdf
manufacturer AllWipe Oy Ltd. Cisco Systems, Inc.
manufacturer_web https://www.youwipe.com https://www.cisco.com
security_level EAL3+, ALC_FLR.1 EAL2+, ALC_FLR.2
dgst 3c9501fa938f3556 beb60ed58a76b232
heuristics/cert_id NSCIB-CC-0114526-CR 654-LSS
heuristics/cert_lab []
heuristics/cpe_matches {} cpe:2.3:o:cisco:ios_xe:17.12.1z3:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.5a:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.5c:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe_sd-wan:17.12.1a:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.5:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.5b:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2024-20433, CVE-2025-20171, CVE-2024-20316, CVE-2025-20338, CVE-2025-20201, CVE-2025-20162, CVE-2025-20196, CVE-2025-20170, CVE-2025-20199, CVE-2024-20455, CVE-2024-20437, CVE-2024-20436, CVE-2024-20414, CVE-2025-20169, CVE-2025-20175, CVE-2024-20278, CVE-2019-12660, CVE-2024-20309, CVE-2025-20155, CVE-2025-20172, CVE-2025-20195, CVE-2021-1383, CVE-2024-20434, CVE-2025-20194, CVE-2024-20308, CVE-2024-20467, CVE-2023-20246, CVE-2023-44487, CVE-2025-20198, CVE-2025-20193, CVE-2024-20480, CVE-2025-20202, CVE-2021-1432, CVE-2025-20176, CVE-2025-20221, CVE-2021-1619, CVE-2025-20173, CVE-2025-20197, CVE-2025-20200, CVE-2025-20188, CVE-2024-20271, CVE-2025-20214, CVE-2024-20510, CVE-2024-20324, CVE-2024-20314, CVE-2024-20306, CVE-2025-20186, CVE-2023-20273, CVE-2025-20352
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ALC_FLR.1, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 4 20.12, 17.12
heuristics/scheme_data
  • certification_date: 18.12.2024
  • level: EAL 2+ (ALC_FLR.2)
  • product: Cisco cEdge Routers running IOS XE 17.12 with SD-WAN 20.12
  • vendor: Cisco Systems, Inc.
pdf_data/cert_filename certificate 0114526.pdf 654-LSS CT v1.0.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-20-0114526: 1
  • CA:
    • 654-LSS: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL3: 1
    • EAL3 augmented: 1
    • EAL4: 1
  • EAL:
    • EAL 2+: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Cisco:
    • Cisco: 1
    • Cisco Systems, Inc: 1
pdf_data/cert_keywords/eval_facility
  • Secura:
    • Secura: 1
  • Lightship:
    • Lightship Security: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20200820105007+01'00'
  • /Creator: C458-M
  • /ModDate: D:20200820163719+02'00'
  • /Producer: KONICA MINOLTA bizhub C458
  • /Title: C458-M&S20082010490
  • pdf_file_size_bytes: 66649
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Clark, Cory P.
  • /CreationDate: D:20241219134340-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20241219134340-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 389504
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename NSCIB-CC-0114526-CR.pdf 654-LSS CR v1.0.pdf
pdf_data/report_frontpage
  • NL:
    • cert_id: NSCIB-CC-0114526-CR
    • cert_item: Youwipe Erasure Tool 4 with WipeCenter 4
    • cert_lab: Secura B.V.
    • developer: AllWipe Ltd
  • CA:
  • NL:
  • CA:
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-0114526-CR: 11
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL3: 1
    • EAL3 augmented: 1
    • EAL3+: 1
    • EAL4: 1
  • EAL:
    • EAL 2+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 2
  • ALC:
    • ALC_FLR.2: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 1
  • Cisco:
    • Cisco: 11
    • Cisco Systems, Inc: 2
pdf_data/report_keywords/eval_facility
  • Secura:
    • Secura: 2
  • Lightship:
    • Lightship Security: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
    • reverse engineering: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_metadata
pdf_data/st_filename YouWipe_Common_Criteria_EAL3_ST_V6.0.pdf 654-LSS ST v1.2.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 4
    • EAL3+: 2
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 6
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 2
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.2: 5
    • FCS_COP: 20
    • FCS_COP.1: 3
    • FCS_COP.1.1: 3
    • FCS_RNG: 3
    • FCS_RNG.1: 8
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_RNG.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITI.1: 6
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_STM.1: 2
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 5
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 15
    • FCS_RBG_EXT.1: 17
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
  • FDP:
    • FDP_ACC.1: 1
    • FDP_IFC.1: 12
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_ITT.1: 12
    • FDP_ITT.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 11
    • FIA_PMG_EXT.1.1: 2
    • FIA_UAU.1: 2
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 13
    • FMT_MOF.1.1: 2
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.2: 12
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 3
    • FPT_APW_EXT.1: 12
    • FPT_APW_EXT.1.1: 2
    • FPT_APW_EXT.1.2: 2
    • FPT_ITT: 1
    • FPT_ITT.1: 7
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.1: 10
    • FTA_SSL.1.1: 2
    • FTA_SSL.1.2: 2
    • FTA_SSL.3: 9
    • FTA_SSL.4: 7
    • FTA_SSL.4.1: 1
    • FTA_TAB.1: 9
  • FTP:
    • FTP_TRP.1: 8
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.BEHAVED_DRIV: 1
    • A.BEHAVED_DRIVES: 2
    • A.BIOS_PREVENTI: 1
    • A.BIOS_PREVENTING: 2
    • A.COMPETENT_U: 1
    • A.COMPETENT_USERS: 2
    • A.CORRECT_DEPL: 1
    • A.CORRECT_DEPLOYMENT: 3
    • A.SECURE_LOCAT: 1
    • A.SECURE_LOCATION: 3
    • A.SYSTEM_TIME: 3
    • A.TRUSTED_NET: 1
    • A.TRUSTED_NETWORK: 2
  • O:
    • O.AUTHENTIC: 1
    • O.AUTHENTICATED_USER: 5
    • O.PROPER_A: 1
    • O.PROPER_AUDIT: 5
    • O.PROPER_ER: 1
    • O.PROPER_ERASE: 7
    • O.PROPER_RE: 1
    • O.PROPER_REPORTS: 5
    • O.USER_SEPARATION: 2
    • O.USER_SEPE: 1
    • O.USER_SEPERATION: 4
  • OE:
    • OE.BEHAVED_DRIVES: 2
    • OE.BIOS_PREVENTING: 3
    • OE.COMPETENT_USERS: 3
    • OE.CORRECT_DEPLOYMENT: 2
    • OE.PROPER_TIME: 1
    • OE.SECURE_LOCATION: 4
    • OE.SYSTEM_TIME: 2
  • T:
    • T.DATA_RECOVER: 1
    • T.DATA_RECOVERY: 2
    • T.UNAUTHENTIC: 1
    • T.UNAUTHENTICATED_USER: 2
  • A:
    • A.ADMIN: 3
    • A.CONNECTIONS: 3
    • A.LOCATE: 3
    • A.PHYSEC: 3
  • O:
    • O.ACCESS: 1
    • O.ACCESS_CONTRO: 1
    • O.ACCESS_CONTROL: 15
    • O.ACCESS_CONTROLL: 3
    • O.ACCES_CONTROL: 1
    • O.ADMIN: 9
    • O.AUDIT: 1
    • O.AUDIT_GEN: 10
    • O.AUDIT_VIEW: 4
    • O.DATA: 11
    • O.IDAUTH: 12
    • O.MEDIATE: 7
    • O.PROTECTED_COM: 1
    • O.PROTECTED_COMMS: 3
    • O.SELFPRO: 12
    • O.SELPRO: 1
    • O.TIME: 7
    • O.TOE_ADMINISTRA: 1
    • O.TOE_ADMINISTRATION: 2
    • O.VPN: 11
  • OE:
    • OE: 1
    • OE.ADMIN: 3
    • OE.CONNECTION: 2
    • OE.LOCATE: 3
    • OE.PHYSEC: 2
  • T:
    • T.ACCOUNTABIL: 1
    • T.ACCOUNTABILITY: 2
    • T.ASPO: 1
    • T.ASPOOF: 2
    • T.MEDI: 1
    • T.MEDIAT: 2
    • T.NETWO: 1
    • T.NETWORK_COMPROMISE: 2
    • T.NOAU: 1
    • T.NOAUTH: 2
    • T.VP: 1
    • T.VPN: 2
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 54
    • Cisco Systems, Inc: 6
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-256: 1
  • AES_competition:
    • AES:
      • AES: 14
      • AES-: 1
  • constructions:
    • MAC:
      • HMAC: 5
      • HMAC-SHA-256: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 13
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
    • IKEv1: 1
    • IKEv2: 1
  • IPsec:
    • IPsec: 13
  • SSH:
    • SSH: 12
    • SSHv2: 9
  • TLS:
    • DTLS:
      • DTLS: 11
      • DTLS v1.2: 1
    • TLS:
      • TLS v1.2: 2
      • TLS v1.3: 2
  • VPN:
    • VPN: 20
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
  • PRNG:
    • DRBG: 6
  • RNG:
    • RBG: 3
pdf_data/st_keywords/cipher_mode
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • secp256r1: 7
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • SPA: 5
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 2
  • PKCS:
    • PKCS#1: 3
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 198: 1
  • ISO:
    • ISO/IEC 18031:2011: 6
    • ISO/IEC 18033-3: 1
    • ISO/IEC 19772: 2
  • NIST:
    • SP 800-90A: 2
  • RFC:
    • RFC 6347: 2
    • RFC 791: 1
    • RFC 792: 1
    • RFC 793: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Erasure Tool User Manual v.2.0.6 well as all the hardware associated with the targeted media, are out of scope for the evaluation. YouWipe lists all the detected hardware via its user interface (GUI). The user: 1
    • as well as the hardware of the mobile phone are assumed to be operating correctly and are out of scope of the evaluation. After overwriting step, the data in disk is verified to be overwritten: 1
    • out of scope: 2
  • OutOfScope:
    • Defense (UTD) security features such as IPS, Cisco URL Filtering, AMP, and TLS/SSL proxy. This is out of scope for the evaluation. These services will be disabled by configuration settings. Cisco cEdge Routers: 1
    • UTD) security features such as IPS, Cisco URL Filtering, AMP, and TLS/SSL proxy. This is out of scope for the evaluation: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: f.kirbiyik
  • /CreationDate: D:20200803163651+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20200803163651+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1239579
  • pdf_hyperlinks: https://www.commoncriteriaportal.org/products/#DP
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
  • /Author: conan
  • /CreationDate: D:20241217081136-05'00'
  • /ModDate: D:20241217081136-05'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - Cisco_cEdge_IOS-XE_17.12_SDWAN_20.12_EAL2_ST_v1.2 (1).docx
  • pdf_file_size_bytes: 1976947
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 80
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different