Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Tarantella Enterprise 3 Version 3.40.911 with Tarantella Security Pack, Version 3.41.211
CRP214
Cisco IronPort S-Series Web Security Appliance (WSA) (S160, S360, S660) running AsyncOS 5.6.1
CCEVS-VR-VID-10244-2009
name Tarantella Enterprise 3 Version 3.40.911 with Tarantella Security Pack, Version 3.41.211 Cisco IronPort S-Series Web Security Appliance (WSA) (S160, S360, S660) running AsyncOS 5.6.1
category Access Control Devices and Systems Data Protection
scheme UK US
not_valid_after 05.03.2013 08.05.2014
not_valid_before 13.05.2005 20.10.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP214.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10244-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Tarantella_V2.4.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10244-st.pdf
manufacturer Tarantella LTD Cisco Systems, Inc.
manufacturer_web https://www.tarantella.com https://www.cisco.com
dgst 3db22e4de890393a 8511bb9ced036323
heuristics/cert_id CRP214 CCEVS-VR-VID-10244-2009
heuristics/cert_lab [] US
heuristics/extracted_sars ALC_DVS.1, ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1
heuristics/extracted_versions 3.40.911, 3.41.211 5.6.1
heuristics/scheme_data
  • category: Wireless Monitoring
  • certification_date: 22.10.2009
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 22.10.2011
  • id: CCEVS-VR-VID10244
  • product: Cisco IronPort S-Series Web Security Appliance (WSA) (S160, S360, S660) running AsyncOS 5.6.1
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10244
  • vendor: Cisco Systems, Inc.
pdf_data/report_filename CRP214.pdf st_vid10244-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10244-2009
    • cert_item: Cisco IronPort S-Series Web Security Appliance (WSA) (S160, S360, S660) running AsyncOS 5.6.1
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • UK:
    • CERTIFICATION REPORT No. P214: 1
  • US:
    • CCEVS-VR-VID10244-2009: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 1
    • EAL2: 16
    • EAL7: 1
  • EAL:
    • EAL 2: 12
    • EAL 4: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ACC.2: 1
    • FDP_ACF.1: 1
  • FMT:
    • FMT_MSA.1: 1
  • FTP:
    • FTP_ITC: 4
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 1
    • Microsoft Corporation: 1
  • Cisco:
    • Cisco: 25
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • TLS:
    • TLS:
      • TLS: 5
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-2004-01-001: 1
    • CCIMB-2004-01-002: 1
    • CCIMB-2004-01-003: 1
  • FIPS:
    • FIPS 140-2: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Solaris 8. Users should note that these Application Servers and the communications with them are out of scope of the evaluation. 6. Users login to the Tarantella Server via a web browser and are then presented: 1
    • The evaluated configuration is as illustrated in the diagram above although the firewall shown is out of scope. The product can be used in more complex network environments. These network configurations, which: 1
    • out of scope: 2
pdf_data/report_metadata
  • /Author: racook
  • /CreationDate: D:20050526142837Z
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20131204151607Z
  • /Producer: Acrobat Distiller 5.0 (Windows)
  • /Title: Microsoft Word - LFL_T206_Tarantella_CertRep_10.doc
  • pdf_file_size_bytes: 667201
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
  • /Author: Evaluation Team
  • /CreationDate: D:20091112222418
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: VR
  • /ModDate: D:20091112222418
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Validator Report
  • /Title: Validation Report for Cisco IronPort WSA
  • pdf_file_size_bytes: 514042
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename Tarantella_V2.4.pdf st_vid10244-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 6
  • EAL:
    • EAL 2: 10
    • EAL2: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.1: 1
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_SOF.1: 1
    • AVA_VLA.1: 2
  • ACM:
    • ACM_CAP: 1
    • ACM_CAP.2: 21
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.1: 7
    • ADO_IGS: 1
    • ADO_IGS.1: 6
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 20
    • ADV_HLD: 1
    • ADV_HLD.1: 15
    • ADV_RCR: 1
    • ADV_RCR.1: 8
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 18
    • AGD_USR: 1
    • AGD_USR.1: 14
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 6
    • ATE_FUN: 1
    • ATE_FUN.1: 13
    • ATE_IND: 1
    • ATE_IND.2: 9
  • AVA:
    • AVA_SOF: 1
    • AVA_SOF.1: 8
    • AVA_VLA: 1
    • AVA_VLA.1: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 3
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 2
    • FAU_SAR.1: 2
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 2
    • FAU_SAR.3: 3
    • FAU_SAR.3.1: 2
    • FAU_STG.1: 4
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
  • FCS:
    • FCS_COP.1: 3
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 2
    • FDP_ACC.2: 6
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 2
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_ITC.1: 3
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.2: 2
    • FDP_RIP.2.1: 4
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 2
    • FIA_UID.1: 2
    • FIA_UID.2: 7
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MSA.1: 3
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 1
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_ITC: 3
    • FPT_ITC.2: 1
    • FPT_ITT.1: 3
    • FPT_ITT.1.1: 2
    • FPT_ITT.3: 2
    • FPT_ITT.3.1: 2
    • FPT_ITT.3.2: 2
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC: 6
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_SAR: 10
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 5
    • FAU_SAR.3.1: 1
    • FAU_SEL: 4
    • FAU_SEL.1: 5
    • FAU_SEL.1.1: 1
    • FAU_STG: 11
    • FAU_STG.1: 1
    • FAU_STG.2: 5
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 1
  • FIA:
    • FIA_AFL.1: 2
    • FIA_ATD: 3
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID: 4
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 5
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MTD: 26
    • FMT_MTD.1: 7
    • FMT_SMF: 7
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR: 3
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITA.1: 2
    • FPT_ITC: 1
    • FPT_ITC.1: 1
    • FPT_ITI: 3
    • FPT_ITI.1: 6
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_RVM: 4
    • FPT_RVM.1: 5
    • FPT_RVM.1.1: 1
    • FPT_SEP: 7
    • FPT_SEP.1: 5
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM: 3
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.AUTH: 2
    • A.CERTIFICATE: 3
    • A.CONFIG: 2
    • A.CONNECT: 2
    • A.PHYSICAL: 2
    • A.USER: 2
  • O:
    • O.ADMIN: 4
    • O.AUDIT: 5
    • O.AUTH_SERVER: 4
    • O.DAC: 8
    • O.SECURE_ENCRYPTION: 4
    • O.TPATH: 8
  • OE:
    • OE.ACCOUNT: 5
    • OE.AUDMAN: 3
    • OE.AUDREC: 4
    • OE.AUTHDATA: 4
    • OE.INSTALL: 9
    • OE.KEYMGMT: 9
    • OE.OSAUTH: 4
    • OE.OSCONFIG: 3
    • OE.OSKEYS: 10
  • OSP:
    • OSP.CRYPTO: 2
  • T:
    • T.CHANNEL: 3
    • T.EXCEED: 3
    • T.MISDIRECT: 3
    • T.UNAUTH: 3
  • A:
    • A.ACCESS: 3
    • A.ASCOPE: 3
    • A.DYNMIC: 3
    • A.LOCATE: 3
    • A.MANAGE: 3
    • A.NOEVIL: 3
    • A.NOTRST: 2
    • A.NOTRUST: 1
    • A.PROTCT: 3
  • O:
    • O.ACCESS: 13
    • O.AUDITS: 8
    • O.CREDEN: 4
    • O.EADMIN: 4
    • O.EXPORT: 2
    • O.IDANLZ: 6
    • O.IDAUTH: 19
    • O.IDSCAN: 7
    • O.IDSENS: 10
    • O.IMPORT: 6
    • O.INSTAL: 4
    • O.INTEGR: 8
    • O.INTROP: 4
    • O.OFLOWS: 7
    • O.PERSON: 7
    • O.PHYCAL: 8
    • O.PROTCT: 11
    • O.RESPON: 6
  • OE:
    • OE.PROTECT: 1
  • T:
    • T.COMDIS: 3
    • T.COMINT: 3
    • T.FACCNT: 3
    • T.FALACT: 3
    • T.FALASC: 3
    • T.FALREC: 3
    • T.IMPCON: 3
    • T.INADVE: 3
    • T.INFLUX: 3
    • T.LOSSOF: 3
    • T.MISACT: 3
    • T.MISUSE: 3
    • T.NOHALT: 3
    • T.PRIVIL: 3
    • T.SCNCFG: 3
    • T.SCNMLC: 3
    • T.SCNVUL: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Cisco:
    • Cisco: 10
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
  • SHA:
    • SHA1:
      • SHA1: 3
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 8
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-2004-01-001: 1
    • CCIMB-2004-01-002: 1
    • CCIMB-2004-01-003: 1
  • FIPS:
    • FIPS 140-2: 2
    • FIPS140-2: 2
  • RFC:
    • RFC 2246: 2
  • X509:
    • X.509: 6
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Note that these application servers and the communications with them (RDP/SSH/X11) are out of scope: 1
    • out of scope: 1
    • server. (Note that these application servers and the communications with them (RDP/SSH/X11) are out of scope). Evaluation of Tarantella Enterprise 3 Tarantella Enterprise 3 Security Target/Issue 2.4 11 April: 1
pdf_data/st_metadata
  • /Author: griffinh@griffinh
  • /CreationDate: D:20050411140335+00'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20050411141010
  • /Producer: Jaws PDF Creator v2.11.1164
  • /Title: Microsoft Word - T206-ST.doc
  • pdf_file_size_bytes: 384411
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
  • /Author: SAIC CCTL Team
  • /CreationDate: D:20091112195947
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20091112195947
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: IronPort Web Security Appliance (WSA), S-Series (S350, S650, S1050) running AsyncOS 5.0 for web Security Target
  • pdf_file_size_bytes: 1046144
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different