name |
CENTAGATE v3.010-build13 |
Cisco Aggregation Services Router (ASR) 1000 Series running IOS XE version 2.4.2t |
category |
Other Devices and Systems |
Boundary Protection Devices and Systems |
scheme |
MY |
US |
status |
archived |
archived |
not_valid_after |
06.06.2022 |
01.11.2014 |
not_valid_before |
06.06.2017 |
27.06.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C072-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10361-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-05-08-CTG-ST-3.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10361-st.pdf |
manufacturer |
SecureMetric Technology Sdn Bhd |
Cisco Systems, Inc. |
manufacturer_web |
https://www.securemetric.com/ |
https://www.cisco.com |
security_level |
EAL4+, ALC_FLR.2 |
EAL4+, ALC_FLR.2 |
dgst |
4149b933ed4230dd |
4faedf83e4faff5c |
heuristics/cert_id |
ISCB-3-RPT-C072-CR-v1 |
CCEVS-VR-10361-2011 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FRL.2, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
AGD_USR.1, ALC_CMC.4, ALC_TAT.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, ADV_INT.1, ALC_CSC.4, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ADV_IMP.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ATE_COV.3 |
heuristics/extracted_versions |
3.010 |
2.4.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Firewall, Router, Virtual Private Network
- certification_date: 27.06.2011
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10361
- product: Cisco Aggregation Services Router (ASR) 1000 Series running IOS XE version 2.4.2t
- scheme: US
- url: https://www.niap-ccevs.org/product/10361
- vendor: Cisco Systems, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ISCB-5-RPT-C072-CR-v1.pdf |
st_vid10361-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-10361-2011
- cert_item: Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Aggregation Services Router (ASR) 1000 Series
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-3-RPT-C072-CR-v1: 28
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL4: 5
- EAL4 augmented: 1
- EAL4+: 4
|
- EAL:
- EAL 4: 9
- EAL 4 augmented: 2
- EAL4: 2
- EAL4 augmented: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 1
- FCS_COP.1: 4
- FPT:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 103
- Cisco Systems: 2
- Cisco Systems, Inc: 2
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- OTP Hardware token, where this is out of the evaluation. SMS service to register the device is also out of scope. 18 Potential consumers of the TOE are advised that some functions and services may not have been: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
- /Author: ISCB Department
- /CreationDate: D:20170720054033+00'00'
- /Creator: Microsoft Word
- /Keywords: MyCB_TMP_002
- /ModDate: D:20170720054033+00'00'
- /Subject: CENTAGATE v3.0.10-build13
- /Title: C072 Certification Report
- pdf_file_size_bytes: 649341
- pdf_hyperlinks: http://www.cybersecurity.my/mycc, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
- /Author: Tammy Compton
- /CreationDate: D:20110706125258
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110706125258
- /Producer: Microsoft® Office Word 2007
- /Title: Validation Report for N7K
- pdf_file_size_bytes: 315972
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
2017-05-08-CTG-ST-3.0.pdf |
st_vid10361-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 3
- EAL4 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 2
- ALC_FRL.2: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 19
- ADV_FSP.4: 3
- ADV_IMP.1: 3
- ADV_IMP.2: 2
- ADV_INT.1: 1
- ADV_TDS.3: 11
- AGD:
- AGD_OPE.1: 10
- AGD_PRE.1: 8
- AGD_USR.1: 2
- ALC:
- ALC_CMC.4: 6
- ALC_CMS.4: 5
- ALC_CSC.4: 1
- ALC_DEL.1: 5
- ALC_DVS.1: 6
- ALC_FLR.2: 9
- ALC_LCD.1: 6
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 4
- ATE_COV.3: 3
- ATE_DPT: 1
- ATE_DPT.1: 7
- ATE_FUN.1: 5
- ATE_IND.2: 5
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 3
- FAU_ARP.1: 5
- FAU_ARP.1.1: 1
- FAU_GEN: 2
- FAU_GEN.1: 10
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_SAA: 1
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAA.2: 6
- FAU_SAA.2.1: 1
- FAU_SAA.2.2: 1
- FAU_SAA.2.3: 1
- FAU_SAR: 2
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 3
- FAU_SAR.2.1: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 3
- FIA_UAU.2.1: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
|
- FAU:
- FAU_ARP: 4
- FAU_ARP.1: 9
- FAU_ARP.1.1: 1
- FAU_ARP_ACK.1: 1
- FAU_GEN: 5
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAA: 5
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 14
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_SAR.3: 10
- FAU_SAR.3.1: 1
- FAU_SEL: 3
- FAU_SEL.1: 8
- FAU_SEL.1.1: 1
- FAU_STG: 3
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 2
- FAU_STG.3: 8
- FAU_STG.3.1: 1
- FAU_UAU.1: 1
- FAU_UID.2: 1
- FCS:
- FCS_CKM.1: 45
- FCS_CKM.1.1: 2
- FCS_CKM.2: 13
- FCS_CKM.2.1: 1
- FCS_CKM.4: 31
- FCS_CKM.4.1: 1
- FCS_COP.1: 57
- FCS_COP.1.1: 5
- FDP:
- FDP_ACC.1: 4
- FDP_ACF.1: 1
- FDP_IFC: 1
- FDP_IFC.1: 51
- FDP_IFC.1.1: 3
- FDP_IFF: 1
- FDP_IFF.1: 41
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 4
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_IFF.1.6: 3
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.2: 12
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 3
- FIA_ATD.1: 17
- FIA_ATD.1.1: 2
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UID.1: 3
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FIA_USB.1: 12
- FMT:
- FMT_MOF.1: 76
- FMT_MOF.1.1: 8
- FMT_MSA: 1
- FMT_MSA.1: 28
- FMT_MSA.1.1: 3
- FMT_MSA.2: 3
- FMT_MSA.3: 29
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_MTD.1: 48
- FMT_MTD.1.1: 4
- FMT_MTD.2: 28
- FMT_MTD.2.1: 3
- FMT_MTD.2.2: 3
- FMT_REV.1: 10
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SMF.1: 32
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.2: 34
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ITA.1: 9
- FPT_ITA.1.1: 1
- FPT_ITC.1: 9
- FPT_ITC.1.1: 1
- FPT_ITI.1: 9
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_RCV.1: 10
- FPT_RCV.1.1: 1
- FPT_RCV.2: 9
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
- FPT_RPL.1: 11
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_RSA.1: 1
- FPT_STM.1: 15
- FPT_STM.1.1: 1
- FPT_TDC.1: 6
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TRP: 1
- FPT_TST: 1
- FPT_TST.1: 26
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FRU_RSA.1: 28
- FRU_RSA.1.1: 2
- FTA:
- FTA_SSL: 2
- FTA_SSL.1: 11
- FTA_SSL.1.1: 2
- FTA_SSL.1.2: 2
- FTA_SSL.2: 8
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTA_TAB.1: 9
- FTA_TAB.1.1: 1
- FTA_TSE.1: 7
- FTA_TSE.1.1: 3
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 41
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 5
- FTP_TRP.1: 37
- FTP_TRP.1.1: 5
- FTP_TRP.1.2: 5
- FTP_TRP.1.3: 6
|
pdf_data/st_keywords/cc_claims |
- A:
- A.COMPENT_ADMIN: 1
- A.COMPENT_ADMINSTRATORS: 1
- A.FIREWALL: 2
- A.MAIL_SERVER: 2
- A.MALICIOUS_CODE: 1
- A.NO_EVIL: 2
- A.OPERATING_SYSTEM: 1
- A.PORT_PROTECT: 2
- A.TIME_STAMP: 2
- D:
- O:
- O.ALERT: 6
- O.AUDIT: 7
- O.AUTH_MECH: 8
- O.MOBILE_SENSITVE: 2
- O.MOBILE_SENSITVE_: 1
- O.MOBILE_SENSITVE_PROTECTION: 5
- O.TRAFFIC_PROTECTION: 23
- O.USER_ACC: 1
- O.USER_ACC_CONTROL: 19
- OE:
- OE.COMPENT_: 1
- OE.COMPENT_ADMINSTRATORS: 1
- OE.FIREWALL: 2
- OE.MAIL_SERVER: 2
- OE.MALICIOUS_CODE_N: 1
- OE.MALICIOUS_CODE_NOT_SIGN: 1
- OE.NO_EVIL: 2
- OE.OPERATING_SYSTEM: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.PORT_PROTECT: 2
- OE.TIME_STAMP: 2
- T:
- T.CUMMUNICATION: 1
- T.CUMMUNICATION_ATTACK: 1
- T.DATA_ACCESS: 2
- T.MOBILE: 1
- T.MOBILE_ATTACK: 1
- T.USER_ACC_CONTROL: 1
- T.WEB_ATTACK: 2
|
- A:
- A.AVAILABILI: 1
- A.AVAILABILITY: 2
- A.NO_GENER: 1
- A.NO_GENERAL_PURPOSE: 2
- A.NO_TOE_BY: 1
- A.NO_TOE_BYPASS: 2
- A.PHYSICAL: 3
- O:
- O.ADMIN_ROLE: 6
- O.AUDIT_GENER: 1
- O.AUDIT_GENERAT: 1
- O.AUDIT_GENERATION: 4
- O.AUDIT_PROTEC: 1
- O.AUDIT_PROTECT: 1
- O.AUDIT_PROTECTION: 3
- O.AUDIT_REVIE: 1
- O.AUDIT_REVIEW: 4
- O.CHANGE_MAN: 2
- O.CHANGE_MANA: 1
- O.CHANGE_MANAGEMENT: 4
- O.CORRECT_: 6
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPH: 4
- O.CRYPTOGRAPHIC: 1
- O.CRYPTOGRAPHIC_: 2
- O.CRYPTOGRAPHIC_FUNCTIONS: 4
- O.CRYPTOGRAPHY: 1
- O.CRYPTOGRAPHY_: 2
- O.CRYPTOGRAPHY_VALIDATED: 1
- O.DISPLAY_BAN: 2
- O.DISPLAY_BANNE: 1
- O.DISPLAY_BANNER: 4
- O.DOCUMENT_KEY_LEAKAGE: 1
- O.FUNCTIONAL_TESTING: 1
- O.HA: 5
- O.INTEGRITY: 5
- O.MAINT_MODE: 6
- O.MANAGE: 6
- O.MANAGE_INFO: 1
- O.MANAGE_INFOR: 1
- O.MEDIATE: 7
- O.MEDIATE_INFO: 2
- O.MEDIATE_INFOR: 1
- O.MEDIATE_INFORMATION_FLOW: 2
- O.PEER_AUTHEN: 1
- O.PEER_AUTHENTI: 1
- O.PEER_AUTHENTICATION: 4
- O.PEER_AUTHENTICTION: 2
- O.PROTECT_IN_T: 1
- O.PROTECT_IN_TR: 1
- O.PROTECT_IN_TRANSIT: 3
- O.PROTOCOLS: 5
- O.REPLAY_DETE: 1
- O.REPLAY_DETECT: 1
- O.REPLAY_DETECTION: 5
- O.RESIDUAL_INF: 6
- O.RESIDUAL_INFO: 1
- O.RESIDUAL_INFORMATION: 8
- O.RESOURCE_SH: 1
- O.RESOURCE_SHA: 1
- O.RESOURCE_SHARING: 3
- O.ROBUST_ADMI: 2
- O.ROBUST_ADMIN_: 1
- O.ROBUST_ADMIN_GUIDANCE: 2
- O.ROBUST_TOE_: 4
- O.ROBUST_TOE_AC: 1
- O.ROBUST_TOE_ACCESS: 8
- O.SELF_PROTECT: 3
- O.SELF_PROTECTIO: 1
- O.SELF_PROTECTION: 5
- O.SOUND_DESIG: 2
- O.SOUND_DESIGN: 6
- O.SOUND_IMPLE: 1
- O.SOUND_IMPLEM: 1
- O.SOUND_IMPLEMENTATION: 3
- O.THOROUGH_: 1
- O.THOROUGH_FU: 2
- O.THOROUGH_FUNCTIONAL_: 2
- O.THOROUGH_FUNCTIONAL_TESTING: 2
- O.TIME_STAMPS: 4
- O.TRUSTED_PAT: 4
- O.TRUSTED_PATH: 7
- O.USER_GUIDAN: 2
- O.USER_GUIDANCE: 6
- O.VULNERABILIT: 4
- O.VULNERABILITY: 1
- O.VULNERABILITY_ANALYSIS_TEST: 7
- OE:
- OE.AVAILABILITY: 2
- OE.CRYPTANALYTIC: 4
- OE.NO_GENERAL_PURPO: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_TOE_BYPASS: 2
- OE.PHYSICAL: 2
- T:
- T.ADDRESS_M: 1
- T.ADDRESS_MASQUERADE: 2
- T.ADMIN_ERR: 1
- T.ADMIN_ERROR: 3
- T.ADMIN_ROG: 1
- T.ADMIN_ROGUE: 3
- T.AUDIT_: 1
- T.AUDIT_COMPROMISE: 2
- T.CRYPTO_: 1
- T.CRYPTO_COMPROMISE: 3
- T.EAVESDROP: 3
- T.FLAWED_DE: 1
- T.FLAWED_DESIGN: 2
- T.FLAWED_IM: 1
- T.FLAWED_IMPLEMENTATION: 2
- T.MALICIOUS_: 1
- T.MALICIOUS_TSF_: 2
- T.MASQUERA: 1
- T.MASQUERADE: 2
- T.NORECOVER: 1
- T.NORECOVERY: 3
- T.POOR_TEST: 3
- T.REPLAY: 3
- T.RESIDUAL_D: 1
- T.RESIDUAL_DATA: 2
- T.RESOURCE_: 1
- T.RESOURCE_EXHAUSTION: 2
- T.SPOOFING: 3
- T.UNATTENDE: 1
- T.UNATTENDED_SESSION: 2
- T.UNAUTHORI: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_PEER: 2
- T.UNIDENTIFI: 1
- T.UNIDENTIFIED_ACTIONS: 2
- T.UNKNOWN_: 1
- T.UNKNOWN_STATE: 2
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 141
- Cisco Systems, Inc: 2
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 38
- FIPS 180-2: 1
- FIPS PUB 140-2: 5
- NIST:
- NIST SP 800-56: 2
- NIST SP 800-57: 3
- SP 800-56: 2
- PKCS:
- PKCS#1: 2
- PKCS#12: 1
- PKCS#7: 2
- RFC:
- RFC 2404: 1
- RFC 2406: 5
- RFC 2409: 7
- RFC 2560: 1
- RFC 3280: 1
- RFC 3457: 4
- RFC 3547: 3
- RFC 792: 1
- RFC2409: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Out of Scope: 1
- issuer certificate validity, certificate status, and the certificate owner Mobile audio pass (Out of Scope) TOE will generate challenge and PKI certificate will be used to sign the challenge. The signature: 1
- out of scope: 5
- procedure. Table 21: Authentication Components Authentication Method of authentication PKI token (out of scope) The user prompted to select the valid certificate from the list, and then TOE will verify the: 1
- serial number / fingerprint that stored in the DB. Hardware CR OTP (out of scope) User needs to have CR OTP token to use this feature. User will request for a challenge from the: 1
- then be sent back to the TOE by the mobile application and verified for its validity. FIDO (out of scope) User need to plugged in the token then click on the button of the token to submit the validation: 1
- token. This is out of the scope of the evaluation. Also, using SMS to register the device is also out of scope of evaluation. SecureMetric Technology Sdn Bhd 2016 Page 17 of 76 For QR code registration: 1
- which will then be used by the user to generate the OTP. Hardware OTP (out of scope) User needs to have OTP token to use this feature. User will generate an OTP from the OTP token and: 1
|
|
pdf_data/st_metadata |
- /Author: Rajiv;Biau
- /CreationDate: D:20170523024954+00'00'
- /Creator: Microsoft Word
- /Keywords: ST
- /ModDate: D:20170720134505+08'00'
- /Title: Centagat Security Target
- pdf_file_size_bytes: 1592329
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 76
|
- /Author: Cisco
- /CreationDate: D:20110706125434
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110706125434
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 1521286
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 133
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |