name |
Juniper Networks M/T/J series Routers |
Imperva SecureSphere Version 9.0 |
category |
Network and Network-Related Devices and Systems |
Detection Devices and Systems |
scheme |
UK |
US |
status |
archived |
archived |
not_valid_after |
05.03.2013 |
31.12.2014 |
not_valid_before |
01.04.2007 |
28.12.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP237.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10466-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS%208%201R1%20ST%20v1%200.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10466-st.pdf |
manufacturer |
Juniper Networks, Inc. |
IMPERVA, Inc. |
manufacturer_web |
https://www.juniper.net/ |
https://www.imperva.com/ |
security_level |
EAL3+, ALC_FLR.3 |
ALC_FLR.2, EAL2+ |
dgst |
449de5c1b966be87 |
a27b3d5196e79693 |
heuristics/cert_id |
CRP237 |
CCEVS-VR-10466-2012 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
cpe:2.3:a:imperva:securesphere:9.0.0.5:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2013-4094, CVE-2013-4091, CVE-2013-4095, CVE-2013-4092, CVE-2013-4093 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
CVE-2022-22173, CVE-2022-22238, CVE-2014-0616, CVE-2022-22156, CVE-2023-4481, CVE-2024-39517, CVE-2023-44175, CVE-2023-44201, CVE-2022-22163, CVE-2023-22406, CVE-2021-31362, CVE-2013-7313, CVE-2022-22181, CVE-2013-6014, CVE-2004-0468, CVE-2013-6170, CVE-2023-44184, CVE-2023-36840, CVE-2014-3818, CVE-2024-30397, CVE-2024-39558, CVE-2023-36839, CVE-2024-39555, CVE-2023-22395, CVE-2023-28963, CVE-2022-22244, CVE-2023-44178, CVE-2013-6618, CVE-2022-22245, CVE-2021-31372, CVE-2023-44176, CVE-2022-22215, CVE-2023-36842, CVE-2023-44177, CVE-2022-22242, CVE-2014-0613, CVE-2023-44182, CVE-2024-39549, CVE-2023-44197, CVE-2022-22214, CVE-2022-22243, CVE-2014-0615, CVE-2019-0036, CVE-2022-22241, CVE-2022-22197, CVE-2022-22224, CVE-2023-44194, CVE-2022-22246, CVE-2024-30380, CVE-2024-39514, CVE-2023-28964, CVE-2022-22162, CVE-2024-39511, CVE-2023-28975, CVE-2024-39528, CVE-2023-28979, CVE-2013-4689, CVE-2023-36843, CVE-2023-22407, CVE-2023-44185, CVE-2023-44186, CVE-2024-39556, CVE-2023-22391, CVE-2013-4686, CVE-2023-28962, CVE-2024-21591, CVE-2004-0230, CVE-2022-22220, CVE-2022-22208, CVE-2024-21594, CVE-2014-2714, CVE-2023-36841, CVE-2014-2712 |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ATE_FUN.1, AVA_MSU.1, AVA_VLA.1, AGD_ADM.1, ATE_IND.2, ATE_COV.2, AGD_USR.1, AVA_SOF.1, ATE_DPT.1, ADV_RCR.1, ADV_HLD.2, ALC_DVS.1, ALC_FLR.3 |
ASE_CCL.1, ATE_IND.2, AGD_OPE.1, ALC_CMC.2, ASE_REQ.2, ATE_COV.1, ALC_DEL.1, ASE_SPD.1, ASE_INT.1, AGD_PRE.1, ADV_ARC.1, ADV_TDS.1, ASE_OBJ.2, ALC_FLR.2, ASE_ECD.1, ALC_CMS.2, ASE_TSS.1, ATE_FUN.1, ADV_FSP.2, AVA_VAN.2 |
heuristics/extracted_versions |
- |
9.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
CRP248 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
CRP258, CRP248 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Wireless Monitoring
- certification_date: 28.12.2012
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 28.12.2014
- id: CCEVS-VR-VID10466
- product: Imperva SecureSphere Version 9.0
- scheme: US
- url: https://www.niap-ccevs.org/product/10466
- vendor: Imperva Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
44cdd911811b36d2 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP237.pdf |
st_vid10466-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-10466-2012
- cert_item: For Imperva SecureSphere 9.0
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 1
- EAL3 augmented: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 4
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CRYPTO: 1
- A.EAUTH: 1
- A.LOCATE: 1
- A.NOEVIL: 1
- A.TIME: 1
|
- A:
- A.ACCESS: 1
- A.ASCOPE: 1
- A.DYNMIC: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.PROTCT: 1
- T:
- T.COMDIS: 1
- T.COMINT: 1
- T.FACCNT: 1
- T.FALACT: 1
- T.FALASC: 1
- T.FALREC: 1
- T.IMPCON: 1
- T.INADVE: 1
- T.INFLUX: 1
- T.LOSSOF: 1
- T.MISACT: 1
- T.MISUSE: 1
- T.NOHALT: 1
- T.PRIVIL: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2005-08-001: 1
- CCIMB-2005-08-002: 1
- CCIMB-2005-08-003: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: leithe
- /CreationDate: D:20070503115940Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20070514111611+01'00'
- /Producer: GPL Ghostscript 8.15
- /Title: Microsoft Word - LFS T532 CR 10.doc
- pdf_file_size_bytes: 654197
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /Author: Pierre, Marie Evencie
- /CreationDate: D:20130117113424
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130117113424
- /Producer: Microsoft® Office Word 2007
- /Title: National Information Assurance Partnership
- pdf_file_size_bytes: 309499
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
JUNOS 8 1R1 ST v1 0.pdf |
st_vid10466-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 1
- EAL 3 augmented: 1
- EAL3: 7
- EAL3 augmented: 5
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 2
- ALC:
- ALC_DVS.1: 2
- ALC_FLR.3: 10
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.1: 2
- ADV_FSP.2: 9
- ADV_TDS.1: 6
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 3
- ALC_DEL.1: 2
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 6
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 3
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 5
- ATE_FUN.1: 5
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 7
- FAU_ARP.1.1: 1
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAA.1: 7
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF.1: 11
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ROL.1: 7
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 2
- FIA_UID.1: 1
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 16
- FMT_MOF.1: 2
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 41
- FMT_MTD.1: 6
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FPT:
- FPT_RVM.1: 7
- FPT_RVM.1.1: 1
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_TSE.1: 7
- FTA_TSE.1.1: 1
- FTP:
|
- FAU:
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_SEL.1: 7
- FAU_SEL.1.1: 2
- FAU_STG.1: 2
- FAU_STG.2: 9
- FAU_STG.2.1: 2
- FAU_STG.2.2: 5
- FAU_STG.2.3: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 18
- FCS_CKM.1.1: 1
- FCS_CKM.2: 11
- FCS_CKM.2.1: 1
- FCS_CKM.4: 18
- FCS_CKM.4.1: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FIA_AFL.1: 5
- FIA_ATD.1: 6
- FIA_ATD.1.1: 2
- FIA_UAU.1: 2
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 11
- FMT_MOF.1.1: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITA.1: 4
- FPT_ITC.1: 4
- FPT_ITI.1: 4
- FPT_ITT: 1
- FPT_ITT.1: 11
- FPT_ITT.1.1: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTP:
- FTP_TRP.1: 10
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CRYPTO: 4
- A.EAUTH: 2
- A.LOCATE: 4
- A.NOEVIL: 3
- A.TIME: 4
- O:
- O.ACCESS: 16
- O.AMANAGE: 18
- O.AUDIT: 17
- O.EADMIN: 9
- O.EAL: 6
- O.FLOW: 12
- O.MANAGE: 1
- O.PROTECT: 19
- O.ROLBAK: 4
- OE:
- OE.ADMIN: 3
- OE.CRYPTO: 4
- OE.EAUTH: 4
- OE.PHYSICAL: 3
- OE.TIME: 4
- T:
- T.CONFLOSS: 5
- T.MANDAT: 4
- T.NOAUDIT: 2
- T.OPS: 7
- T.PRIVIL: 7
- T.ROUTE: 10
- T.THREAT: 4
|
- A:
- A.ACCESS: 1
- A.ASCOPE: 2
- A.DYNMIC: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NOEVIL: 2
- A.NOTRST: 1
- A.PROTCT: 1
- O:
- O.ACCESS: 6
- O.AUDITS: 1
- O.AUDIT_PROTECTION: 3
- O.AUDIT_SORT: 5
- O.EADMIN: 2
- O.EXPORT: 3
- O.IDANLZ: 1
- O.IDAUTH: 2
- O.IDSCAN: 1
- O.IDSENS: 3
- O.INTEGR: 5
- O.OFLOWS: 3
- O.PROTCT: 8
- O.RESPON: 3
- OE:
- OE.AUDIT_PROTECTION: 2
- OE.AUDIT_SORT: 2
- OE.CREDEN: 1
- OE.INSTAL: 2
- OE.INTROP: 3
- OE.PERSON: 1
- OE.PHYCAL: 1
- OE.TIME: 1
- T:
- T.COMDIS: 1
- T.COMINT: 1
- T.FACCNT: 1
- T.FALACT: 1
- T.FALASC: 1
- T.FALREC: 1
- T.IMPCON: 1
- T.INADVE: 1
- T.INFLUX: 1
- T.LOSSOF: 1
- T.MISACT: 1
- T.MISUSE: 1
- T.NOHALT: 1
- T.PRIVIL: 1
- T.SCNCFG: 1
- T.SCNMLC: 1
- T.SCNVUL: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-004: 1
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 9
- FIPS 180-2: 2
- FIPS 186-2: 5
- FIPS 197: 1
- FIPS PUB 180-2: 2
- FIPS PUB 186-2: 2
- FIPS PUB 197: 4
- PKCS:
- RFC:
- RFC 0959: 1
- RFC 1215: 1
- RFC 1813: 1
- RFC 2246: 3
- RFC 2616: 1
- RFC 2818: 1
- RFC 2821: 1
- RFC 3164: 1
- RFC 3447: 1
- RFC 4251: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- accidental or deliberate corruption via use of digitally signed binaries. 2.4.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: • All: 1
- out of scope: 2
- prior to any exchange. This covers all services used to exchange information, including telnet (out of scope), SSH, SSL, and FTP 1 . Authentication services can be handled either internally (user selected: 1
|
|
pdf_data/st_metadata |
- /Author: CESG
- /CreationDate: D:20070420105539Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120106151752Z
- /Producer: GPL Ghostscript 8.15
- /Subject: Security Target for Juniper Networks M/T/J Series Families of Service Routers running JUNOS 8.1R1
- /Title: JUNOS 8.1R1 ST v1_0.doc
- pdf_file_size_bytes: 231235
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 41
|
- /Author: Nir Naaman
- /Company: Imperva Inc.
- /CreationDate: D:20121108122221+02'00'
- /Creator: Acrobat PDFMaker 7.0.5 for Word
- /DOC: ST
- /Keywords: IDS/IPS, Web application firewall, database security gateway, Web Services security, file security, intrusion detection, dynamic profiling
- /ModDate: D:20121108122246+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Revision: 0.8
- /Subject: Security Target
- /TOE: SecureSphere 9.0
- /Title: Imperva SecureSphere 9.0
- /build number: 9.0.0.5_0
- /documentDate: 9/19/2012
- /longDate: September 19, 2012
- pdf_file_size_bytes: 769939
- pdf_hyperlinks: http://www.ietf.org/rfc/rfc1215.txt, http://www.ietf.org/rfc/rfc2821.txt, http://csrc.nist.gov/publications/fips/archive/fips186-2/fips186-2-change1.pdf, http://www.ietf.org/rfc/rfc4251.txt, http://www.ietf.org/rfc/rfc0959.txt, http://www.ietf.org/rfc/rfc1813.txt, http://www.ietf.org/rfc/rfc2616.txt, http://www.ietf.org/rfc/rfc3164.txt, http://www.ietf.org/rfc/rfc2246.txt, http://www.ietf.org/rfc/rfc2818.txt
- pdf_is_encrypted: False
- pdf_number_of_pages: 86
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |