Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series
None
Infoblox Trinzic Appliances with NIOS v6.3
CCEVS-VR-VID-10465-2012
name RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series Infoblox Trinzic Appliances with NIOS v6.3
category Boundary Protection Devices and Systems Network and Network-Related Devices and Systems
scheme TR US
not_valid_after 27.03.2017 31.12.2014
not_valid_before 15.03.2013 17.12.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20CERTIFICATION%20REPORT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10465-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20ST-%20v0.9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10465-st.pdf
manufacturer RIOREY Incorporated Infoblox Incorporated
manufacturer_web https://www.riorey.com/ https://www.infoblox.com/
security_level EAL4+, ALC_FLR.1 EAL2+, ALC_DVS.1, ALC_FLR.2
dgst 53265b9d283d6074 dace4f90d0d3acff
heuristics/cert_id CCEVS-VR-VID-10465-2012
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ALC_DVS.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_DEL.1, ALC_CMC.2, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1
heuristics/extracted_versions - 6.3
heuristics/scheme_data
  • category: Network Device
  • certification_date: 17.12.2012
  • evaluation_facility: DXC.technology
  • expiration_date: 17.12.2014
  • id: CCEVS-VR-VID10465
  • product: Infoblox Trinzic Appliances with NIOS v6.3
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10465
  • vendor: Infoblox Inc.
pdf_data/report_filename RioRey CERTIFICATION REPORT.pdf st_vid10465-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10465-2012
    • cert_item: Infoblox Trinzic Appliances with NIOS v6.3 (Models: IB-810, IB-820, IB-1400, IB-1410, IB-1420, IB-2200, IB-2210, IB-2220, IB-4000 and IB-4010
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10465-2012: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4+: 5
    • EAL4: 1
    • EAL4+: 1
  • EAL:
    • EAL 2: 4
    • EAL 2 augmented: 2
    • EAL 4: 1
    • EAL2: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ALC:
    • ALC_DVS.1: 4
    • ALC_FLR.2: 4
  • ATE:
    • ATE_IND: 1
pdf_data/report_keywords/cc_sfr
  • FRU:
    • FRU_DDOS_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_metadata
  • /Author: Tse
  • /CreationDate: D:20130318153433-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130318153433-04'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 1
  • pdf_file_size_bytes: 511380
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Author: Evaluation Team
  • /CreationDate: D:20121226131335
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: VR
  • /ModDate: D:20121226131335
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Validator Report
  • /Title: Validation Report for IronPort Messaging Gateway
  • pdf_file_size_bytes: 363166
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename RioRey ST- v0.9.pdf st_vid10465-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 2
    • EAL2+: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 5
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 5
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.1: 1
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 8
    • ALC_FLR.2: 8
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 3
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 13
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 12
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FAU:
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 7
    • FAU_STG.3.1: 2
    • FAU_STG_EXT.1: 2
    • FAU_STG_EXT.3: 2
    • FAU_UID.1: 1
  • FCS:
    • FCS_CKM.1: 17
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 8
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 27
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 35
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 5
    • FCS_TLS_EXT: 7
    • FCS_TLS_EXT.1: 11
    • FCS_TLS_EXT.1.1: 2
  • FDP:
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.2: 6
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_PMG_EXT: 1
    • FIA_PMG_EXT.1: 10
    • FIA_PMG_EXT.1.1: 2
    • FIA_UAU.1: 8
    • FIA_UAU.5: 1
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 1
    • FIA_UAU_EXT.5: 10
    • FIA_UAU_EXT.5.1: 2
    • FIA_UAU_EXT.5.2: 2
    • FIA_UIA.1: 1
    • FIA_UIA_EXT: 1
    • FIA_UIA_EXT.1: 13
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
    • FIA_UID.1: 5
  • FMT:
    • FMT_MTD: 1
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 8
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 12
    • FPT_ITT.1.1: 2
    • FPT_PTD: 1
    • FPT_PTD.1: 19
    • FPT_PTD.1.1: 4
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TRP.1: 2
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 9
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD: 1
    • FPT_TUD_EXT.1: 5
  • FRU:
    • FRU_RSA.1: 6
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
    • FTA_SSL_EXT: 1
    • FTA_SSL_EXT.1: 10
    • FTA_SSL_EXT.1.1: 2
    • FTA_TAB.1: 6
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 20
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 3
    • FTP_ITC.1.3: 3
    • FTP_TRP.1: 10
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 6
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
  • A:
    • A.ACCESS: 3
    • A.NO_GENERAL_PUR: 1
    • A.NO_GENERAL_PURPOSE: 2
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 3
  • O:
    • O.DISPLAY_BANNER: 4
    • O.PROTECTED_COM: 1
    • O.PROTECTED_COMMUNICATI: 1
    • O.PROTECTED_COMMUNICATIONS: 5
    • O.RESIDUAL_INFOR: 1
    • O.RESIDUAL_INFORMATION_C: 1
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.RESOURCE_AVAIL: 1
    • O.RESOURCE_AVAILABILITY: 6
    • O.SESSION_LOCK: 3
    • O.SYSTEM_MONITO: 1
    • O.SYSTEM_MONITORING: 6
    • O.TOE_ADMINISTRA: 1
    • O.TOE_ADMINISTRATION: 7
    • O.TSF_SELF_TEST: 7
    • O.VERIFIABLE_UPDA: 1
    • O.VERIFIABLE_UPDATES: 2
  • OE:
    • OE.NO_GENERAL_PURPOSE: 4
    • OE.PHYSICAL: 2
    • OE.TRUSTED_ADMIN: 4
    • OE.TRUSTED_REMOTE_AUTH: 2
    • OE.USER_AUTHENTICATION: 4
  • T:
    • T.ADMIN_ERROR: 3
    • T.RESOURCE_EXHAU: 1
    • T.RESOURCE_EXHAUSTION: 2
    • T.TSF_FAILURE: 3
    • T.UNAUTHORIZED_AC: 1
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_UP: 1
    • T.UNAUTHORIZED_UPDATE: 2
    • T.UNDETECTED_ACTI: 1
    • T.UNDETECTED_ACTIONS: 2
    • T.USER_DATA_REUSE: 3
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 15
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 2048: 2
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 2
    • SHA2:
      • SHA-256: 2
      • SHA-384: 3
      • SHA-512: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KEX:
    • Key exchange: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 9
  • TLS:
    • TLS:
      • TLS: 35
      • TLS 1.0: 5
      • TLS 1.1: 1
      • TLS 1.2: 1
  • VPN:
    • VPN: 8
pdf_data/st_keywords/randomness
  • RNG:
    • RBG: 20
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 1
  • GCM:
    • GCM: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS 140-2: 3
    • FIPS 186-3: 2
    • FIPS PUB 186-2: 1
    • FIPS PUB 186-3: 4
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-38B: 2
    • NIST SP 800-90: 1
  • RFC:
    • RFC 2246: 4
    • RFC 2402: 1
    • RFC 2406: 1
    • RFC 2818: 3
    • RFC 2845: 1
    • RFC 3645: 1
    • RFC 4033: 1
    • RFC 4035: 1
    • RFC 4346: 1
    • RFC 5246: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /CreationDate: D:20130328162641+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130328162641+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1068348
  • pdf_hyperlinks: https://tools.ietf.org/html/rfc6151
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
  • /CreationDate: D:20121114133113-08'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20121120111814-05'00'
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 985051
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 67
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different