Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Valari Web Application Firewall v10.3.11
ISCB-3-RPT-C083-CR-v1
Top Layer Networks IPS 5500 E Version 5.21 on Models IPS 5500-150E, IPS 5500-500E, and IPS 5500-1000E
CCEVS-VR-VID-10302-2009
name Valari Web Application Firewall v10.3.11 Top Layer Networks IPS 5500 E Version 5.21 on Models IPS 5500-150E, IPS 5500-500E, and IPS 5500-1000E
category Boundary Protection Devices and Systems Detection Devices and Systems
scheme MY US
not_valid_after 24.11.2022 20.07.2012
not_valid_before 24.11.2017 10.04.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C083-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10302-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Valari_Security_Target_0.5.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10302-st.pdf
manufacturer Kaapagam Technologies Sdn. Bhd. Top Layer Networks
manufacturer_web https://www.kaapagamtech.com/ https://www.toplayer.com
security_level EAL2 EAL4
dgst 572478fcd6b79542 8d35f923682cd28f
heuristics/cert_id ISCB-3-RPT-C083-CR-v1 CCEVS-VR-VID-10302-2009
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ADV_LLD.1, AVA_MSU.2, ALC_LCD.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, ATE_IND.2, ATE_FUN.1, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, AVA_VLA.2, AGD_USR.1, ATE_COV.2, ADV_HLD.2, ADV_IMP.1, ADV_SPM.1, ALC_DVS.1
heuristics/extracted_versions 10.3.11 5.21
heuristics/scheme_data
  • cert_no: 2017-009-C083
  • certification_date: 24.11.2017
  • developer: Kaapagam Technologies Sdn Bhd.
  • enhanced:
    • assurance_level: EAL2
    • category: Boundary Protection Devices and Systems
    • cert_id: C083
    • certification_date: 24.11.2017
    • developer: B15-15, I-SOVO@I-City No. 6, Persiaran Multimedia, Section 7 40000 Shah Alam, Selangor Darul Ehsan URL: Valari Web Application Firewall Email: [email protected] Phone: +603 8992 3172
    • expiration_date: 24.11.2022
    • mutual_recognition: CCRA
    • product: Valari Web Application Firewall v10.3.11
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C083/ISCB-5-RPT-C083-CR-v1.pdf
    • scope: The TOE is designed to secure web applications from the attacks and provide a security layer by proxy-ing all HTTP(S) traffic and shield web servers and databases from direct access of the attackers irrespective of the underlying application vulnerabilities. The TOE primary features include: Identification and Authentication: The TOE enables audit functionality to tracks all activities within the TOE boundary network inclusive of its own operations as TOE Application Server. User Data Protection: The TOE protects the web application from external network intrusions by using information flow control between internal and external network. The TOE will log all HTTP requests and responses before allowing or rejecting the HTTP requests. Security Management: TOE functions can be managed through command-line interface. The TOE only allows limited user access to run a limited set of commands. These do not affect the running mode of the TOE. Security Audit: The TOE will generate audit records for HTTP Request and responses. Each audited events will be recorded along with date and time of event, source IP, account user who performed the event, event name, system filename related to event and other event details.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C083/Valari_Security_Target_0.5.pdf
    • type: Boundary Protection Devices and Systems
  • expiration_date: 24.11.2022
  • level: EAL2
  • product: Valari Web Application Firewall v10.3.11
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/58
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10302/
  • categories: ['Wireless Monitoring']
  • category: Wireless Monitoring
  • certification_date: 10.04.2009
  • evaluation_facility: CygnaCom Solutions, Inc
  • expiration_date:
  • id: CCEVS-VR-VID10302
  • product: Top Layer Networks IPS 5500 E Version 5.21 on Models IPS 5500-150E, IPS 5500-500E, and IPS 5500-1000E
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10302
  • vendor: Corero Network Security (formerly Top Layer Networks, Inc.)
pdf_data/report_filename ISCB-5-RPT-C083-CR-v1.pdf st_vid10302-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10302-2009
    • cert_item: Top Layer Networks IPS 5500 E Version 5.21 Models IPS 5500-150E, IPS 5500-500E, and IPS 5500-1000E
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-3-RPT-C083-CR-v1: 33
  • US:
    • CCEVS-VR-VID10302-2009: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 7
  • EAL:
    • EAL 4: 6
    • EAL4: 17
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SAA.1: 1
    • FAU_SAR.1: 1
    • FAU_SAR.3: 1
    • FAU_SEL.1: 1
    • FAU_STG.1: 1
    • FAU_STG_ENV.1: 1
  • FDP:
    • FDP_IFC.1: 2
    • FDP_IFF.1: 2
  • FIA:
    • FIA_AFL.1: 1
    • FIA_ATD.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.7: 1
    • FIA_UAU_ENV.1: 1
    • FIA_UID.2: 1
    • FIA_UID_ENV.1: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_RVM_ENV.1: 1
    • FPT_RVM_EXP.1: 1
    • FPT_SEP_ENV.1: 1
    • FPT_SEP_EXP.1: 1
    • FPT_STM_ENV.1: 1
    • FPT_STM_EXP.1: 1
    • FPT_TST.1: 1
  • FTP:
    • FTP_TRP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.AUTH: 1
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 10
  • TLS:
    • SSL:
      • SSL: 1
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 3
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_metadata
  • /Author: ISCB Department
  • /CreationDate: D:20171204082900+00'00'
  • /Creator: Microsoft Word
  • /Keywords: MyCB_TMP_002
  • /ModDate: D:20171204082900+00'00'
  • /Subject: Valari Web Application Firewall v10.3.11
  • /Title: C083 Certification Report
  • pdf_file_size_bytes: 983010
  • pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
pdf_data/st_filename Valari_Security_Target_0.5.pdf st_vid10302-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 3
  • EAL:
    • EAL4: 20
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 2
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.2: 2
    • ADV_HLD.2: 2
    • ADV_IMP.1: 2
    • ADV_LLD.1: 2
    • ADV_RCR.1: 2
    • ADV_SPM.1: 4
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.1: 4
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.2: 2
    • AVA_SOF.1: 2
    • AVA_VLA.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.3: 15
    • FAU_GEN.3.1: 2
    • FAU_GEN.3.2: 2
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 9
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 2
    • FMT_MSA: 3
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 3
    • FMT_MSA.5: 12
    • FMT_MSA.5.1: 2
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
    • FPT_STM.2: 1
  • FAU:
    • FAU_ARP.1: 14
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 10
    • FAU_GEN.2.1: 1
    • FAU_IFC.1: 1
    • FAU_SAA.1: 13
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 2
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 10
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 10
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_ENV.1: 5
    • FAU_STG_ENV.1.1: 1
    • FAU_STG_ENV.1.2: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_IFC.1: 28
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 30
    • FDP_IFF.1.1: 8
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 2
  • FIA:
    • FIA_AFL.1: 11
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 16
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UAU_ENV.1: 5
    • FIA_UAU_ENV.1.1: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 13
    • FIA_UID.2.1: 1
    • FIA_UID_ENV.1: 5
    • FIA_UID_ENV.1.1: 1
  • FMT:
    • FMT_MOF.1: 13
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 13
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 17
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 17
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 1
    • FPT_RVM_ENV.1: 5
    • FPT_RVM_ENV.1.1: 1
    • FPT_RVM_EXP: 1
    • FPT_RVM_EXP.1: 12
    • FPT_RVM_EXP.1.1: 1
    • FPT_RVM_EXP.1.2: 1
    • FPT_SEP_ENV.1: 5
    • FPT_SEP_ENV.1.1: 1
    • FPT_SEP_ENV.1.2: 1
    • FPT_SEP_EXP.1: 11
    • FPT_SEP_EXP.1.1: 1
    • FPT_SEP_EXP.1.2: 1
    • FPT_SEP_EXP.1.3: 1
    • FPT_STM.1: 1
    • FPT_STM_ENV.1: 5
    • FPT_STM_ENV.1.1: 1
    • FPT_STM_EXP.1: 13
    • FPT_STM_EXP.1.1: 1
    • FPT_TRP.1: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
  • FTP:
    • FTP_TRP.1: 9
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.CONFIGRULE: 2
    • A.CONN: 2
    • A.FLOW: 2
    • A.KEY: 2
    • A.PHY: 2
    • A.TIME: 1
    • A.TIMEBACK: 1
  • O:
    • O.ACCESSLOG: 3
    • O.AUDIT: 3
    • O.CONFIG: 4
    • O.EXPLOIT: 3
    • O.NOAUTH: 3
  • OE:
    • OE.ADMIN: 2
    • OE.CONFIGRULE: 2
    • OE.CONN: 3
    • OE.FLOW: 2
    • OE.KEY: 3
    • OE.PHY: 2
    • OE.TIMEBACK: 2
  • T:
    • T.ACCESSLOG: 2
    • T.AUDIT: 2
    • T.CONFIG: 2
    • T.EXPLOIT: 2
    • T.NOAUTH: 2
    • T.REMOTE: 2
  • A:
    • A.AUTH: 1
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • O:
    • O.ADMINISTRATION: 3
    • O.ALERT: 4
    • O.AUDIT: 4
    • O.AUDITPROTECT: 4
    • O.CONTENTBASED: 4
    • O.IDAUTH: 6
    • O.MANAGE: 5
    • O.RATEBASED: 4
    • O.SELFPROTECTION: 5
    • O.TIME: 3
    • O.TRANSMISSION: 4
    • O.UNDESIREDACCESS: 6
  • OE:
    • OE.AUDIT: 3
    • OE.PROTECT: 4
    • OE.TIME: 4
  • T:
    • T.ADDRESSSPOOF: 2
    • T.AUDIT: 2
    • T.CONTENTBASED: 2
    • T.MANAGE: 2
    • T.NOAUTH: 2
    • T.PROCOM: 2
    • T.RATEBASED: 2
    • T.REPEAT: 2
    • T.UNDESIREDACCE: 1
    • T.UNDESIREDACCESS: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • RC:
      • RC4: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 12
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 15
  • TLS:
    • SSL:
      • SSL: 1
  • SSH:
    • SSH: 5
  • TLS:
    • SSL:
      • SSL: 5
  • VPN:
    • VPN: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-002: 1
pdf_data/st_metadata
  • /Author: AD
  • /CreationDate: D:20171102074055Z00'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20171102074055Z00'00'
  • /Producer: Mac OS X 10.11.4 Quartz PDFContext
  • /Subject: Valari Security Target
  • pdf_file_size_bytes: 525664
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different