name |
HiRDB / Single Server Version 7 07-03 |
Cisco Adaptive Security Appliances (ASA) Firewall and Virtual Private Network (VPN) Platform, version 9.4(1) |
category |
Databases |
Network and Network-Related Devices and Systems |
scheme |
JP |
AU |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
11.10.2021 |
not_valid_before |
22.11.2006 |
21.07.2015 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0065_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR_Cisco_ASA_9.4(1)_v1.0.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_Cisco_ASA_9.4(1).pdf |
manufacturer |
Hitachi, Ltd. |
Cisco Systems, Inc. |
manufacturer_web |
https://www.hitachi.com/ |
https://www.cisco.com |
security_level |
EAL1 |
{} |
dgst |
6b0ce7e3167a63fb |
29ad4a7a7df713b8 |
heuristics/cert_id |
JISEC-CC-CRP-C0065 |
Certificate Number: 2015/93 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
heuristics/extracted_versions |
7, 07, 03 |
9.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0098
- certification_date:
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This TOE(HiRDB / Single Server Version 8) is a software product for Relational Database Management System(RDBMS). The TOE acts as a database server and provides access to the information stored in the database. Users generally access to the information stored in the database by requests for SQL execution at HiRDB server from HiRDB clients. The TOE provides functions that work for various and efficient data manipulation to meet the needs of users. And it also provides security functions that restrict access to user data to authorized users. Security functions of the TOE include the following. - Audit - Discretionary Access Control - Identification and Authentication - Security Management
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: HiRDB / Single Server Version 8
- product_type: IT Product (Data Base Management System)
- toe_version: 08-01
- vendor: Hitachi, Ltd.
- expiration_date: 01.10.2013
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0098_it7133.html
- toe_japan_name: HiRDB / Single Server Version 8 08-01
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
bb67fb1b4f10e7a5, d7508f508083d040, ac9abe3d5c5a31f0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0065_ecvr.pdf |
CR_Cisco_ASA_9.4(1)_v1.0.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0065: 1
|
- AU:
- Certification Report 2015/93: 1
- FR:
- Certification Report 2015/93: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 33
- Cisco Systems: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20061122204438+09'00'
- /ModDate: D:20061122204438+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 20053
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: ACA
- /Company: Department of Defence
- /CreationDate: D:20150721134354+10'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /ModDate: D:20150721134357+10'00'
- /Objective-Classification: [Inherited - Restricted]
- /Objective-CreationStamp: D:20150716
- /Objective-Id: R22840688
- /Objective-IsApproved: 0
- /Objective-IsPublished: 0
- /Objective-ModificationStamp: D:20150721
- /Objective-Owner: Chan, Hin (Mr)(I&S ASD)
- /Objective-Parent: Certification
- /Objective-Path: Objective Global Folder - PROD:Defence Business Units:Intelligence and Security Group:Defence Signals Directorate:DSD : Defence Signals Directorate (DSD):CISD:ASCS:CSPD:Evals:Australasn Certn Auth:Certification:Operations:AISEP Certification Records:EFC-T0083 Cisco ASA 9.4(1):Certification:
- /Objective-State: Being Edited
- /Objective-Title: Cisco _ASA_9.4(1)CR_V0.1
- /Objective-Version: 0.5
- /Objective-VersionNumber: 5
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /SourceModified: D:20150721034313
- /Title:
- pdf_file_size_bytes: 207919
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
|
ST_Cisco_ASA_9.4(1).pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 2
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 28
- FCS_COP.1.1: 4
- FCS_IKE_EXT.1: 1
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT.1: 6
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_TLS_EXT.1: 7
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_RIP.2: 6
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT.1: 4
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_PSK_EXT.1.4: 1
- FIA_UAU.6: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.5: 1
- FIA_UIA_EXT.1: 6
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SFR.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_ITT.1: 4
- FPT_ITT.1.1: 1
- FPT_PTD_EXT.1: 2
- FPT_RPL.1: 1
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.1.2: 1
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FRU:
- FTA:
- FTA_SSL.3: 11
- FTA_SSL.3.1: 2
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 1
- FTA_SSL_EXT.1: 7
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTA_TSE.1: 5
- FTA_TSE.1.1: 1
- FTA_VCM_EXT.1: 5
- FTA_VCM_EXT.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 4
- A.PHYSICAL: 2
- A.TRUSTED_ADMIN: 4
- O:
- O.ADDRESS_: 1
- O.ADDRESS_FILTERING: 5
- O.ASSIGNED_PRIV: 1
- O.ASSIGNED_PRIVATE_ADDR: 2
- O.ASSIGNED_PRIVATE_ADDRESS: 1
- O.AUTHENTICATIO: 1
- O.AUTHENTICATION: 5
- O.CLIENT_ESTABLI: 1
- O.CLIENT_ESTABLISHMENT_: 2
- O.CLIENT_ESTABLISHMENT_CONSTRAINTS: 1
- O.CRYPTOGRAPHI: 1
- O.CRYPTOGRAPHIC_FUNCTI: 1
- O.CRYPTOGRAPHIC_FUNCTIO: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.DISPLAY_: 1
- O.DISPLAY_BANNER: 3
- O.FAIL_SECURE: 6
- O.PORT_FILTERING: 4
- O.PROTECTED_: 1
- O.PROTECTED_COMMUNICA: 1
- O.PROTECTED_COMMUNICAT: 1
- O.PROTECTED_COMMUNICATIONS: 3
- O.RELATED_: 1
- O.RELATED_CONNECTION_FI: 2
- O.RELATED_CONNECTION_FILTERING: 3
- O.REMOTE_SESSIO: 1
- O.REMOTE_SESSION_TERMIN: 2
- O.REMOTE_SESSION_TERMINATION: 3
- O.RESIDUAL_: 1
- O.RESIDUAL_INFORMATION_: 2
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.RESOURCE_AVAILABILITY: 1
- O.SESSION_LOCK: 6
- O.STATEFUL_: 1
- O.STATEFUL_INSPECTION: 3
- O.SYSTEM_: 1
- O.SYSTEM_MONITORING: 5
- O.TOE_: 1
- O.TOE_ADMINISTRATION: 5
- O.TSF_SELF_TEST: 4
- O.VERIFIABLE_: 1
- O.VERIFIABLE_UPDATES: 3
- OE:
- OE.CONNECTIONS: 2
- OE.NO_GENERAL_: 1
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 3
- OE.TRUSTED_: 1
- OE.TRUSTED_ADMIN: 2
- T:
- T.ADMIN_ERROR: 4
- T.DATA_INTEGRITY: 2
- T.HIJACKED_SESSION: 2
- T.NETWORK_ACCESS: 1
- T.NETWORK_DISCLOSURE: 6
- T.NETWORK_DOS: 4
- T.NETWORK_MISUSE: 5
- T.REPLAY_ATTACK: 4
- T.TRANSMIT: 1
- T.TSF_FAILURE: 3
- T.UNAUTHORIZED_ACCESS: 4
- T.UNAUTHORIZED_CONNECTI: 2
- T.UNAUTHORIZED_CONNECTION: 1
- T.UNAUTHORIZED_CONNECTIONS: 1
- T.UNAUTHORIZED_UPDATE: 2
- T.UNDETECTED_ACTIONS: 2
- T.UNPROTECTED_TRAFFIC: 4
- T.USER_DATA_REUSE: 4
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 24
- Cisco Systems, Inc: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 2
- SHA-512: 7
- SHA256: 6
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 33
- IKEv1: 1
- IKEv2: 12
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 22
- TLS 1.0: 1
- TLS 1.2: 1
- TLS v1.0: 1
- TLSv1.2: 1
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-009-001: 1
- CCMB-2012-009-004: 1
- FIPS:
- FIPS 140-2: 3
- FIPS 186-3: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 2
- FIPS PUB 180-4: 2
- FIPS PUB 186-2: 3
- FIPS PUB 186-3: 10
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 1
- NIST SP 800-56A: 3
- NIST SP 800-56B: 2
- SP 800-90: 1
- RFC:
- RFC 2246: 1
- RFC 2460: 5
- RFC 2560: 1
- RFC 2818: 1
- RFC 2986: 1
- RFC 3513: 2
- RFC 3602: 1
- RFC 4253: 1
- RFC 4301: 1
- RFC 4303: 2
- RFC 4443: 3
- RFC 4945: 1
- RFC 5246: 1
- RFC 5280: 2
- RFC 5282: 1
- RFC 5735: 2
- RFC 5759: 1
- RFC 6379: 1
- RFC 768: 5
- RFC 791: 5
- RFC 792: 3
- RFC 793: 5
- RFC 959: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /ASDM _version: 7.1(3)
- /Author: Cisco Systems
- /Company: Cisco Systems, Inc.
- /CreationDate: D:20150721134959+10'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /FIPS_cert: TBD
- /ModDate: D:20150721135009+10'00'
- /Models: ASA 5500 (5505, 5510, 5520, 5540, 5550, 5580-20-40), ASA 5500-X Series (5512-X, 5515-X, 5525-X, 5545-X, 5555-X), ASA 5585-X (5585-10, 5585-20, 5585-40, 5585-60), ASA Services Module (ASA-SM)
- /NDPP_Version: 1.1
- /Objective-Caveats:
- /Objective-Classification: [Inherited - Restricted]
- /Objective-Comment:
- /Objective-CreationStamp: D:16170124
- /Objective-DatePublished:
- /Objective-Document Type [system]:
- /Objective-FileNumber:
- /Objective-Id: R22745603
- /Objective-IsApproved: 0
- /Objective-IsPublished: 0
- /Objective-ModificationStamp: D:16170124
- /Objective-Owner: Caulfield, Terence (MR)(ASD)
- /Objective-Parent: Security Target
- /Objective-Path: Objective Global Folder - PROD:Defence Business Units:Intelligence and Security Group:Defence Signals Directorate:DSD : Defence Signals Directorate (DSD):CISD:ASCS:CSPD:Evals:Australasn Certn Auth:Certification:Operations:AISEP Certification Records:EFC-T
- /Objective-State: Being Edited
- /Objective-Title: Cisco_ASA_9.4.x_Security_Target-ASA
- /Objective-Version: 0.2
- /Objective-VersionComment:
- /Objective-VersionNumber: 2
- /PP: U.S. Government Protection Profile for Security Requirements for Network Devices (NDPP) and Traffic Filter Firewall Extended Package (TFFWEP)
- /PP_2: NDPP and TFFWEP
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Subject: Copyright (C) Cisco 2015
- /TFFW_Version: 1.0
- /TOE: Adaptive Security Appliances
- /TOE_Software_Version: 9.1(2)
- /TOE_short: ASA
- /Title: Cisco ASA Security Target
- /_Date: August, 2013
- /_Version: 1.0
- pdf_file_size_bytes: 597247
- pdf_hyperlinks:
|