name |
HiRDB / Single Server Version 7 07-03 |
Cisco Aggregation Services Router (ASR) 1000 Series |
category |
Databases |
Network and Network-Related Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
19.12.2015 |
not_valid_before |
22.11.2006 |
19.12.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0065_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10518-vr.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10518-st.pdf |
manufacturer |
Hitachi, Ltd. |
Cisco Systems, Inc. |
manufacturer_web |
https://www.hitachi.com/ |
https://www.cisco.com |
security_level |
EAL1 |
{} |
dgst |
6b0ce7e3167a63fb |
ffafff09961836fd |
heuristics/cert_id |
JISEC-CC-CRP-C0065 |
CCEVS-VR-VID-10518-2013 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
cpe:2.3:h:cisco:asr_1000_:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:asr_1000_series:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
heuristics/extracted_versions |
7, 07, 03 |
1000 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0098
- certification_date:
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This TOE(HiRDB / Single Server Version 8) is a software product for Relational Database Management System(RDBMS). The TOE acts as a database server and provides access to the information stored in the database. Users generally access to the information stored in the database by requests for SQL execution at HiRDB server from HiRDB clients. The TOE provides functions that work for various and efficient data manipulation to meet the needs of users. And it also provides security functions that restrict access to user data to authorized users. Security functions of the TOE include the following. - Audit - Discretionary Access Control - Identification and Authentication - Security Management
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: HiRDB / Single Server Version 8
- product_type: IT Product (Data Base Management System)
- toe_version: 08-01
- vendor: Hitachi, Ltd.
- expiration_date: 01.10.2013
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0098_it7133.html
- toe_japan_name: HiRDB / Single Server Version 8 08-01
- toe_overseas_link: None
- toe_overseas_name: -----
|
- category: Network Device
- certification_date: 19.12.2013
- evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
- expiration_date: 19.12.2015
- id: CCEVS-VR-VID10518
- product: Cisco Aggregation Services Router (ASR) 1000 Series
- scheme: US
- url: https://www.niap-ccevs.org/product/10518
- vendor: Cisco Systems, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
ac9abe3d5c5a31f0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0065_ecvr.pdf |
st_vid10518-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10518-2013
- cert_item: Cisco Aggregation Services Router (ASR) 1000 Series
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0065: 1
|
- US:
- CCEVS-VR-VID10518-2013: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_STG_EXT.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_COP.1: 4
- FCS_RBG_EXT.1: 1
- FIA:
- FIA_PMG_EXT.1: 1
- FIA_UAU.7: 1
- FIA_UAU_EXT.2: 1
- FIA_UIA_EXT.1: 1
- FPT:
- FPT_STM.1: 1
- FPT_TUD_EXT.1: 1
- FTA:
- FTA_SSL.3: 1
- FTA_SSL.4: 1
- FTA_SSL_EXT.1: 1
- FTA_TAB.1: 1
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
pdf_data/report_keywords/cc_claims |
|
- O:
- O.DISPLAY_BANNER: 1
- O.PROTECTED_COMMUNICATIONS: 1
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- T:
- T.ADMIN_ERROR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 88
- Cisco Systems, Inc: 3
- STMicroelectronics:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 1
- FIPS 186-2: 1
- NIST:
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20061122204438+09'00'
- /ModDate: D:20061122204438+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 20053
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/st_filename |
|
st_vid10518-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 5
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.1.1: 1
- FCS_CKM_EXT.4: 5
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 16
- FCS_COP.1.1: 7
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 2
- FDP:
- FDP_RIP.2: 4
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 1
- FIA_UIA_EXT.1: 3
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.DISPLAY_BANNER: 1
- O.PROTECTED_COMMUNICATIONS: 1
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 72
- Cisco Systems, Inc: 4
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-009-001: 1
- CCMB-2012-009-004: 1
- FIPS:
- FIPS 140-2: 4
- FIPS 180-3: 1
- FIPS 186-2: 2
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 2
- FIPS PUB 186-2: 4
- FIPS PUB 186-3: 4
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-56A: 1
- NIST SP 800-56B: 1
- SP 800-56A: 1
- SP 800-56B: 1
- SP 800-90: 2
- PKCS:
- RFC:
- RFC 3602: 1
- RFC 4109: 1
- RFC 4303: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Cisco Systems, Inc.
- /Company: Cisco
- /CreationDate: D:20131226082947-05'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /FIPS_cert: TBD
- /ModDate: D:20140509093804-04'00'
- /Models: Chassis: ASR 1001, ASR 1002, ASR 1002X, ASR 1004, ASR 1006, ASR 1013; Embedded Services Processors (ESPr): ESPr5, ESPr10, ESPr20, ESPr40, ESPr100; Route Processor (RP): RP1, RP2
- /NDPP_version: 1.1
- /PP: U.S. Government Protection Profile for Security Requirements for Network Devices
- /PP_2: Network Device Protection Profile Extended Package Stateful Traffic Filter Firewall
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20131226132923
- /TOE: Aggregation Services Router (ASR) 1000 Series
- /TOE_Software_Version: 3.7.2t(S)
- /TOE_short: ASR1k
- /_Date: November 2013
- /_Version: .14
- pdf_file_size_bytes: 593617
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |