name |
bizhub PRO 1050P zentai seigyo software Overseas: bizhub PRO 1050P control software |
Cisco Unified Wireless Network Solution composed of the following components: Cisco Aironet 1130, 1230, and 1240 AG Series Access Points; Cisco 4400 Series Wireless LAN Controllers; Cisco Catalyst 6500 Series Wireless Integrated Services Module (WiSM); Cisco Wireless Control System (WCS); Cisco Secure Access Control Server (ACS); Cisco 2710 Wireless Location |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
20.07.2012 |
not_valid_before |
21.02.2005 |
25.03.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0021_it4030_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10324-vr.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10324-st.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
Cisco Systems, Inc. |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.cisco.com |
security_level |
EAL3 |
AVA_MSU.1, EAL2+, ACM_SCP.1, ALC_FLR.2 |
dgst |
6cf4c2cf7687f4e8 |
c46fedfa2cf2d8a1 |
heuristics/cert_id |
JISEC-CC-CRP-C0021 |
CCEVS-VR-VID-10324-2009 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
cpe:2.3:h:cisco:4400_wireless_lan_controller:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:catalyst_6500:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:1240:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2005-4258, CVE-2003-1002, CVE-2003-1001, CVE-2007-5134, CVE-2013-1235, CVE-2007-1258, CVE-2007-2041, CVE-2007-2038 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ATE_HLD.1, ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_COV.1, ADV_SPM.1, ATE_IND.2, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2 |
heuristics/extracted_versions |
- |
4400, 1130, 1240, 2710, 1230, 6500 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0282
- certification_date: 01.02.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0282_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is the software which is installed in a digital Multi Function Peripheral (hereinafter referred to as "mfp") consisting of a copier, printer, scanner, and fax function, and controls the overall operation of the mfp. TOE security functionality This TOE offers a security function against disclosure of highly-confidential information stored in an mfp. In compliance with all sorts of overwritting standards, this TOE also offers an overwritting function to completely erase data on recording media such as HDD. This function is used when discarding an mfp or returning a leased one in order to prevent information leakage of an organization using the mfp.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Japanese : bizhub C35 Zentai Seigyo Software English : bizhub C35 Control Software
- product_type: Control Software for digital mfp
- toe_version: A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.03.2016
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C35 Zentai Seigyo Software A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0282_it0301.html
- toe_overseas_name: bizhub C35 Control Software A12130G050105 (Controller ROM) A12199G0040000 (Boot ROM)
|
- category: Miscellaneous
- certification_date: 25.03.2009
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10324
- product: Cisco Unified Wireless Network Solution composed of the following components: Cisco Aironet 1130, 1230, and 1240 AG Series Access Points; Cisco 4400 Series Wireless LAN Controllers; Cisco Catalyst 6500 Series Wireless Integrated Services Module (WiSM); Cisco Wireless Control System (WCS); Cisco Secure Access Control Server (ACS); Cisco 2710 Wireless Location
- scheme: US
- url: https://www.niap-ccevs.org/product/10324
- vendor: Cisco Systems, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0021_it4030_ecvr.pdf |
st_vid10324-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10324-2009
- cert_item: Cisco Systems, Inc., 170 West Tasman Dr., San Jose, CA 95134 Cisco Unified Wireless Network & Wireless Intrusion Detection System
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0021: 1
|
- US:
- CCEVS-VR-VID10324-2009: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 8
- EAL 2 augmented: 4
- EAL 4: 1
- EAL2: 2
- EAL2 augmented: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 59
- Cisco Systems: 2
- Cisco Systems, Inc: 1
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20050222184150+09'00'
- /ModDate: D:20050222184150+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 16296
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: root
- /CreationDate: D:20090410185059
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20090410185059
- /Producer: Microsoft® Office Word 2007
- /Title: Validation Report for WLAN
- pdf_file_size_bytes: 345953
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
|
st_vid10324-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL2: 11
- EAL2 augmented: 2
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ACM_CAP.2: 5
- ACM_CAP.3: 1
- ACM_SCP: 1
- ACM_SCP.1: 9
- ADO:
- ADO_DEL: 2
- ADO_DEL.1: 3
- ADO_IGS.1: 6
- ADV:
- ADV_FSP.1: 13
- ADV_HLD.1: 6
- ADV_RCR: 3
- ADV_RCR.1: 6
- ADV_SPM.1: 3
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 9
- AGD_USR: 2
- AGD_USR.1: 6
- ALC:
- ATE:
- ATE_COV: 1
- ATE_COV.1: 4
- ATE_FUN: 1
- ATE_FUN.1: 6
- ATE_HLD.1: 1
- ATE_IND.2: 5
- AVA:
- AVA_MSU: 2
- AVA_MSU.1: 7
- AVA_SOF: 1
- AVA_SOF.1: 5
- AVA_VLA: 2
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 31
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 10
- FAU_GEN.2.1: 1
- FAU_GEN_EXP.1: 12
- FAU_GEN_EXP.1.1: 3
- FAU_GEN_EXP.1.2: 1
- FAU_SAR.1: 29
- FAU_SAR.1.1: 3
- FAU_SAR.1.2: 2
- FAU_SAR.2: 23
- FAU_SAR.2.1: 3
- FAU_SAR.3: 16
- FAU_SAR.3.1: 2
- FAU_SEL.1: 11
- FAU_SEL.1.1: 3
- FAU_STG.1: 9
- FAU_STG.1.1: 2
- FAU_STG.1.2: 3
- FAU_STG.3: 8
- FAU_STG.3.1: 1
- FCS:
- FCS_BCM_EXP.1: 13
- FCS_BCM_EXP.1.1: 1
- FCS_BCM_EXP.1.2: 1
- FCS_BCM_EXP.1.3: 1
- FCS_CKM.1: 54
- FCS_CKM.1.1: 3
- FCS_CKM.2: 5
- FCS_CKM.4: 30
- FCS_CKM.4.1: 1
- FCS_CKM_EXP.2: 17
- FCS_CKM_EXP.2.1: 1
- FCS_COP.1: 31
- FCS_COP.1.1: 2
- FCS_COP_EXP.1: 16
- FCS_COP_EXP.1.1: 1
- FCS_COP_EXP.2: 22
- FCS_COP_EXP.2.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_IFC.1: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 2
- FDP_PUD_EXP: 1
- FDP_PUD_EXP.1: 12
- FDP_PUD_EXP.1.1: 2
- FDP_PUP_EXP.1: 1
- FDP_RIP.1: 20
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 21
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 29
- FIA_ATD.1.1: 3
- FIA_UAU: 6
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU_EXP.5: 25
- FIA_UAU_EXP.5.1: 2
- FIA_UAU_EXP.5.2: 2
- FIA_UID.1: 11
- FIA_UID.2: 29
- FIA_UID.2.1: 2
- FIA_USB.1: 22
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF: 6
- FMT_MOF.1: 34
- FMT_MOF.1.1: 4
- FMT_MSA: 1
- FMT_MSA.1: 2
- FMT_MSA.2: 29
- FMT_MSA.2.1: 1
- FMT_MTD.1: 39
- FMT_MTD.1.1: 4
- FMT_REV.1: 1
- FMT_SMF.1: 38
- FMT_SMF.1.1: 3
- FMT_SMR.1: 30
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.1: 13
- FPT_RVM.1: 18
- FPT_RVM.1.1: 2
- FPT_SEP.1: 18
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_STM_EXP.1: 15
- FPT_STM_EXP.1.1: 1
- FPT_TST: 3
- FPT_TST_EXP: 1
- FPT_TST_EXP.1: 10
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FPT_TST_EXP.1.3: 1
- FPT_TST_EXP.2: 12
- FPT_TST_EXP.2.1: 1
- FPT_TST_EXP.2.2: 1
- FTA:
- FTA_SSL.3: 11
- FTA_SSL.3.1: 1
- FTA_TAB: 1
- FTA_TAB.1: 10
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXP.1: 22
- FTP_ITC_EXP.1.1: 2
- FTP_ITC_EXP.1.2: 2
- FTP_ITC_EXP.1.3: 2
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.NO_EVIL: 2
- A.NO_GENERAL_: 1
- A.NO_GENERAL_PURPOSE: 1
- A.ONE_WCS_ADMIN: 3
- A.PHYSICAL: 2
- A.SYSLOG_ADMIN: 3
- A.SYSLOG_SEP: 5
- A.TOE_NO_BYPASS: 2
- O:
- O.ADMIN_GUIDANCE: 9
- O.AUDIT_GENERATION: 3
- O.CONFIGURATION_: 1
- O.CONFIGURATION_IDENTIFICATION: 8
- O.CORRECT_: 1
- O.CORRECT_TSF_: 1
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPHY: 10
- O.CRYPTOGRAPHY_: 1
- O.CRYPTOGRAPHY_VALIDATED: 4
- O.DISPLAY_BANNER: 8
- O.DOCUMENTED_: 1
- O.DOCUMENTED_DESIGN: 3
- O.FUNCTIONAL_TESTING: 1
- O.IDS_AUDIT_: 1
- O.IDS_AUDIT_GENERATION: 10
- O.MANAGE: 7
- O.MEDIATE: 10
- O.PARTIAL_: 1
- O.PARTIAL_FUNCTIONAL_TESTING: 3
- O.RESIDUAL_: 1
- O.RESIDUAL_INFORMATION: 10
- O.SELF_PROTECTION: 5
- O.TIME_STAMPS: 8
- O.TOE: 1
- O.TOE_ACCESS: 6
- O.VULNERABILITY_: 1
- O.VULNERABILITY_ANALYSIS: 7
- O.VULNERABILITY_ANALYSIS_TEST: 3
- OE:
- OE.AUDIT_PROTECTION: 6
- OE.AUDIT_REVIEW: 3
- OE.MANAGE: 8
- OE.NO_EVIL: 5
- OE.NO_GENERAL_PURPOSE: 5
- OE.ONE_WCS_ADMIN: 5
- OE.PHYSICAL: 2
- OE.PROTECT_MGMT_COMMS: 7
- OE.RESIDUAL_INFORMATION: 5
- OE.SELF_PROTECTION: 8
- OE.TIME_STAMPS: 4
- OE.TOE: 1
- OE.TOE_ACCESS: 7
- OE.TOE_NO_BYPASS: 6
- T:
- T.ACCIDENTAL_: 3
- T.ACCIDENTAL_ADMIN_: 1
- T.ACCIDENTAL_ADMIN_ERROR: 1
- T.ACCIDENTAL_CRYPTO_: 1
- T.MASQUERADE: 1
- T.POOR_: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 2
- T.POOR_TEST: 3
- T.RESIDUAL_DATA: 3
- T.TSF_COMPROMISE: 3
- T.UNATTENDED_: 2
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTH_ADMIN_: 1
- T.UNAUTH_ADMIN_ACCESS: 2
- T.UNIDENTIFIED_: 4
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 267
- Cisco Systems: 3
- Cisco Systems, Inc: 5
- Microsoft:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
- FIPS 140: 3
- FIPS 140-1: 1
- FIPS 140-2: 21
- FIPS 180-2: 1
- FIPS 46-3: 1
- FIPS PUB 140-2: 6
- FIPS PUB 180-2: 2
- FIPS PUB 46-3: 2
- NIST:
- RFC:
- RFC 2246: 1
- RFC 2284: 1
- RFC 2716: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: lholmqui
- /CreationDate: D:20090526110050-04'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20090526110251-04'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title: WLAN_ST.fm
- pdf_file_size_bytes: 672856
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 112
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |