name |
bizhub 554e / bizhub 454e / bizhub 364e /bizhub 284e / bizhub 224e / ineo 554e / ineo 454e / ineo 364e / ineo 284e / ineo 224e G00-09 |
Cisco Integrated Service Routers Generation 2 (ISR G2) |
category |
Multi-Function Devices |
Boundary Protection Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
06.01.2020 |
27.03.2016 |
not_valid_before |
24.12.2014 |
27.03.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0454_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10542-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0454_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10542-st.pdf |
manufacturer |
KONICA MINOLTA, INC. |
Cisco Systems, Inc. |
manufacturer_web |
https://www.konicaminolta.com/index.html |
https://www.cisco.com |
security_level |
EAL3+, ALC_FLR.2 |
{} |
dgst |
73d155a96d4f6f9c |
782e88b042bbcd3c |
heuristics/cert_id |
JISEC-CC-CRP-C0454 |
CCEVS-VR-VID-10542-2014 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
cpe:2.3:h:konicaminolta:bizhub_364e:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_224e:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_284e:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_454e:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_554e:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
heuristics/extracted_versions |
09 |
2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0454
- certification_date: 01.12.2014
- claim: EAL3+ ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL3 Augmented with ALC_FLR.2
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0454_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an MFP (Multi-Function Printer) that offers Copy, Scan, Print, Fax, and Document storage and retrieval functions. The TOE provides security functions that conform to IEEE Std 2600.1™-2009 which is the MFP security requirement specification, to prevent unauthorized disclosure and alteration of user’s document data. TOE security functionality This TOE provides the following security functions. - Identification and authentication Function to identify and authenticate users. - User restriction control function Function to restrict available functions of users and to control the access to document data other than accumulated documents only to the authorized users. - Accumulated documents access control function Function to control the access to accumulated documents only to the authorized users. - HDD encryption function Function to encrypt the data that is stored in HDD. - Residual information deletion function Function to overwrite and delete the data stored in HDD, so that they cannot be reused. - Audit log function Function to record audit log related to security functions. - Network communication protection function Function to encrypt communication data on the LAN. - Self-test function Function to verify the integrity of executable codes of HDD encryption function and security functions. - Security management function Function to control the management of security functions only to the authorized users. - External interface separation function Function to prevent unauthorized transfer to LAN from external interface like public phone etc.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: bizhub 554e / bizhub 454e / bizhub 364e / bizhub 284e /bizhub 224e / ineo 554e / ineo 454e / ineo 364e /ineo 284e / ineo 224e
- product_type: Multi-Function Printer
- protection_profile: IEEE Std 2600.1™-2009
- report_link: https://www.ipa.go.jp/en/security/c0454_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0454_est.pdf
- toe_version: G00-09
- vendor: KONICA MINOLTA,INC.
- expiration_date: 01.01.2020
- supplier: KONICA MINOLTA,INC.
- toe_japan_name: bizhub 554e / bizhub 454e / bizhub 364e /bizhub 284e / bizhub 224e / ineo 554e / ineo 454e / ineo 364e / ineo 284e / ineo 224e G00-09
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0454_it3464.html
- toe_overseas_name: bizhub 554e / bizhub 454e / bizhub 364e /bizhub 284e / bizhub 224e / ineo 554e / ineo 454e / ineo 364e / ineo 284e / ineo 224e G00-09
|
- category: Network Device, Router, Virtual Private Network
- certification_date: 27.03.2014
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 26.03.2016
- id: CCEVS-VR-VID10542
- product: Cisco Integrated Service Routers Generation 2 (ISR G2)
- scheme: US
- url: https://www.niap-ccevs.org/product/10542
- vendor: Cisco Systems, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
32475ccb695b1644 |
bb67fb1b4f10e7a5, ac9abe3d5c5a31f0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0454_erpt.pdf |
st_vid10542-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10542-2014
- cert_item: for Cisco Integrated Service Routers Generation 2 (ISR G2
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0454-01: 1
- Certification No. C0454: 1
|
- US:
- CCEVS-VR-VID10542-2014: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 4
- EAL3 augmented: 3
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 81
- Cisco Systems, Inc: 2
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IPsec:
- TLS:
- SSL:
- TLS:
- TLS: 1
- TLS 1.2: 1
- TLS v1.2: 3
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20150127163653+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20150127163729+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 452162
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 37
|
- /Author: Pierre, Marie Evencie
- /Company: SAIC
- /CreationDate: D:20140410132546-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /ModDate: D:20140410132549-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140410172518
- /Title: National Information Assurance Partnership
- pdf_file_size_bytes: 277984
- pdf_hyperlinks: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/m1/sec-m1-cr-book.html, http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/command/Cisco_IOS_Configuration_Fundamentals_Command_Reference.html, http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_sslvpn/configuration/15-mt/sec-conn-sslvpn-15-mt-book.html, http://www.cisco.com/en/US/docs/routers/access/2900/hardware/installation/guide/Hardware_Installation_Guide.html, http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_bgp/command/irg-cr-book.html, http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_pki/configuration/15-mt/sec-pki-15-mt-book.html, http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_isis/command/irs-cr-book.html, http://www.cisco.com/en/US/docs/ios-xml/ios/sys-image-mgmt/configuration/15-mt/sysimgmgmt-15-mt-book.html, http://www.cisco.com/en/US/docs/routers/access/1900/software/configuration/guide/Software_Configuration.html, http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/d1/sec-d1-cr-book.html, http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/configuration/15mt/fundamentals-15-mt-book.html, http://www.cisco.com/en/US/partner/docs/ios-xml/ios/bsm/configuration/15-mt/bsm-15-mt-book.html, http://www.cisco.com/en/US/docs/ios-xml/ios/security/config_library/15-mt/secuser-15-mt-library.html, http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_ospf/command/iro-cr-book.html, http://www.cisco.com/en/US/docs/ios-xml/ios/bsm/configuration/15-mt/bsm-15-mt-book.html, http://www.cisco.com/en/US/docs/routers/access/1900/hardware/installation/guide/1900_HIG.html, http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_zbf/configuration/15-mt/sec-zone-pol-fw.html, http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_rip/command/irr-cr-book.html, http://www.cisco.com/en/US/products/ps11746/products_installation_and_configuration_guides_list.html, http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_ikevpn/configuration/15-1mt/Configuring_Internet_Key_Exchange_Version_2.html, http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/a1/sec-a1-cr-book.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
pdf_data/st_filename |
c0454_est.pdf |
st_vid10542-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10340-2009: 1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 2
- EAL 3 augmented: 1
- EAL3: 2
- EAL3 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 5
- ALC_LCD.1: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 2
- FAU_STG.4: 13
- FAU_STG.4.1: 2
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.1.1: 2
- FDP_ACF.1: 25
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC: 1
- FDP_IFC.1: 2
- FDP_IFF: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 17
- FIA_SOS.1.1: 2
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MSA.1: 21
- FMT_MSA.1.1: 2
- FMT_MSA.3: 15
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 9
- FMT_MTD.1.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 25
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 9
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 9
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM.1.2: 1
- FCS_CKM_EXT.4: 5
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 17
- FCS_COP.1.1: 7
- FCS_RBG_EXT.1: 5
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT.1: 4
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_TLS_EXT.1: 5
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT.1: 4
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_PSK_EXT.1.4: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 4
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.1.2: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 2
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTA_TSE.1: 2
- FTA_TSE.1.1: 2
- FTA_VCM_EXT.1: 2
- FTA_VCM_EXT.1.1: 2
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 7
- D.DOC: 49
- D.FUNC: 23
- D.PROT: 8
- O:
- O.AUDIT: 6
- O.CONF: 12
- O.DOC: 13
- O.FUNC: 6
- O.HDD: 8
- O.INTERFACE: 6
- O.PROT: 6
- O.SOFTWARE: 6
- O.USER: 11
- O.USER_AUTHORIZED: 1
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 3
- OE.AUDIT_STORAGE: 3
- OE.INTERFACE: 3
- OE.PHYISCAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
- A:
- A: 1
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.ADDRESS_FILTERING: 1
- O.ASSIGNED_PRIVATE_ADDRESS: 1
- O.AUTHENTICATION: 1
- O.CLIENT_ESTABLISHMENT_CONSTRAINTS: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.DISPLAY_BANNER: 1
- O.FAIL_SECURE: 1
- O.PORT_FILTERING: 1
- O.PROTECTED_COMMUNICATIONS: 1
- O.REMOTE_SESSION_TERMINATION: 1
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.DATA_INTEGRITY: 1
- T.HIJACKED_SESSION: 1
- T.NETWORK_DISCLOSURE: 1
- T.NETWORK_MISUSE: 1
- T.REPLAY_ATTACK: 1
- T.TSF_FAILURE: 2
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_CONNECTION: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.UNPROTECTED_TRAFFIC: 1
- T.USER_DATA_REUSE: 1
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 94
- Cisco Systems, Inc: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 6
- HMAC-SHA-256: 1
- HMAC-SHA-512: 1
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-512: 4
- SHA256: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 39
- IKEv1: 11
- IKEv2: 9
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 22
- TLS 1.0: 1
- TLS v1.0: 1
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 6
- P-384: 6
- P-521: 6
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-009-001: 1
- CCMB-2012-009-004: 1
- FIPS:
- FIPS 140-2: 5
- FIPS 180-3: 1
- FIPS 186-3: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 2
- FIPS PUB 186-2: 4
- FIPS PUB 186-3: 15
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- NIST SP 800-56A: 1
- NIST SP 800-56B: 1
- SP 800-135: 1
- SP 800-56: 3
- SP 800-90: 3
- RFC:
- RFC 2246: 1
- RFC 2460: 2
- RFC 2560: 1
- RFC 2818: 1
- RFC 2986: 1
- RFC 3602: 1
- RFC 4106: 1
- RFC 4109: 1
- RFC 4253: 1
- RFC 4301: 1
- RFC 4303: 1
- RFC 4945: 1
- RFC 5280: 3
- RFC 5759: 1
- RFC 6379: 1
- RFC 768: 2
- RFC 791: 2
- RFC 793: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20150126091359+09'00'
- /Creator: CubePDF
- /Keywords:
- /ModDate: D:20150126091412+09'00'
- /Producer: GPL Ghostscript 9.07; modified using iTextSharp™ 5.4.2 ©2000-2012 1T3XT BVBA (AGPL-version)
- /Subject:
- /Title:
- pdf_file_size_bytes: 894077
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 86
|
- /Author: Cisco
- /Category:
- /Comments:
- /Company: Cisco Systems, Inc.
- /CreationDate: D:20140410133209-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Keywords:
- /Manager:
- /ModDate: D:20140410133223-04'00'
- /Models: Cisco 1905 ISR, Cisco 1921 ISR, Cisco 1941 ISR, Cisco 2901 ISR, Cisco 2911 ISR, Cisco 2921 ISR, Cisco 2951 ISR, Cisco 3925 ISR, Cisco 3925E ISR, Cisco 3945 ISR, Cisco 3945E ISR, ISM-VPN-19, ISM-VPN-29, ISM-VPN-39
- /NDPP_Version: 1.1
- /PP: U.S. Government Protection Profile for Security Requirements for Network Devices
- /PP_2: Network Device Protection Profile Extended Package VPN Gateway
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140409195655
- /Subject:
- /TOE: Integrated Service Routers Generation 2
- /TOE_Software_Version: 15.2(4)M6
- /TOE_short: ISR G2
- /Title: 1
- /_Date: March 2014
- /_Version: 1.1
- pdf_file_size_bytes: 830565
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 81
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |