name |
Motorola Solutions RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point |
A10 Thunder TPS 14045 |
category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
US |
NO |
status |
archived |
archived |
not_valid_after |
28.03.2016 |
02.07.2023 |
not_valid_before |
28.03.2014 |
02.07.2018 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180702%20S107%20C.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10472-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180702%20SERTIT-107%20CR%20A10NetworksThunderTPS%20-%201.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10472-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_A10_Networks_Thunder_TPS%20_v.1.5_06_26_2018.pdf |
manufacturer |
Motorola Solutions, Inc. |
A10 Networks, Inc. |
manufacturer_web |
https://www.motorolasolutions.com |
https://a10networks.com |
security_level |
EAL2+, ALC_FLR.2 |
EAL2+, ALC_FLR.1 |
dgst |
778473e553d9d55f |
7a015286ff72ce30 |
heuristics/cert_id |
CCEVS-VR-VID-10472-2014 |
SERTIT-107 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1, ADV_SPM.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
14045 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Wireless LAN
- certification_date: 28.03.2014
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date: 28.03.2016
- id: CCEVS-VR-VID10472
- product: Motorola Solutions RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point
- scheme: US
- url: https://www.niap-ccevs.org/product/10472
- vendor: Motorola Mobility LLC
|
- category: Network and Network-Related Devices and Systems
- certification_date: 02.07.2018
- developer: A10 Networks, Inc.
- enhanced:
- category: Network and Network-Related Devices and Systems
- cert_id: SERTIT-107
- certification_date: 02.07.2018
- description: A10 Thunder TPS product line of Threat Protection Systems provides high-performance, network-wide protection against distributed denial of service (DDoS) attacks, and enables service availability against a variety of volumetric, protocol, resource and other sophisticated application attacks. The Thunder TPS product line is built upon our Advanced Core Operating System (ACOS) platform, with A10's Symmetric Scalable Multi-Core Processing (SSMP) software architecture that delivers high performance and leverages a shared memory architecture to provide efficient tracking of network flows, as well as accurate DDoS protection enforcement for service providers, Web site operators and enterprises. A10 Thunder TPS devices protect critical services in highly efficient hardware form factors, which enables your data center resources to be used productively. The combination of high performance in a small form factor results in lower OPEX through significantly lower power usage, reduced rack space and lowered cooling requirements.
- developer: A10 Networks, Inc.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135310-1607953774/SERTIT/Sertifikater/2018/107/20180702%20S107%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135307-1607953771/SERTIT/Sertifikater/2018/107/ST_A10_Networks_Thunder_TPS%20_v.1.5_06_26_2018.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135304-1607953768/SERTIT/Sertifikater/2018/107/20180702%20SERTIT-107%20CR%20A10NetworksThunderTPS%20-%201.0.pdf'})]})
- evaluation_facility: Advanced Data Security
- expiration_date: 02.07.2023
- level: EAL 2, ALC_FLR.1
- mutual_recognition: CCRA
- product: HW: 14045-TPS, FW: 3.2.2-P5
- product: A10 Networks Thunder TPS 14045
- url: https://sertit.no/certified-products/product-archive/a10-networks-thunder-tps-14045
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
20180702 S107 C.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- ADS:
- Advanced Data Security: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- pdf_file_size_bytes: 741235
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid10472-vr.pdf |
20180702 SERTIT-107 CR A10NetworksThunderTPS - 1.0.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10472-2014
- cert_item: Motorola Solutions, Inc. RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10472-2014: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 18
- EAL 2 augmented: 16
- EAL1: 1
- EAL2: 1
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.1: 18
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 2
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NO_EVIL: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TOE_NO_BYPASS: 1
- T:
- T.ACCIDENTAL_ADMIN_ERROR: 1
- T.ACCIDENTAL_CRYPTO_COMPROMISE: 1
- T.MASQUERADE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTH_ACCESS_POINT: 1
- T.UNAUTH_ADMIN_ACCESS: 1
|
- A:
- A.PHYSICAL_SECURITY: 1
- A.SECURITY_MAINTENANCE: 1
- A.TRUSTED_ADMIN: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ADS:
- Advanced Data Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20140331160855-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Keywords:
- /ModDate: D:20140331160902-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140331200839
- /Subject:
- /Title: D
- pdf_file_size_bytes: 166987
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
- /CreationDate: D:20180704203905Z00'00'
- /Creator: Word
- /ModDate: D:20180704203905Z00'00'
- /Producer: Mac OS X 10.13.5 Quartz PDFContext
- /Title: Microsoft Word - 20180702 SERTIT-107 CR A10NetworksThunderTPS - 1.0.docx
- pdf_file_size_bytes: 1016648
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
st_vid10472-st.pdf |
ST_A10_Networks_Thunder_TPS _v.1.5_06_26_2018.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 6
- EAL1: 4
- EAL2: 8
- EAL2 augmented: 4
- EAL2+: 2
- EAL3: 4
- EAL5: 4
- EAL6: 2
- EAL7: 4
|
- EAL:
- EAL2: 5
- EAL2 augmented: 5
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 12
- ADV_FSP: 2
- ADV_FSP.1: 2
- ADV_FSP.2: 26
- ADV_IMP: 2
- ADV_INT: 2
- ADV_SPM: 4
- ADV_SPM.1: 4
- ADV_TDS: 2
- ADV_TDS.1: 20
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 18
- AGD_PRE: 2
- AGD_PRE.1: 16
- ALC:
- ALC_CMC: 2
- ALC_CMC.2: 8
- ALC_CMS: 2
- ALC_CMS.2: 8
- ALC_DEL: 2
- ALC_DEL.1: 8
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_FLR.2: 18
- ALC_TAT: 2
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD: 2
- ASE_ECD.1: 2
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 2
- ASE_OBJ.2: 2
- ASE_REQ: 2
- ASE_REQ.2: 2
- ASE_SPD: 2
- ASE_SPD.1: 2
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV: 2
- ATE_COV.1: 14
- ATE_COV.2: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_FUN.1: 12
- ATE_IND: 2
- ATE_IND.2: 6
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 6
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 36
- FAU_GEN.1: 22
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FAU_GEN.2: 16
- FAU_GEN.2.1: 2
- FAU_SEL.1: 16
- FAU_SEL.1.1: 2
- FAU_UAU.1: 2
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 68
- FCS_CKM.1.1: 7
- FCS_CKM.2: 18
- FCS_CKM.2.1: 9
- FCS_CKM.4: 52
- FCS_CKM.4.1: 2
- FCS_CKM_EXT.2: 2
- FCS_COP: 6
- FCS_COP.1: 81
- FCS_COP.1.1: 37
- FCS_PEAP_EXT: 5
- FCS_PEAP_EXT.1: 28
- FCS_PEAP_EXT.1.1: 2
- FCS_PEAP_EXT.1.2: 4
- FCS_PEAP_EXT.1.3: 4
- FCS_PEAP_EXT.1.4: 4
- FCS_RAD_EXT: 5
- FCS_RAD_EXT.1: 28
- FCS_RAD_EXT.1.1: 4
- FCS_RAD_EXT.1.2: 4
- FCS_RAD_EXT.1.3: 4
- FCS_SFTP_EXT: 4
- FCS_SFTP_EXT.1: 30
- FCS_SFTP_EXT.1.1: 2
- FCS_SFTP_EXT.1.2: 4
- FCS_SSH_EXT: 4
- FCS_SSH_EXT.1: 39
- FCS_SSH_EXT.1.1: 4
- FCS_SSH_EXT.1.2: 4
- FCS_SSH_EXT.1.3: 4
- FCS_SSH_EXT.1.4: 4
- FCS_SSH_EXT.1.5: 4
- FCS_SSH_EXT.1.6: 4
- FCS_SSH_EXT.1.7: 4
- FCS_SSH_EXT.1.8: 4
- FCS_SSH_EXT.1.9: 4
- FCS_TLS_EXT: 4
- FCS_TLS_EXT.1: 61
- FCS_TLS_EXT.1.1: 4
- FCS_TTLS_EXT.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 4
- FDP_IFC.1: 48
- FDP_IFC.1.1: 5
- FDP_IFF: 43
- FDP_IFF.1: 44
- FDP_ITC.1: 18
- FDP_ITC.2: 14
- FDP_PUD: 2
- FDP_RIP: 4
- FDP_RIP.1: 18
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 16
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 4
- FIA_ATD.1: 29
- FIA_ATD.1.1: 5
- FIA_UAU: 12
- FIA_UAU.1: 38
- FIA_UAU.1.1: 6
- FIA_UAU.1.2: 4
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UAU.5: 1
- FIA_UAU.5.1: 1
- FIA_UID: 4
- FIA_UID.1: 8
- FIA_UID.2: 21
- FIA_UID.2.1: 2
- FIA_USB: 4
- FIA_USB.1: 16
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF: 4
- FMT_MOF.1: 93
- FMT_MOF.1.1: 12
- FMT_MSA: 5
- FMT_MSA.1: 19
- FMT_MSA.1.1: 1
- FMT_MSA.2: 58
- FMT_MSA.2.1: 2
- FMT_MSA.3: 49
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 5
- FMT_MTD: 4
- FMT_MTD.1: 40
- FMT_MTD.1.1: 5
- FMT_REV.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 105
- FMT_SMF.1.1: 12
- FMT_SMR: 4
- FMT_SMR.1: 43
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITC_EXT.1: 2
- FPT_ITC_EXT.1.1: 2
- FPT_ITC_EXT.1.2: 2
- FPT_ITC_EXT.1.3: 2
- FPT_ITT: 2
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_STM: 4
- FPT_STM.1: 2
- FPT_STM_EXT.1: 4
- FPT_STM_EXT.1.1: 4
- FPT_TST: 4
- FPT_TST.1: 32
- FPT_TST.1.1: 4
- FPT_TST.1.2: 4
- FPT_TST.1.3: 4
- FPT_TST.2: 2
- FPT_TST_EXT: 8
- FPT_TST_EXT.1: 22
- FPT_TST_EXT.1.1: 4
- FPT_TST_EXT.1.2: 4
- FTA:
- FTA_SSL: 4
- FTA_SSL.3: 14
- FTA_SSL.3.1: 4
- FTA_TAB: 4
- FTA_TAB.1: 14
- FTA_TAB.1.1: 2
- FTA_TSE: 2
- FTA_TSE.1: 8
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 2
- FTP_ITC_EXT: 4
- FTP_ITC_EXT.1: 23
- FTP_ITC_EXT.1.1: 2
- FTP_ITC_EXT.1.2: 2
- FTP_ITC_EXT.1.3: 2
- FTP_TRP: 2
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 5
- FDP_IFC.2: 8
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 6
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_EVIL: 6
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 4
- A.TOE_NO_BYPASS: 3
- O:
- O.ADMIN_GUIDANCE: 14
- O.AUDIT_GENERATION: 8
- O.CONFIGURATION_: 3
- O.CONFIGURATION_DENTIFICATION: 6
- O.CONFIGURATION_IDENTIFICATION: 6
- O.CORRECT_: 1
- O.CORRECT_TSF_OPERATION: 7
- O.CRYPTOGRAPHY: 14
- O.CRYPTOGRAPHY_VALIDATED: 8
- O.DISPLAY_BANNER: 14
- O.DOCUMENTED_: 3
- O.DOCUMENTED_DESIGN: 8
- O.MANAGE: 20
- O.MEDIATE: 12
- O.PARTIAL_FUNCTIONAL_TESTING: 16
- O.RESIDUAL_: 1
- O.RESIDUAL_INFORMATION: 9
- O.ROGUE_AP_DETECTION: 14
- O.SELF_PROTECTION: 19
- O.TIME_STAMPS: 8
- O.TOE_ACCESS: 14
- O.VULNERABILITY_: 3
- O.VULNERABILITY_ANALYSIS: 5
- OE:
- OE.AUDIT_PROTECTION: 6
- OE.AUDIT_REVIEW: 6
- OE.MANAGE: 10
- OE.NO_EVIL: 8
- OE.NO_GENERAL_PURPOSE: 6
- OE.PHYSICAL: 6
- OE.PROTECT_MGMT_COMMS: 6
- OE.RESIDUAL_INFORMATION: 6
- OE.SELF_PROTECTION: 9
- OE.TIME_STAMPS: 6
- OE.TOE_ACCESS: 8
- OE.TOE_NO_BYPASS: 6
- OSP:
- T:
- T.ACCIDENTAL_: 2
- T.ACCIDENTAL_ADMIN_: 7
- T.ACCIDENTAL_ADMIN_ERROR: 7
- T.ACCIDENTAL_CRYPTO_COMPROMISE: 9
- T.MASQUERADE: 12
- T.POOR_DESIGN: 6
- T.POOR_IMPLEMENTATION: 6
- T.POOR_TEST: 4
- T.RESIDUAL_DATA: 8
- T.TSF_COMPROMISE: 14
- T.UNATTENDED_: 3
- T.UNATTENDED_SESSION: 3
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ACCESS: 9
- T.UNAUTH_ACCESS_POINT: 2
- T.UNAUTH_ADMIN_ACCESS: 14
- T.UNAUTH_AP: 2
|
- A:
- A.PHYSICAL_SECURITY: 2
- A.SECURITY_MAINTENANCE: 1
- A.TRUSTED_ADMIN: 2
- O:
- O.ACCESS: 7
- O.AUDIT: 9
- O.DATA_PROTECTION: 8
- O.ID_AUTH: 7
- O.INTEGRITY: 7
- O.MANAGEMENT: 8
- O.SELF_TEST: 6
- OE:
- OE.PHYSICAL_SECURITY: 4
- OE.SECURITY_MAINTENANCE: 3
- OE.TIME_STAMP: 3
- OE.TRUSTED_ADMIN: 7
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 17
- AES-: 2
- AES-128: 6
- AES-192: 6
- AES-256: 6
- AES128: 1
- DES:
- 3DES:
- TDEA: 4
- TDES: 1
- Triple-DES: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- HMAC: 2
- HMAC-SHA-256: 2
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 2
- Key agreement: 2
- KEX:
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 17
- IKEv1: 30
- IKEv2: 6
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 96
- TLS 1.0: 14
- TLS 1.1: 2
- TLS 1.2: 2
- TLS v1.1: 6
- TLS v1.2: 6
- TLS1.0: 2
- TLSv1.0: 8
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 10
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 10
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 4
- TLS_RSA_WITH_AES_128_CBC_SHA: 13
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 12
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS 140-2: 16
- FIPS 186-2: 2
- FIPS 197: 2
- FIPS 46-3: 2
- FIPS 81: 2
- FIPS PUB 140-2: 4
- FIPS PUB 186-2: 2
- NIST:
- RFC:
- RFC 2346: 4
- RFC 2409: 2
- RFC 2818: 4
- RFC 3146: 1
- RFC 3164: 2
- RFC 3280: 2
- RFC 3602: 2
- RFC 4106: 4
- RFC 4109: 6
- RFC 4252: 8
- RFC 4253: 9
- RFC 4303: 4
- RFC 4346: 2
- RFC 4868: 2
- RFC 4869: 2
- RFC 5216: 5
- RFC 5246: 2
- RFC 5281: 6
- RFC 792: 2
- RFC3164: 1
- RFC3280: 4
- RFC4346: 2
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: CRD003
- /CreationDate: D:20140331105449+05'00'
- /Creator: PrimoPDF http://www.primopdf.com
- /ModDate: D:20140331162840-04'00'
- /Producer: Nitro PDF PrimoPDF
- /Title: Microsoft Word - Motorola_RFS7000_-AP7131_Security_Target_v1.51.docx
- pdf_file_size_bytes: 2408502
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 253
|
- /Author: Admin
- /CreationDate: D:20180626212631-07'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20180626212631-07'00'
- /Producer: GPL Ghostscript 8.64
- /Title: Microsoft Word - ST_A10_Networks_Thunder_TPS _v.1.5_06_26_2018.docx
- pdf_file_size_bytes: 891333
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |