Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CyberGuard Firewall for Unix Ware Release 4.3/KnightStar Premium Appliance Firewall 4.3
CRP150
RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
CCEVS-VR-VID-10380-2012
name CyberGuard Firewall for Unix Ware Release 4.3/KnightStar Premium Appliance Firewall 4.3 RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
category Boundary Protection Devices and Systems Other Devices and Systems
scheme UK US
not_valid_after 05.03.2013 31.12.2014
not_valid_before 25.02.2003 21.12.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP150v2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC_ST_v3_Final.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-st.pdf
manufacturer McAfee, Inc. RIOREY Incorporated
manufacturer_web https://www.mcafee.com/ https://www.riorey.com/
dgst 7c2e50edbc7593e3 7f09c099abfb5dbf
heuristics/cert_id CRP150 CCEVS-VR-VID-10380-2012
heuristics/cert_lab [] US
heuristics/extracted_sars ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ALC_CMS.4, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, ADV_FSP.4, ATE_IND.2, ALC_LCD.1, AGD_OPE.1, ADV_ARC.1, ADV_TDS.3, ATE_DPT.1, AVA_VAN.3, ADV_IMP.1
heuristics/extracted_versions 4.3 5.0.12
heuristics/scheme_data
  • category: Miscellaneous
  • certification_date: 21.12.2012
  • evaluation_facility: CygnaCom Solutions, Inc
  • expiration_date: 21.12.2014
  • id: CCEVS-VR-VID10380
  • product: RioRey™ Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10380
  • vendor: RioRey, Inc.
pdf_data/report_filename CRP150v2.pdf st_vid10380-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10380-2012
    • cert_item: RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG) with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • UK:
    • CERTIFICATION REPORT No. P150: 1
  • US:
    • CCEVS-VR-VID10380-2012: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL0: 1
    • EAL1: 1
    • EAL4: 29
    • EAL4 augmented: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E3 assurance: 1
    • ITSEC E3 evaluation: 6
  • EAL:
    • EAL 4: 8
    • EAL 4 augmented: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 6
    • ALC_FLR.1: 45
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 3
  • AVA:
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • RFC:
    • RFC 1858: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Authentication mechanism is outside the scope of the TOE. Note that token authentication is also out of scope because it is third party functionality. The /etc/passwd file is used to support identification: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: djgreg1
  • /CreationDate: D:20030303101416Z
  • /Creator: Microsoft Word
  • /ModDate: D:20131119170143Z
  • /Producer: Acrobat PDFWriter 4.0 for Windows NT
  • /Title: crp150v2.PDF
  • pdf_file_size_bytes: 157012
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
pdf_data/st_filename CC_ST_v3_Final.pdf st_vid10380-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 9
  • ITSEC:
    • ITSEC E3 level: 1
  • EAL:
    • EAL4+: 6
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 2
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_FLR: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 2
    • AVA_SOF.1: 1
    • AVA_VLA.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 2
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_STG.1: 4
  • FDP:
    • FDP_IFC.1: 9
    • FDP_IFC.1.1: 3
    • FDP_IFF.1: 11
    • FDP_IFF.1.1: 4
    • FDP_IFF.1.2: 4
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 2
  • FIA:
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 2
    • FIA_UID.1: 2
    • FIA_UID.2: 12
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MSA.1: 5
    • FMT_MSA.3: 3
    • FMT_SMR.1: 5
  • FPT:
    • FPT_RVM.1: 10
    • FPT_RVM.1.1: 1
    • FPT_STM.1: 5
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 14
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 13
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.PHYSICAL: 3
    • A.TRAIN: 3
  • O:
    • O.ADMIN: 5
    • O.AUDIT: 10
    • O.AUDITMAN: 3
    • O.CONTROL: 13
    • O.EXTMASQ: 8
    • O.IMU: 6
    • O.NETHIDE: 7
    • O.NSP: 7
    • O.PHYSICAL: 5
    • O.PROXY: 9
    • O.REMOTE: 4
    • O.TRAIN: 4
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 5
    • O.TRANSMISSION: 1
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/crypto_protocol
  • VPN:
    • VPN: 1
  • SSH:
    • SSH: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/tee_name
  • other:
    • T6: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • RFC:
    • RFC 1122: 1
    • RFC 1408: 1
    • RFC 1572: 1
    • RFC 822: 1
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /Author: samiri
  • /CreationDate: D:20030228161422Z
  • /Creator:
  • /Keywords:
  • /ModDate: D:20030303101726Z
  • /Producer: Acrobat PDFWriter 3.02 for Windows NT
  • /Subject:
  • /Title: CC_ST_3.0_Definitive_Feb_2003_CBupdate.doc
  • pdf_file_size_bytes: 868921
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 60
  • /CreationDate: D:20130115104027
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130115104027
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1295508
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different