| name |
Aruba, a Hewlett Packard Enterprise company Virtual Intranet Access (VIA) Client Version 3.0 |
Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific Version: Controller ROM Ver. 1.180.7 |
| category |
Other Devices and Systems |
Multi-Function Devices |
| scheme |
US |
JP |
| status |
archived |
archived |
| not_valid_after |
08.11.2020 |
17.01.2013 |
| not_valid_before |
08.05.2018 |
28.11.2008 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10871-ci.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10871-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0196_erpt.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10871-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0196_est.pdf |
| manufacturer |
Aruba Networks |
Fuji Xerox Co., Ltd. |
| manufacturer_web |
https://www.arubanetworks.com |
https://www.fujixerox.co.jp/eng/ |
| security_level |
{} |
EAL3 |
| dgst |
911ae09c8f5a54f5 |
35dd94d58cbf463e |
| heuristics/cert_id |
CCEVS-VR-10871-2018 |
JISEC-CC-CRP-C0196 |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, AVA_VAN.1, ADV_FSP.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, AGD_PRE.1, ASE_ECD.1, AVA_VAN.2, ASE_REQ.1, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, AGD_OPE.1, ALC_CMS.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
3.0 |
1.180.7 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10871/
- categories: ['Virtual Private Network']
- category: Virtual Private Network
- certification_date: 08.05.2018
- evaluation_facility: Gossamer Security Solutions
- expiration_date: 08.02.2021
- id: CCEVS-VR-VID10871
- product: Aruba, a Hewlett Packard Enterprise company Virtual Intranet Access (VIA) Client Version 3.0
- scheme: US
- url: https://www.niap-ccevs.org/products/10871
- vendor: Aruba, a Hewlett Packard Enterprise Company
|
- cert_id: JISEC-CC-CRP-C0196
- certification_date: 01.11.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0196_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Peripheral (MFP) that provides copy, print, scan, and fax functions as basic functions.The MFP is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the MFP via internal network, and general user client which is directly linked to the MFP. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - System Administrator’s Security Management - Customer Engineer Operation Restriction - FAX Flow Security
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific
- product_type: Control Software for Multi Function Peripheral
- report_link: https://www.ipa.go.jp/en/security/c0196_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0196_est.pdf
- toe_version: Controller ROM Ver.1.180.7
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.03.2013
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0196_it8225.html
- toe_overseas_name: Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific Controller ROM Ver.1.180.7
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
db7434eb64f09c94 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_vpn_ipsec_client_v1.4.pdf |
{} |
| pdf_data/cert_filename |
st_vid10871-ci.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10871-2018: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20180509134957-04'00'
- /ModDate: D:20180509134957-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 182485
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
st_vid10871-vr.pdf |
c0196_erpt.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-10871-2018
- cert_item: Aruba, a Hewlett Packard Enterprise Company 3333 Scott Blvd Santa Clara, CA 95054 USA Aruba Virtual Intranet Access (VIA) Client Version 3.0
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0196-01: 1
- Certification No. C0196: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 1
- A.NET: 1
- A.SECMODE: 1
- T:
- T.CONFDATA: 1
- T.RECOVER: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20180509132857-04'00'
- /ModDate: D:20180509132857-04'00'
- pdf_file_size_bytes: 449382
- pdf_hyperlinks: http://www.zerodayinitiative.com/advisories, http://www.exploitsearch.net/, https://access.redhat.com/documentation/en-us/%20red_hat_enterprise_linux/, http://www.kb.cert.org/vuls/, http://nessus.org/plugins/index.php?view=search, https://web.nvd.nist.gov/vuln/search, https://www.rapid7.com/db/vulnerabilities, https://wiki.centos.org/Documentation, https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/, https://www.exploit-db.com/, http://www.securiteam.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
- /CreationDate: D:20090109163527+09'00'
- /ModDate: D:20090109163527+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 129825
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
| pdf_data/st_filename |
st_vid10871-st.pdf |
c0196_est.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 4
- ALC_CMS: 1
- ALC_CMS.1: 5
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.3: 1
- ADV_TDS.1: 3
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.1: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_LCD.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 2
- ASE_INT.1: 3
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 1
- ATE_FUN.1: 3
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 12
- FCS_CKM_EXT: 6
- FCS_CKM_EXT.2: 1
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.4: 1
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 20
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 1
- FDP_IFC_EXT: 1
- FDP_RIP: 2
- FDP_RIP.2: 1
- FDP_RIP.2.1: 1
- FMT:
- FPT:
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 1
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.1.2: 1
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 1
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 1
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 4
- FCS_COP.1: 8
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 10
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU: 1
- FIA_UAU.1: 3
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 7
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 2
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
| pdf_data/st_keywords/cc_claims |
- OE:
- OE.NO_TOE_BYPASS: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_CONFIG: 1
|
- A:
- A.ADMIN: 4
- A.NET: 4
- A.SECMODE: 3
- O:
- O.CIPHER: 9
- O.FAX_SEC: 5
- O.MANAGE: 8
- O.RESIDUAL: 6
- OE:
- OE.ADMIN: 4
- OE.AUTH: 5
- OE.FUNCTION: 6
- OE.NET: 3
- T:
- T.CONFDATA: 3
- T.RECOVER: 4
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 6
- HMAC-SHA-256: 4
- HMAC-SHA-384: 4
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 10
- IKEv1: 2
- IKEv2: 14
- IPsec:
- TLS:
- VPN:
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 186-2: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186-3: 1
- FIPS PUB 186-4: 4
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 1
- NIST SP 800-57: 1
- RFC:
- RFC 2560: 2
- RFC 3602: 2
- RFC 3947: 1
- RFC 4106: 1
- RFC 4301: 2
- RFC 4303: 1
- RFC 4307: 1
- RFC 4945: 2
- RFC 5280: 2
- RFC 6379: 1
- X509:
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
- /Author: kurata-masami
- /CreationDate: D:20090105132826+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20090109101350+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: Microsoft Word - ApeosPort-Ⅱ 7000_AP_ ST_V1.0.9_E.doc
- pdf_file_size_bytes: 327717
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |