name |
Symfoware Server Enterprise Extended Edition 7.0.2 |
Aruba 6000 and Aruba 800 Series Mobility Controller Running ArubaOS Version 2.4.8.14-FIPS |
category |
Databases |
Network and Network-Related Devices and Systems |
scheme |
JP |
UK |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
23.08.2013 |
not_valid_before |
31.10.2006 |
27.06.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0061_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp246.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/aruba_st.pdf |
manufacturer |
Fujitsu Limited |
Aruba Networks |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.arubanetworks.com |
security_level |
EAL1 |
EAL2+, ACM_SCP.1, ALC_FLR.2, AVA_MSU.1 |
dgst |
99f7dcbd9b823ee5 |
cc27a9b921651b6e |
heuristics/cert_id |
JISEC-CC-CRP-C0061 |
CRP246 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, ADV_SPM.1, ATE_COV.1, AGD_ADM.1, AVA_MSU.1, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2 |
heuristics/extracted_versions |
7.0.2 |
2.4.8.14 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0144
- certification_date: 01.01.2008
- claim: EAL4
- enhanced:
- assurance_level: EAL4
- cc_version: 2.3
- description: PRODUCT DESCRIPTION Symfoware Server is Fujitsu's relational database management system designed for enterprise business. Symfoware Server processes huge data speedily during user's working and also user can use it effectively for their own business style. Using SQL language, user is able to define the data structure, and access to the structured data. Symfoware Server offers the security functions of the user control, the resource control, and the audit log, etc. to protect the data base from malicious access in addition to the function for such a data base access. Symfoware Server runs on Red Hat Enterprise Linux 5(for Intel Itanium).
- evaluation_facility: Information Technology Security Center
- product: Symfoware Server Enterprise Extended Edition
- product_type: IT Product (Database)
- toe_version: 9.0.1
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0144_it7181.html
- toe_japan_name: Symfoware Server Enterprise Extended Edition 9.0.1
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
a91e9c889e6f3e47 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_as_br_v1.0.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0061_ecvr.pdf |
crp246.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0061: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 2
- EAL2 augmented: 2
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20061102205911+09'00'
- /ModDate: D:20061102205911+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 11633
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: CESG
- /CreationDate: D:20080630155350+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20120106115421Z
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Subject: Aruba 6000 and Aruba 800 Series Mobility Controller Running ArubaOS Version 2.4.8.14-FIPS
- /Title: CPR246
- pdf_file_size_bytes: 810545
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
|
aruba_st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ACM_CAP.2: 2
- ACM_SCP.1: 6
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ALC:
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 6
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 12
- FAU_ARP.1.1: 1
- FAU_GEN: 20
- FAU_GEN.1: 10
- FAU_GEN.2: 12
- FAU_SAA.1: 3
- FAU_SAA.3: 11
- FAU_SAA.3.1: 1
- FAU_SAA.3.2: 1
- FAU_SAA.3.3: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FCS:
- FCS_BCM_EXP.1: 4
- FCS_CKM: 65
- FCS_CKM.1: 12
- FCS_CKM.2: 5
- FCS_CKM.4: 10
- FCS_CKM_EXP.2: 18
- FCS_CKM_EXP.2.1: 1
- FCS_COP: 28
- FCS_COP.1: 8
- FCS_COP_EXP.1: 4
- FCS_COP_EXP.2: 4
- FDP:
- FDP_ACC.1: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 7
- FDP_ITC.2: 5
- FDP_PUD_EXP: 1
- FDP_PUD_EXP.1: 13
- FDP_PUD_EXP.1.1: 1
- FDP_RIP: 15
- FDP_RIP.1: 2
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 27
- FIA_ATD.1: 4
- FIA_UAU: 11
- FIA_UAU.1: 3
- FIA_UAU_EXP: 19
- FIA_UAU_EXP.5: 4
- FIA_UID: 19
- FIA_UID.1: 8
- FIA_UID.2: 3
- FIA_USB.1: 10
- FIA_USB.1.1: 3
- FMT:
- FMT_MOF: 49
- FMT_MOF.1: 6
- FMT_MSA.1: 2
- FMT_MSA.2: 24
- FMT_MTD: 41
- FMT_MTD.1: 6
- FMT_SMF: 55
- FMT_SMF.1: 16
- FMT_SMR: 19
- FMT_SMR.1: 16
- FPT:
- FPT_RVM: 19
- FPT_RVM.1: 2
- FPT_SEP: 19
- FPT_SEP.1: 4
- FPT_STM: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_STM_EXP: 2
- FPT_STM_EXP.1: 10
- FPT_STM_EXP.1.1: 1
- FPT_TRP: 2
- FPT_TST.1: 2
- FPT_TST_EXP.1: 9
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FPT_TST_EXP.1.3: 1
- FPT_TST_EXP.2: 12
- FPT_TST_EXP.2.1: 1
- FPT_TST_EXP.2.2: 1
- FTA:
- FTA_SSL: 3
- FTA_SSL.3: 15
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXP: 21
- FTP_ITC_EXP.1: 6
- FTP_TRP: 38
- FTP_TRP.1: 14
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMIN: 3
- A.BYPASS: 3
- A.LOCATE: 3
- A.NO_EVIL: 1
- A.NO_GENERAL_PURPOSE: 1
- A.NO_GENRL: 3
- A.PHYSICAL: 1
- A.TOE_NO_BYPASS: 1
- O:
- O.ADMIN_GUIDANCE: 2
- O.AUDIT_GEN: 3
- O.AUDIT_GENERATION: 1
- O.BANNER: 4
- O.BYPASS: 1
- O.CONFIGURATION: 1
- O.CONFIGURATION_: 1
- O.CORRECT: 6
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTO: 7
- O.CRYPTOGRAPHY: 1
- O.CRYPTOGRAPHY_VALIDATED: 1
- O.DISPLAY_BANNER: 1
- O.DOCUMENTED_: 2
- O.INTRUSION: 8
- O.MANAGE: 11
- O.MEDIATE: 1
- O.PARTIAL_: 1
- O.PARTIAL_FUNCTIONAL_TESTING: 1
- O.PROTECT_COMMS: 1
- O.RESIDUAL: 8
- O.RESIDUAL_: 1
- O.SELF_PROTECT: 8
- O.SELF_PROTECTION: 1
- O.TIME: 3
- O.TIME_STAMPS: 1
- O.TOE_ACCESS: 11
- O.TRAFFIC: 8
- O.VULNERABILITY_: 2
- OE:
- OE.ADMIN: 6
- OE.AUDIT_PROTECT: 6
- OE.AUDIT_PROTECTION: 1
- OE.AUDIT_REVIEW: 4
- OE.BYPASS: 5
- OE.MANAGE: 10
- OE.NO_EVIL: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_GENRL: 3
- OE.PHYSICAL: 1
- OE.PROTECT: 2
- OE.PROTECT_COMMS: 3
- OE.PROTECT_MGMT_COMMS: 1
- OE.RESIDUAL: 9
- OE.RESIDUAL_INFORMATION: 1
- OE.SELF_PROTECT: 5
- OE.SELF_PROTECTION: 1
- OE.TIME: 6
- OE.TIME_STAMPS: 1
- OE.TOE_ACCESS: 6
- OE.TOE_NO_BYPASS: 1
- T:
- T.ACCESS: 3
- T.ACCIDENTAL_ADMIN_ERROR: 1
- T.ACCIDENTAL_CRYPTO_COMPROMISE: 1
- T.ATTACK: 3
- T.CRYPTO: 3
- T.ERROR: 3
- T.IMPERSON: 3
- T.INTERNAL: 3
- T.MASQUERADE: 1
- T.POOR_DESIGN: 2
- T.POOR_IMPLEMENTATION: 2
- T.POOR_TEST: 2
- T.RESIDUAL: 3
- T.RESIDUAL_DATA: 1
- T.SESSION: 3
- T.TSF_COMPROMISE: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTH_ADMIN_ACCESS: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 2
- FIPS:
- FIPS 140-2: 61
- FIPS PUB 180-2: 2
- FIPS PUB 197: 2
- FIPS PUB 198: 2
- FIPS PUB 46-3: 2
- PKCS:
- RFC:
- RFC 2246: 1
- RFC 2631: 4
- RFC 2716: 1
- RFC 2865: 1
- RFC 2866: 1
- RFC 3748: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: CESG
- /CreationDate: D:20080529101401Z
- /Creator: PrimoPDF http://www.primopdf.com
- /ModDate: D:20080704101321+01'00'
- /Producer: PrimoPDF
- /Subject: Aruba 6000 and Aruba 800 Series Mobility Controller, version 1.8, May 2008
- /Title: Aruba 6000 and Aruba 800 Series Mobility Controller Security Target
- pdf_file_size_bytes: 791968
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 101
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |