| name |
EMC VPLEX with GeoSynchrony version 5.0 |
Citrix XenApp 6.0 for Windows Server 2008 R2 - Platinum Edition |
| category |
Other Devices and Systems |
Access Control Devices and Systems |
| scheme |
CA |
UK |
| status |
archived |
archived |
| not_valid_after |
15.05.2017 |
28.02.2016 |
| not_valid_before |
09.01.2012 |
28.02.2011 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-200_CRv1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp257.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EMC%20VPLEX%20with%20GeoSynchrony%205.0%20ST%20v0.6.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/t007-st.pdf |
| manufacturer |
EMC Corporation |
Citrix Systems, Inc. |
| manufacturer_web |
https://www.emc.com/ |
https://www.citrix.com |
| security_level |
EAL2+, ALC_FLR.2 |
EAL2+, ALC_FLR.2 |
| dgst |
a11a37f5ef51dae0 |
d87a9be3bb5e7640 |
| heuristics/cert_id |
383-4-200 |
CRP257 |
| heuristics/cert_lab |
CANADA |
[] |
| heuristics/cpe_matches |
cpe:2.3:a:emc:vplex_geosynchrony:5.0:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2014-0634, CVE-2014-0635, CVE-2014-0633, CVE-2014-0632 |
{} |
| heuristics/direct_transitive_cves |
{} |
CVE-2016-4810 |
| heuristics/indirect_transitive_cves |
{} |
CVE-2014-4700, CVE-2016-6493, CVE-2016-4810 |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
5.0 |
6.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
CRP282 |
| heuristics/report_references/directly_referencing |
{} |
CRP241 |
| heuristics/report_references/indirectly_referenced_by |
{} |
CRP282, CRP281 |
| heuristics/report_references/indirectly_referencing |
{} |
CRP241 |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
383-4-200_CRv1.0.pdf |
crp257.pdf |
| pdf_data/report_frontpage |
- CA:
- cert_id: 383-4-200-CR
- cert_lab: CANADA
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 4
- EAL 2 augmented: 2
- EAL 2+: 2
- EAL2+: 1
|
- EAL:
- EAL2: 3
- EAL2 augmented: 2
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: User
- /CCEF: EWA-Canada
- /CR date: 9 January 2012
- /CR version: 1.0
- /Certificate date: 9 January 2012
- /Company: Microsoft
- /CreationDate: D:20120110175239-05'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer name: EMC Corporation
- /Document number: 383-4-200-CR
- /ETR title, version, date: Evaluation Technical Report for EAL2+ Common Criteria Evaluation of EMC Corporation VPLEX with GeoSynchrony 5.0, Version 1.0, 9 December 2011
- /Evaluation completion date: 9 December 2011
- /ModDate: D:20120110175254-05'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ST Title: EMC Corporation VPLEX with GeoSynchrony 5.0 Security Target
- /ST date: 6 December 2011
- /ST version: 0.6
- /SourceModified: D:20120110225221
- /Sponsor: EMC Corporation
- /TOE Version: 5.0
- /TOE name and version: EMC VPLEX with GeoSynchrony version 5.0
- /TOE short name: VPLEX
- /Title: EAL 2 Evaluation of <TOE name and version>
- pdf_file_size_bytes: 93419
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 12
|
- /Author:
- /Company: Certification Body, CESG
- /CreationDate: D:20110302122612Z
- /Creator: Acrobat PDFMaker 7.0.5 for Word
- /ModDate: D:20110302154835Z
- /Producer: Acrobat Elements 7.0.5 (Windows)
- /Title: Certification Report CRP257
- /_AdHocReviewCycleID: 1808337809
- /_AuthorEmail: Nigel.WhittakerAxon@cesg.gsi.gov.uk
- /_AuthorEmailDisplayName: WhittakerAxon, Nigel
- /_EmailSubject: Word to PDF
- pdf_file_size_bytes: 390909
- pdf_hyperlinks: https://www.citrix.com/lang/English/support.asp
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
| pdf_data/st_filename |
EMC VPLEX with GeoSynchrony 5.0 ST v0.6.pdf |
t007-st.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 3
- EAL2 augmented: 1
- EAL2+: 2
|
- EAL:
- EAL2: 5
- EAL2 augmented: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.2: 6
- FMT_MSA.2.1: 1
- FMT_MSA.3: 4
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_ITC.1: 4
- FPT_RTC.1.1: 2
- FPT_RTC.1.2: 2
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TRC: 1
- FPT_TRC.1: 1
- FTA:
- FTA_SSL.1: 6
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
|
- FCO:
- FCO_SCO: 8
- FCO_SCO.1: 8
- FCO_SCO.1.1: 1
- FCO_SCO.1.2: 1
- FCO_SCO.1.3: 2
- FCO_SCO.1.4: 1
- FCS:
- FCS_ECA: 7
- FCS_ECA.1: 5
- FCS_ECA.1.1: 1
- FDP:
- FDP_ACC: 17
- FDP_ACC.1: 5
- FDP_ACF: 14
- FDP_ACF.1: 10
- FDP_IFC.1: 1
- FIA:
- FIA_ATD: 7
- FIA_ATD.1: 1
- FIA_UAU: 6
- FIA_UAU.2: 1
- FIA_UID: 8
- FIA_UID.1: 2
- FIA_UID.2: 1
- FMT:
- FMT_MOF: 8
- FMT_MOF.1: 1
- FMT_MSA: 25
- FMT_MSA.1: 4
- FMT_MSA.3: 6
- FMT_SMF: 12
- FMT_SMF.1: 3
- FMT_SMR: 14
- FMT_SMR.1: 6
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECTIVITY: 2
- A.MANAGE: 2
- A.NOEVIL: 2
- A.PHYSICAL: 2
- A.SECURE_CONFIG: 2
- A.SECURE_CONNECT: 2
- A.TIMESTAMP: 2
- O:
- O.ADMIN: 10
- O.ADMIN_ROLES: 9
- O.AUDIT: 8
- O.AUTHENTICATE: 8
- O.CONSISTENCY: 5
- O.FAIL_PRO: 4
- O.INACTIVE: 5
- O.STOR_ACC: 7
- O.STRONG_PWD: 6
- O.TIMESTAMP: 5
- OE:
- OE.AUTH_HOSTS: 3
- OE.MANAGE: 3
- OE.NOEVIL: 3
- OE.NTP: 3
- OE.PHYSICAL: 2
- OE.SECURE_COMMUNI: 1
- OE.SECURE_COMMUNICATIO: 2
- OE.SECURE_COMMUNICATION: 1
- OE.SECURE_REMOTE: 3
- OE.SECURE_SERVERS: 3
- OE.TRAFFIC: 3
- T:
- T.DATA_AVAILABILITY: 2
- T.IA: 2
- T.IMPROPER_CONFIG: 2
- T.NO_AUDIT: 2
- T.UNAUTH: 2
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 2
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140: 3
- FIPS 140-2: 7
- FIPS140: 1
- FIPS140-2: 9
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- and hence all additional functionality supplied by these other products and components, are out of scope. The evaluated configuration covers only the publishing of applications; streaming of applications: 1
- 22 1.4.3 Summary of items out of scope of the TOE : 1
- 22 1.4.3 Summary of items out of scope of the TOE ........................................22 1.4.4 Required non-TOE: 1
- TOE components, they do not form part of the logical boundary of the TOE. 1.4.3 Summary of items out of scope of the TOE The items out of scope of the TOE include the Microsoft components on which Citrix: 1
- out of scope: 4
|
| pdf_data/st_metadata |
|
- /Author: SiVenture
- /CreationDate: D:20110210122512Z
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110302154939Z
- /Producer: Microsoft® Office Word 2007
- /Title: CIN4-STt-0001
- pdf_file_size_bytes: 679246
- pdf_hyperlinks: http://www.citrix.com/, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |