Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Thinklogical TLX320 Matrix Switch
SERTIT-076
Motorola Network Gateways GGM 8000, S6000, and S2500
CCEVS-VR-VID-10378-2012
name Thinklogical TLX320 Matrix Switch Motorola Network Gateways GGM 8000, S6000, and S2500
scheme NO US
not_valid_after 22.09.2021 01.11.2014
not_valid_before 22.09.2016 30.06.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160922%20Sertit-076%20CR%20v1.0%20Certification%20Report%20TLX320.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10378-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ThinklogicalSecurityTarget_1_3_TLX320.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10378-st.pdf
manufacturer Thinklogical Motorola, Inc.
manufacturer_web https://www.thinklogical.com/ https://www.motorola.com/
security_level EAL4 EAL2+, ALC_FLR.2
dgst a67b05a18bbe6cfc 42b8859a25b84d39
heuristics/cert_id SERTIT-076 CCEVS-VR-VID-10378-2012
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ADV_TDS.1, ALC_CMS.4, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions - 8000
heuristics/scheme_data
  • category: Other Devices and Systems
  • certification_date: 22.09.2016
  • developer: Thinklogical
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-076
    • certification_date: 22.09.2016
    • description: The TOE provides remote connections from a set of shared computers to a set of shared peripherals. The switching capability of the TOE is used to connect ports on a particular computer to a particular peripheral set. The corresponding electronic signal from a computer port is transformed into an optical signal by the Velocity extender, transmitted through an optical fiber, switched by the TOE to another optical fiber, and then transformed back to an electronic form by the Velocity extender. The resulting signal is used by the shared peripherals. The TOE provides a capability to dynamically change the switching configuration to connect a particular computer to a particular peripheral set. The TOE enforces secure separation of information flows corresponding to different switched connections. The corresponding Data Separation Security Policy is the main security feature of the TOE.
    • developer: Thinklogical
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135040-1607952626/SERTIT/Sertifikater/2016/76/20160922%20Sertit-076%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135043-1607952629/SERTIT/Sertifikater/2016/76/ThinklogicalSecurityTarget_1_3_TLX320.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135046-1607952632/SERTIT/Sertifikater/2016/76/20160922%20Sertit-076%20CR%20v1.0%20Certification%20Report%20TLX320.pdf'})]})
    • evaluation_facility: Norconsult AS
    • level: EAL 4
    • mutual_recognition: CCRA, SOG-IS
    • product: TLX320 Matrix Switch Chassis (TLX-MSC-000320 Rev A), TLX48 / TLX320 Matrix Switch Data Input and Output Card, 16 Ports, SFP+, Multi-Mode (TLX-MSD-M00016 Rev A), Single Mode (TLX-MSDS00016 Rev A), Velocity Matrix Switch 320 Data Input Retimer Card, 16 Ports, SFP+, Multi-Mode (VXM-D00T16 Rev A), Single Mode (VXM-D0ST16 Rev A)
  • product: Thinklogical TLX320 Matrix Switch
  • url: https://sertit.no/certified-products/product-archive/thinklogical-tlx320-matrix-switch
  • category: Miscellaneous
  • certification_date: 30.06.2012
  • evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10378
  • product: Motorola Network Gateways GGM 8000, S6000, and S2500
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10378
  • vendor: Motorola Mobility LLC
pdf_data/report_filename 20160922 Sertit-076 CR v1.0 Certification Report TLX320.pdf st_vid10378-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10378-2012
    • cert_item: Motorola Solutions, Inc. Motorola Network Devices S2500, S6000, GGM 8000 with EOS Version 16.0
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-076: 16
  • US:
    • CCEVS-VR-VID10378-2012: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 19
    • EAL1: 1
    • EAL7: 1
  • EAL:
    • EAL 2: 6
    • EAL 2 augmented: 3
    • EAL2: 3
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • ALC:
    • ALC_FLR.2: 6
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ETC.1: 1
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
    • FDP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.EMISSIO: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
    • A.SCENARIO: 1
  • O:
    • O.CONF: 1
    • O.CONNECT: 1
  • OE:
    • OE.EMISSIO: 1
    • OE.MANAGE: 1
    • OE.NOEVIL: 1
    • OE.PHYSICAL: 1
    • OE.SCENARIO: 1
  • T:
    • T.ATTACK: 1
    • T.INSTALL: 1
    • T.RESIDUAL: 1
    • T.STATE: 1
  • A:
    • A.AVAILABILITY: 1
    • A.EAUTH: 1
    • A.NOEVIL: 1
    • A.NTP_SERVER: 1
    • A.PHYSICAL: 1
    • A.USE: 1
  • T:
    • T.AUDACC: 1
    • T.AUDIT_COMP: 1
    • T.EAVESDROP: 1
    • T.MASQUERADE: 1
    • T.PEER: 1
    • T.RESOURCE: 1
    • T.TSF_COMP: 1
    • T.UNATTENDED: 1
    • T.UNAUTH: 1
    • T.UNIDENT: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
pdf_data/report_keywords/eval_facility
  • Norconsult:
    • Norconsult AS: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • TDES: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 5
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSHv2: 7
  • VPN:
    • VPN: 5
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 4
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 140-2: 6
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Rage, Arne Høye
  • /CreationDate: D:20160922162516Z00'00'
  • /Creator: Microsoft Word
  • /Keywords: ugradert
  • /ModDate: D:20160922162516Z00'00'
  • /Producer: Mac OS X 10.11.6 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 875983
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Author: Mallett
  • /CreationDate: D:20120725082018
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20120725082018
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 653519
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename ThinklogicalSecurityTarget_1_3_TLX320.pdf st_vid10378-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL4: 7
  • EAL:
    • EAL 2: 7
    • EAL 2 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 7
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
  • FMT:
    • FMT_MSA.3: 3
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_BCM: 1
    • FCS_BCM_EXT: 2
    • FCS_BCM_EXT.1: 10
    • FCS_BCM_EXT.1.1: 2
    • FCS_BCM_EXT.1.2: 2
    • FCS_CKM: 10
    • FCS_CKM.1: 5
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP: 24
    • FCS_COP.1: 5
    • FCS_IKE_EXT: 3
    • FCS_IKE_EXT.1: 13
    • FCS_IKE_EXT.1.1: 2
    • FCS_IKE_EXT.1.2: 2
    • FCS_IKE_EXT.1.3: 1
    • FCS_IKE_EXT.1.4: 2
    • FCS_IKE_EXT.1.5: 1
    • FCS_IKE_EXT.1.6: 1
    • FCS_IKE_EXT.1.7: 2
    • FCS_IKE_EXT.1.8: 2
    • FCS_IKE_EXT.1.9: 2
  • FDP:
    • FDP_IFC: 16
    • FDP_IFC.1: 3
    • FDP_IFF: 19
    • FDP_IFF.1: 11
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 15
    • FIA_ATD.1: 2
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 12
    • FMT_MOF.1: 2
    • FMT_MSA: 23
    • FMT_MSA.1: 5
    • FMT_MSA.3: 5
    • FMT_MTD: 16
    • FMT_MTD.1: 6
    • FMT_SMF: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
  • FRU:
    • FRU_RSA.1: 7
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.EMISSION: 2
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
    • A.SCENARIO: 2
  • O:
    • O.CONF: 7
    • O.CONNECT: 3
    • O.CRYPTOGRAPHY: 1
  • OE:
    • OE.EMISSION: 2
    • OE.INSTAL: 1
    • OE.MANAGE: 4
    • OE.NOEVIL: 2
    • OE.PHYSICAL: 2
    • OE.SCENARIO: 2
  • T:
    • T.ATTACK: 3
    • T.COMINT: 1
    • T.INSTALL: 3
    • T.RESIDUAL: 3
    • T.STATE: 3
  • A:
    • A.AVAILABILITY: 3
    • A.EAUTH: 3
    • A.NOEVIL: 2
    • A.NTP_SERVER: 2
    • A.PHYSICAL: 2
    • A.USE: 3
  • O:
    • O.AUDIT_GEN: 7
    • O.AUDIT_PROT: 6
    • O.AUDIT_REVIEW: 9
    • O.CRYPTO: 5
    • O.MANAGE: 7
    • O.MEDIATE: 5
    • O.PEER: 7
    • O.PROTECT_IN_TRANSIT: 5
    • O.RESOURCE: 6
    • O.ROBUST_TOE: 5
    • O.TIME_STAMPS: 7
    • O.TRUSTED_PATH: 5
    • O.UNATTEND_PROTECT: 7
  • OE:
    • OE.AVAILABILITY: 3
    • OE.EAUTH: 3
    • OE.NOEVIL: 3
    • OE.NTP_SERVER: 3
    • OE.PHYSICAL: 3
    • OE.USE: 3
  • T:
    • T.AUDACC: 3
    • T.AUDIT_COMP: 2
    • T.EAVESDROP: 3
    • T.MASQUERADE: 3
    • T.PEER: 1
    • T.RESOURCE: 2
    • T.TSF_COMP: 1
    • T.UNATTENDED: 3
    • T.UNAUTH: 2
    • T.UNIDENT: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
  • DES:
    • 3DES:
      • TDES: 6
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 5
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA-1: 8
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 6
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 31
  • IPsec:
    • IPsec: 17
  • SSH:
    • SSH: 1
    • SSHv2: 12
  • VPN:
    • VPN: 11
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 21
    • FIPS 180-2: 1
    • FIPS 186-2: 3
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS PUB 140-2: 1
  • PKCS:
    • PKCS#1: 2
  • RFC:
    • RFC 1321: 1
    • RFC 2274: 1
    • RFC 2409: 10
    • RFC 2574: 2
    • RFC 3526: 1
  • X509:
    • X.509: 3
pdf_data/st_metadata
  • /Author: MICHELE ROBERTS
  • /CreationDate: D:20160922164335+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20160922164335+00'00'
  • /Title:
  • pdf_file_size_bytes: 487151
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /Author: seckgren
  • /CreationDate: D:20120709093220-07'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20120709093220-07'00'
  • /Producer: Acrobat Distiller 10.1.3 (Windows)
  • /Title: Microsoft Word - 01j - Motorola MNR ST 1.0_jzh.KY - CLEAN.docx
  • pdf_file_size_bytes: 293142
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different