name |
IPCOM EX Series Firmware Security Component V1.0.00 |
Suite logicielle STORMSHIELD Firewall, version 2.2.6 |
category |
Boundary Protection Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
07.01.2013 |
26.08.2021 |
not_valid_before |
22.03.2007 |
26.08.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0088_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_55.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2016_55fr.pdf |
manufacturer |
Fujitsu Limited |
Stormshield |
manufacturer_web |
|
https://www.stormshield.eu/ |
security_level |
EAL1 |
AVA_VAN.3, EAL3+, ALC_CMC.4, ALC_FLR.3, ALC_CMS.4 |
dgst |
a9d6e88aae2b318f |
9293336fdf311ec9 |
heuristics/cert_id |
JISEC-CC-CRP-C0088 |
ANSSI-CC-2016/55 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_IMP.1, ADV_ARC.1, ADV_FSP.4, ATE_IND.2, AGD_PRE.1, ALC_CMC.4, AVA_VAN.3, AGD_OPE.1, ASE_REQ.2, ASE_ECD.1, ATE_COV.2, ALC_FLR.3, ASE_SPD.1, ASE_OBJ.2, ADV_TDS.3, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ATE_DPT.1, ALC_DVS.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1, ALC_CMS.4 |
heuristics/extracted_versions |
1.0.00 |
2.2.6 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2016/56 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2016/56 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0088
- certification_date: 01.03.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION This product is the embedded firmware of firewall appliance that provides the following functions. - IP packet filtering - Operational assistance - Configuration These functions shield the traffic resources on internal network from threats of illegal access and keep the advantage that resources on external network can be used. This product is previously installed as a firmware of following appliances of Fujitsu Limited. - IPCOM EX1000 SC - IPCOM EX1200 SC - IPCOM EX2000 SC - IPCOM EX1000 LB - IPCOM EX1200 LB - IPCOM EX2000 LB
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
- product: IPCOM EX Series Firmware Security Component
- product_type: IT Product (Firewall)
- toe_version: V1.0.00
- vendor: Fujitsu Limited
- expiration_date: 01.03.2013
- revalidations: [frozendict({'date': '2007-07', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0088_it6105_01.html'})]
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0088_it6105.html
- toe_japan_name: IPCOM EX Series Firmware Security Component V1.0.00
- toe_overseas_link: None
- toe_overseas_name: IPCOM EX Series Firmware Security Component V1.1.00
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0088_ecvr.pdf |
ANSSI-CC-2016_55.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0088: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 3
- EAL 5: 1
- EAL 7: 1
- EAL3: 3
- EAL4: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 4
- ALC_CMS: 1
- ALC_CMS.4: 4
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 4
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- miscellaneous:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20070323205356+09'00'
- /ModDate: D:20070323205356+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13167
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20160902152454+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160902152454+02'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 722372
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
|
ANSSI_cible2016_55fr.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- NL:
- CC-01: 3
- CC-02: 6
- CC-03: 4
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL3: 22
- EAL3 augmented: 1
- EAL3+: 2
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 5
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 5
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_FLR.3: 4
- ALC_LCD.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 4
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP: 2
- FAU_ARP.1: 14
- FAU_ARP.1.1: 2
- FAU_GEN: 1
- FAU_GEN.1: 8
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 4
- FAU_GEN.2: 6
- FAU_GEN.2.1: 2
- FAU_SAA.1: 2
- FAU_SAA.4: 9
- FAU_SAA.4.1: 6
- FAU_SAA.4.2: 2
- FAU_SAA.4.3: 3
- FAU_SAR.1: 7
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_STG.3: 7
- FAU_STG.3.1: 2
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.4: 6
- FCS_COP.1: 50
- FDP:
- FDP_ACC.1: 2
- FDP_ACC.2: 6
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_IFC.1: 10
- FDP_IFC.1.1: 2
- FDP_IFC.2: 6
- FDP_IFC.2.1: 3
- FDP_IFC.2.2: 2
- FDP_IFF.1: 30
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_UCT.1: 11
- FDP_UCT.1.1: 2
- FDP_UIT.1: 12
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 2
- FIA:
- FIA_UAU.5: 26
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 2
- FIA_UID.1: 2
- FIA_UID.2: 1
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 3
- FMT_MSA.3: 2
- FMT_MTD: 22
- FMT_MTD.1: 11
- FMT_MTD.1.1: 3
- FMT_SMF: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 2
- FMT_SMR.1: 8
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 4
- FPT:
- FPT_ITT.1: 10
- FPT_ITT.1.1: 2
- FPT_STM.1: 6
- FPT_STM.1.1: 2
- FPT_TDC.1: 8
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 2
- FTP:
- FTP_ITC.1: 2
- FTP_ITT.1: 1
- FTP_TRP.1: 45
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.BACKUP_RESTORATION: 4
- O.CRYPTO: 4
- O.IPS_ATTACK_DETECTION: 8
- O.IPS_RFC_COMPLIANCE: 7
- O.LAA_IPS: 9
- O.LAA_PCAOA: 13
- O.LAA_PCFI: 8
- O.PCAOA: 13
- O.PCFI_APPLICATION_CONTEXT: 4
- O.PCFI_ENCRYPTION: 13
- O.PCFI_FILTERING: 7
- O.PROTECT_ADMIN_SESSIONS: 6
- O.PROTECT_LOGS: 4
- O.RESIST_AUTH_ADMIN: 6
- OE:
- OE.AUTONOMOUS: 3
- OE.CRYPTO_EXT: 3
- OE.GOOD_PCFI: 3
- OE.INTERPOSITION: 4
- OE.PASSWORD: 3
- OE.PERSONNEL: 3
- OE.PROTECT_APPLIANCES: 3
- OE.PROTECT_VPN_CLIENTS: 3
- OE.PROTECT_VPN_PEER: 3
- OE.PROTECT_WORKSTATIONS: 3
- OE.STRICT_USAGE: 3
- OE.SUPER_ADMIN: 3
- T:
- T.ADMIN_USURP: 3
- T.AUDIT_LOSS: 2
- T.ILLEGAL_ADMIN: 17
- T.ILLEGAL_ADMIN_SESSION: 4
- T.IMPROPER_USE: 10
- T.IP_SPOOFING: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 50
- IKEv1: 10
- IKEv2: 7
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-1: 1
- FIPS 180-2: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- PKCS:
- RFC:
- RFC 1034: 1
- RFC 1035: 1
- RFC 1058: 1
- RFC 1321: 1
- RFC 1349: 1
- RFC 2104: 1
- RFC 2144: 1
- RFC 2246: 2
- RFC 2385: 1
- RFC 2389: 1
- RFC 2401: 2
- RFC 2406: 1
- RFC 2408: 1
- RFC 2409: 3
- RFC 2428: 1
- RFC 2453: 1
- RFC 2474: 1
- RFC 2518: 1
- RFC 2577: 1
- RFC 2616: 1
- RFC 2631: 1
- RFC 2817: 1
- RFC 3253: 1
- RFC 3261: 1
- RFC 3268: 1
- RFC 3330: 1
- RFC 3376: 1
- RFC 3435: 1
- RFC 3526: 1
- RFC 3550: 1
- RFC 3605: 1
- RFC 6455: 1
- RFC 7427: 1
- RFC 768: 1
- RFC 792: 1
- RFC 793: 1
- RFC 959: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- protocol, the connection is set up by the web browser on the administration workstation which is out of scope. Likewise the TLS protocol itself is outside the scope of this evaluation. Rationale: the trusted: 1
|
pdf_data/st_metadata |
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: SN_ASE_sectarget_v2.9a
- pdf_file_size_bytes: 1575335
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 89
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |