Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
HSL Secure KVM Models SK21D-3, SK21P-3, SK21H-3, SX22D-3, SX22H-3, DK22H-3, DK22P-3, DK22D-3, DK22PD-3, SK41D-3, SK41DU-3, SK41P-3, SK41PU-3, SK41H-3, SK41HU-3, DK42D-3, DK42DU-3, DK42P-3, DK42PU-3, DK42H-3, DK42HU-3, SX42DU-3, SX42PU-3, SX42HU-3, SK81DU-3, DK82DU-3, and SK161DU-3
CCEVS-VR-VID-10701-2016
Cisco Aggregation Services Router (ASR) 1000 Series running IOS XE version 2.4.2t
CCEVS-VR-10361-2011
name HSL Secure KVM Models SK21D-3, SK21P-3, SK21H-3, SX22D-3, SX22H-3, DK22H-3, DK22P-3, DK22D-3, DK22PD-3, SK41D-3, SK41DU-3, SK41P-3, SK41PU-3, SK41H-3, SK41HU-3, DK42D-3, DK42DU-3, DK42P-3, DK42PU-3, DK42H-3, DK42HU-3, SX42DU-3, SX42PU-3, SX42HU-3, SK81DU-3, DK82DU-3, and SK161DU-3 Cisco Aggregation Services Router (ASR) 1000 Series running IOS XE version 2.4.2t
category Other Devices and Systems Boundary Protection Devices and Systems
not_valid_after 24.03.2018 01.11.2014
not_valid_before 24.03.2016 27.06.2011
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10701-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10701-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10361-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10701-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10361-st.pdf
manufacturer High Security Labs Ltd. Cisco Systems, Inc.
manufacturer_web https://www.highseclabs.com/ https://www.cisco.com
security_level {} EAL4+, ALC_FLR.2
dgst ba332eb5c90fb50d 4faedf83e4faff5c
heuristics/cert_id CCEVS-VR-VID-10701-2016 CCEVS-VR-10361-2011
heuristics/cpe_matches {} cpe:2.3:o:cisco:ios_xe:2.4.2:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-20056, CVE-2017-6739, CVE-2015-6282, CVE-2016-6415, CVE-2012-4623, CVE-2017-6738, CVE-2017-6742, CVE-2013-6981, CVE-2023-20097, CVE-2018-0188, CVE-2017-6741, CVE-2011-3282, CVE-2021-1616, CVE-2020-3444, CVE-2018-0194, CVE-2013-6692, CVE-2013-5472, CVE-2011-3274, CVE-2021-1382, CVE-2018-0184, CVE-2021-1625, CVE-2013-5475, CVE-2018-0182, CVE-2012-0381, CVE-2018-0190, CVE-2017-12228, CVE-2018-0185, CVE-2012-0384, CVE-2019-16009, CVE-2016-1409, CVE-2018-0195, CVE-2018-0193, CVE-2018-0189, CVE-2023-20076, CVE-2014-3409, CVE-2013-0149, CVE-2021-1384, CVE-2023-44487, CVE-2017-6737, CVE-2021-34729, CVE-2016-6393, CVE-2018-0186, CVE-2017-6740, CVE-2018-0183, CVE-2017-6743, CVE-2012-0386, CVE-2014-2146, CVE-2024-20271, CVE-2014-3354, CVE-2015-0685, CVE-2011-3272, CVE-2020-3516, CVE-2012-0382, CVE-2017-6736
heuristics/extracted_sars AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, ADV_FSP.1 ADV_INT.1, ADV_TDS.3, AVA_VAN.3, ATE_FUN.1, ALC_CMC.4, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, AGD_USR.1, ALC_LCD.1, ALC_FLR.2, ATE_COV.3, ALC_DVS.1, ALC_TAT.1, ALC_CSC.4, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1
heuristics/extracted_versions 3 2.4.2
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10701/
  • categories: ['Peripheral Switch']
  • category: Peripheral Switch
  • certification_date: 24.03.2016
  • evaluation_facility: DXC.technology
  • expiration_date: 24.03.2019
  • id: CCEVS-VR-VID10701
  • product: HSL Secure KVM Models SK21D-3, SK21P-3, SK21H-3, SX22D-3, SX22H-3, DK22H-3, DK22P-3, DK22D-3, DK22PD-3, SK41D-3, SK41DU-3, SK41P-3, SK41PU-3, SK41H-3, SK41HU-3, DK42D-3, DK42DU-3, DK42P-3, DK42PU-3, DK42H-3, DK42HU-3, SX42DU-3, SX42PU-3, SX42HU-3, SK81DU-3, DK82DU-3, and SK161DU-3
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10701
  • vendor: High Sec Labs, Inc.
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10361/
  • categories: ['Firewall', ' Router', ' Virtual Private Network']
  • category: Firewall
  • certification_date: 27.06.2011
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10361
  • product: Cisco Aggregation Services Router (ASR) 1000 Series running IOS XE version 2.4.2t
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10361
  • vendor: Cisco Systems, Inc.
heuristics/protection_profiles da2e45c9b3fbb700 {}
maintenance_updates
  • maintenance_date: 19.03.2018
  • maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10701-add1.pdf
  • maintenance_st_link: None
  • maintenance_title: Maintenance Update for High Security Labs Secure KVM & Matrix Models: SK21D-3, SK21P-3, SK21H-3, SX22D-3, SX22H-3, DK22H-3, DK22P-3, DK22D-3DK22PD-3, SK41D-3, SK41DU-3, SK41P-3, SK41PU-3, SK41H-3, SK41HU-3, DK42D-3, DK42DU-3, DK42P-3, DK42PU-3, DK42H-3, DK42HU-3, SX42DU-3, SX42PU-3, SX42HU-3, SK81DU-3, DK82DU-3, SK161DU-3
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf {}
pdf_data/cert_filename st_vid10701-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10701-2016: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20160325130912-04'00'
  • /ModDate: D:20160325130934-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 178641
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10701-vr.pdf st_vid10361-vr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10701-2016
    • cert_item: High Security Labs Secure KVM (identified 2, 4, 8, 16 port models
    • cert_lab: US NIAP
  • US:
    • cert_id: CCEVS-VR-10361-2011
    • cert_item: Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Aggregation Services Router (ASR) 1000 Series
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10701-2016: 1
  • US:
    • CCEVS-VR-10361-2011: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 2
    • EAL4: 2
    • EAL4 augmented: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 5
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 1
    • FCS_COP.1: 4
  • FPT:
    • FPT_FLS: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • A.NO_TEMPEST: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
  • O:
    • O.ANTI_TAMPERING: 1
    • O.ANTI_TAMPERING_: 1
    • O.ANTI_TAMPERING_BACKUP_: 2
    • O.ANTI_TAMPERING_INDICATION: 1
    • O.AUTHORIZED_SWITCHING: 1
    • O.COMPUTER_INTERFACE_: 2
    • O.COMPUTER_TO_AUDIO_: 1
    • O.CONTINUOUS_INDICATION: 1
    • O.DISABLE_UNAUTHORIZED_: 2
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 1
    • O.KEYBOARD_MOUSE_: 1
    • O.KEYBOARD_MOUSE_EMULATED: 1
    • O.NO_AMBIGUOUS_CONTROL: 1
    • O.NO_ANALOG_AUDIO_INPUT: 1
    • O.NO_CONNECTED_COMPUTER_: 1
    • O.NO_DOCKING_PROTOCOLS: 1
    • O.NO_OTHER_EXTERNAL_: 1
    • O.NO_TOE_ACCESS: 1
    • O.NO_USER_DATA_RETENTION: 1
    • O.PERIPHERAL_PORTS_ISOLATION: 1
    • O.PURGE_TOE_KB_DATA_WHILE_: 1
    • O.SELF_TEST: 1
    • O.SELF_TEST_FAIL_INDICATION: 1
    • O.SELF_TEST_FAIL_TOE_DISABLE: 1
    • O.TAMPER_EVIDENT_LABEL: 1
    • O.UNIDIRECTIONAL_AUDIO_OUT: 1
    • O.UNIDIRECTIONAL_VIDEO: 1
    • O.UNIDIRERCTIONAL_EDID: 1
    • O.USER_AUTHENTICATION_: 1
    • O.USER_AUTHENTICATION_ADMIN: 1
    • O.USER_AUTHENTICATION_RESET: 1
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 1
  • OE:
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_SWITCHING: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 103
    • Cisco Systems: 2
    • Cisco Systems, Inc: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 11
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSHv2: 11
  • VPN:
    • VPN: 14
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • SPA: 14
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS 140-2: 2
  • NIST:
    • SP 800-56: 2
pdf_data/report_metadata
  • /CreationDate: D:20160325120125-04'00'
  • /ModDate: D:20160325120125-04'00'
  • pdf_file_size_bytes: 423834
  • pdf_hyperlinks: http://highseclabs.com/page/?pid=23
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
  • /Author: Tammy Compton
  • /CreationDate: D:20110706125258
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110706125258
  • /Producer: Microsoft® Office Word 2007
  • /Title: Validation Report for N7K
  • pdf_file_size_bytes: 315972
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename st_vid10701-st.pdf st_vid10361-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 19
    • ADV_FSP.4: 3
    • ADV_IMP.1: 3
    • ADV_IMP.2: 2
    • ADV_INT.1: 1
    • ADV_TDS.3: 11
  • AGD:
    • AGD_OPE.1: 10
    • AGD_PRE.1: 8
    • AGD_USR.1: 2
  • ALC:
    • ALC_CMC.4: 6
    • ALC_CMS.4: 5
    • ALC_CSC.4: 1
    • ALC_DEL.1: 5
    • ALC_DVS.1: 6
    • ALC_FLR.2: 9
    • ALC_LCD.1: 6
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 4
    • ATE_COV.3: 3
    • ATE_DPT: 1
    • ATE_DPT.1: 7
    • ATE_FUN.1: 5
    • ATE_IND.2: 5
  • AVA:
    • AVA_VAN.3: 12
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 79
    • FDP_IFC.1.1: 2
    • FDP_IFF: 2
    • FDP_IFF.1: 85
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 13
    • FDP_RIP: 1
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.3: 12
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 16
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_ATH_EXT: 1
    • FTA_ATH_EXT.1: 11
    • FTA_ATH_EXT.1.1: 2
    • FTA_CIN_EXT: 6
    • FTA_CIN_EXT.1: 9
    • FTA_CIN_EXT.1.1: 2
    • FTA_SSL.4: 1
    • FTA_TAB.1: 1
  • FAU:
    • FAU_ARP: 4
    • FAU_ARP.1: 9
    • FAU_ARP.1.1: 1
    • FAU_ARP_ACK.1: 1
    • FAU_GEN: 5
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_SAA: 5
    • FAU_SAA.1: 8
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 14
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 10
    • FAU_SAR.3.1: 1
    • FAU_SEL: 3
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
    • FAU_STG: 3
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 2
    • FAU_STG.3: 8
    • FAU_STG.3.1: 1
    • FAU_UAU.1: 1
    • FAU_UID.2: 1
  • FCS:
    • FCS_CKM.1: 45
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 13
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 31
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 57
    • FCS_COP.1.1: 5
  • FDP:
    • FDP_ACC.1: 4
    • FDP_ACF.1: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 51
    • FDP_IFC.1.1: 3
    • FDP_IFF: 1
    • FDP_IFF.1: 41
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 4
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_IFF.1.6: 3
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.2: 12
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 3
    • FIA_ATD.1: 17
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 12
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 13
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 13
    • FIA_UID.2.1: 1
    • FIA_USB.1: 12
  • FMT:
    • FMT_MOF.1: 76
    • FMT_MOF.1.1: 8
    • FMT_MSA: 1
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 3
    • FMT_MSA.3: 29
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 48
    • FMT_MTD.1.1: 4
    • FMT_MTD.2: 28
    • FMT_MTD.2.1: 3
    • FMT_MTD.2.2: 3
    • FMT_REV.1: 10
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF.1: 32
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.2: 34
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_ITA.1: 9
    • FPT_ITA.1.1: 1
    • FPT_ITC.1: 9
    • FPT_ITC.1.1: 1
    • FPT_ITI.1: 9
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_RCV.1: 10
    • FPT_RCV.1.1: 1
    • FPT_RCV.2: 9
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_RPL.1: 11
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_RSA.1: 1
    • FPT_STM.1: 15
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 6
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TRP: 1
    • FPT_TST: 1
    • FPT_TST.1: 26
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
  • FRU:
    • FRU_RSA.1: 28
    • FRU_RSA.1.1: 2
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL.1: 11
    • FTA_SSL.1.1: 2
    • FTA_SSL.1.2: 2
    • FTA_SSL.2: 8
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
    • FTA_TAB.1: 9
    • FTA_TAB.1.1: 1
    • FTA_TSE.1: 7
    • FTA_TSE.1.1: 3
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 41
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 5
    • FTP_TRP.1: 37
    • FTP_TRP.1.1: 5
    • FTP_TRP.1.2: 5
    • FTP_TRP.1.3: 6
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIE: 1
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • A.NO_TEMPEST: 3
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ANTI_TAMPERING: 8
    • O.ANTI_TAMPERING_BACKUP_FAIL_T: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TR: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG: 2
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 2
    • O.ANTI_TAMPERING_BACKUP_POWER: 7
    • O.ANTI_TAMPERING_INDICATION: 7
    • O.ANTI_TAMPERING_PERMANENTLY_: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISA: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISAB: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 3
    • O.AUTHORIZED_SWITCHING: 7
    • O.COMPUTER_INTERFACE_ISOLATION: 12
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TO: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TOE: 2
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 4
    • O.COMPUTER_TO_AUDIO_ISOLATION: 7
    • O.CONTINUOUS_INDICATION: 7
    • O.DISABLE_UNAUTHORIZED_ENDPOIN: 2
    • O.DISABLE_UNAUTHORIZED_ENDPOINTS: 5
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 2
    • O.DISABLE_UNAUTHORIZED_PERIPHERAL: 5
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 7
    • O.KEYBOARD_MOUSE_EMULATED: 7
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
    • O.NO_AMBIGUOUS_CONTROL: 7
    • O.NO_ANALOG_AUDIO_INPUT: 8
    • O.NO_CONNECTED_COMPUTER_CONT: 2
    • O.NO_CONNECTED_COMPUTER_CONTRO: 1
    • O.NO_CONNECTED_COMPUTER_CONTROL: 4
    • O.NO_DOCKING_PROTOCOLS: 7
    • O.NO_OTHER_EXTERNAL_INTERFACES: 10
    • O.NO_TOE_ACCESS: 8
    • O.NO_USER_DATA_RETENTION: 9
    • O.PERIPHERAL_PORTS_ISOLATION: 12
    • O.PURGE_TOE: 3
    • O.PURGE_TOE_KB_DATA_WHILE_SWI: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCHI: 2
    • O.SELF_TEST: 9
    • O.SELF_TEST_FAIL_INDICATION: 7
    • O.SELF_TEST_FAIL_TOE_DISABLE: 9
    • O.TAMPER_EVIDENT_LABEL: 9
    • O.UNIDIRECTIONAL_AUDIO_OUT: 7
    • O.UNIDIRECTIONAL_VIDEO: 7
    • O.UNIDIRERCTIONAL_EDID: 7
    • O.USER_AUTHENTICATION_ADMIN: 7
    • O.USER_AUTHENTICATION_ISOLATION: 7
    • O.USER_AUTHENTICATION_RESET: 10
    • O.USER_AUTHENTICATION_TERMINATION: 1
    • O.USER_DATA_ISOLATION: 9
  • OE:
    • OE.PHYSICAL: 4
    • OE.TRUSTED_ADMIN: 6
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNT: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 3
    • T.FAILED: 2
    • T.LOGICAL_TAMPER: 3
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 2
    • T.REPLACEMENT: 3
    • T.RESIDUAL_LEAK: 3
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED_DEVIC: 1
    • T.UNAUTHORIZED_DEVICES: 2
    • T.UNINTENDED_SWITCHI: 1
    • T.UNINTENDED_SWITCHING: 1
  • A:
    • A.AVAILABILI: 1
    • A.AVAILABILITY: 2
    • A.NO_GENER: 1
    • A.NO_GENERAL_PURPOSE: 2
    • A.NO_TOE_BY: 1
    • A.NO_TOE_BYPASS: 2
    • A.PHYSICAL: 3
  • O:
    • O.ADMIN_ROLE: 6
    • O.AUDIT_GENER: 1
    • O.AUDIT_GENERAT: 1
    • O.AUDIT_GENERATION: 4
    • O.AUDIT_PROTEC: 1
    • O.AUDIT_PROTECT: 1
    • O.AUDIT_PROTECTION: 3
    • O.AUDIT_REVIE: 1
    • O.AUDIT_REVIEW: 4
    • O.CHANGE_MAN: 2
    • O.CHANGE_MANA: 1
    • O.CHANGE_MANAGEMENT: 4
    • O.CORRECT_: 6
    • O.CORRECT_TSF_OPERATION: 1
    • O.CRYPTOGRAPH: 4
    • O.CRYPTOGRAPHIC: 1
    • O.CRYPTOGRAPHIC_: 2
    • O.CRYPTOGRAPHIC_FUNCTIONS: 4
    • O.CRYPTOGRAPHY: 1
    • O.CRYPTOGRAPHY_: 2
    • O.CRYPTOGRAPHY_VALIDATED: 1
    • O.DISPLAY_BAN: 2
    • O.DISPLAY_BANNE: 1
    • O.DISPLAY_BANNER: 4
    • O.DOCUMENT_KEY_LEAKAGE: 1
    • O.FUNCTIONAL_TESTING: 1
    • O.HA: 5
    • O.INTEGRITY: 5
    • O.MAINT_MODE: 6
    • O.MANAGE: 6
    • O.MANAGE_INFO: 1
    • O.MANAGE_INFOR: 1
    • O.MEDIATE: 7
    • O.MEDIATE_INFO: 2
    • O.MEDIATE_INFOR: 1
    • O.MEDIATE_INFORMATION_FLOW: 2
    • O.PEER_AUTHEN: 1
    • O.PEER_AUTHENTI: 1
    • O.PEER_AUTHENTICATION: 4
    • O.PEER_AUTHENTICTION: 2
    • O.PROTECT_IN_T: 1
    • O.PROTECT_IN_TR: 1
    • O.PROTECT_IN_TRANSIT: 3
    • O.PROTOCOLS: 5
    • O.REPLAY_DETE: 1
    • O.REPLAY_DETECT: 1
    • O.REPLAY_DETECTION: 5
    • O.RESIDUAL_INF: 6
    • O.RESIDUAL_INFO: 1
    • O.RESIDUAL_INFORMATION: 8
    • O.RESOURCE_SH: 1
    • O.RESOURCE_SHA: 1
    • O.RESOURCE_SHARING: 3
    • O.ROBUST_ADMI: 2
    • O.ROBUST_ADMIN_: 1
    • O.ROBUST_ADMIN_GUIDANCE: 2
    • O.ROBUST_TOE_: 4
    • O.ROBUST_TOE_AC: 1
    • O.ROBUST_TOE_ACCESS: 8
    • O.SELF_PROTECT: 3
    • O.SELF_PROTECTIO: 1
    • O.SELF_PROTECTION: 5
    • O.SOUND_DESIG: 2
    • O.SOUND_DESIGN: 6
    • O.SOUND_IMPLE: 1
    • O.SOUND_IMPLEM: 1
    • O.SOUND_IMPLEMENTATION: 3
    • O.THOROUGH_: 1
    • O.THOROUGH_FU: 2
    • O.THOROUGH_FUNCTIONAL_: 2
    • O.THOROUGH_FUNCTIONAL_TESTING: 2
    • O.TIME_STAMPS: 4
    • O.TRUSTED_PAT: 4
    • O.TRUSTED_PATH: 7
    • O.USER_GUIDAN: 2
    • O.USER_GUIDANCE: 6
    • O.VULNERABILIT: 4
    • O.VULNERABILITY: 1
    • O.VULNERABILITY_ANALYSIS_TEST: 7
  • OE:
    • OE.AVAILABILITY: 2
    • OE.CRYPTANALYTIC: 4
    • OE.NO_GENERAL_PURPO: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 2
  • T:
    • T.ADDRESS_M: 1
    • T.ADDRESS_MASQUERADE: 2
    • T.ADMIN_ERR: 1
    • T.ADMIN_ERROR: 3
    • T.ADMIN_ROG: 1
    • T.ADMIN_ROGUE: 3
    • T.AUDIT_: 1
    • T.AUDIT_COMPROMISE: 2
    • T.CRYPTO_: 1
    • T.CRYPTO_COMPROMISE: 3
    • T.EAVESDROP: 3
    • T.FLAWED_DE: 1
    • T.FLAWED_DESIGN: 2
    • T.FLAWED_IM: 1
    • T.FLAWED_IMPLEMENTATION: 2
    • T.MALICIOUS_: 1
    • T.MALICIOUS_TSF_: 2
    • T.MASQUERA: 1
    • T.MASQUERADE: 2
    • T.NORECOVER: 1
    • T.NORECOVERY: 3
    • T.POOR_TEST: 3
    • T.REPLAY: 3
    • T.RESIDUAL_D: 1
    • T.RESIDUAL_DATA: 2
    • T.RESOURCE_: 1
    • T.RESOURCE_EXHAUSTION: 2
    • T.SPOOFING: 3
    • T.UNATTENDE: 1
    • T.UNATTENDED_SESSION: 2
    • T.UNAUTHORI: 2
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_PEER: 2
    • T.UNIDENTIFI: 1
    • T.UNIDENTIFIED_ACTIONS: 2
    • T.UNKNOWN_: 1
    • T.UNKNOWN_STATE: 2
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 141
    • Cisco Systems, Inc: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • 3DES:
      • TDEA: 3
      • TDES: 3
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 12
  • FF:
    • DH:
      • DH: 9
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-256: 3
      • SHA-384: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • KEX:
    • Key Exchange: 13
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 19
    • IKEv1: 8
  • IPsec:
    • IPsec: 11
  • SSH:
    • SSH: 2
    • SSHv2: 44
  • TLS:
    • TLS:
      • TLS: 3
  • VPN:
    • VPN: 91
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 8
  • RNG:
    • RNG: 10
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CCM:
    • CCM: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 14
  • SCA:
    • SPA: 13
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 140: 2
    • FIPS 140-2: 38
    • FIPS 180-2: 1
    • FIPS PUB 140-2: 5
  • NIST:
    • NIST SP 800-56: 2
    • NIST SP 800-57: 3
    • SP 800-56: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#12: 1
    • PKCS#7: 2
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 5
    • RFC 2409: 7
    • RFC 2560: 1
    • RFC 3280: 1
    • RFC 3457: 4
    • RFC 3547: 3
    • RFC 792: 1
    • RFC2409: 2
  • X509:
    • X.509: 3
pdf_data/st_metadata
  • /CreationDate: D:20160325120218-04'00'
  • /ModDate: D:20160325120218-04'00'
  • pdf_file_size_bytes: 2261116
  • pdf_hyperlinks: http://highseclabs.com/page/?pid=23
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 111
  • /Author: Cisco
  • /CreationDate: D:20110706125434
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110706125434
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1521286
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 133
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different