Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
MX-FR42 D.10
JISEC-CC-CRP-C0449
Cisco Converged AccessVersion: Software Version 3.6.1E Components: TOE hardware models: Cisco Catalyst 3650, 3850, and WLC 5760 with APs 1600i/e, 2600i/e, 3500i/e, 3600 i/e (optional IEEE 802.11ac module) and 1552e
Certificate Number: 2015/92
name MX-FR42 D.10 Cisco Converged AccessVersion: Software Version 3.6.1E Components: TOE hardware models: Cisco Catalyst 3650, 3850, and WLC 5760 with APs 1600i/e, 2600i/e, 3500i/e, 3600 i/e (optional IEEE 802.11ac module) and 1552e
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme JP AU
not_valid_after 02.12.2019 09.12.2020
not_valid_before 27.11.2014 02.07.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0449_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2015_92_Cisco_Converged_Access_CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0449_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cisco_Converged_Access_WLAN_ST_v1.0.pdf
manufacturer Sharp Corporation Cisco Systems, Inc.
manufacturer_web https://sharp-world.com/ https://www.cisco.com
security_level EAL3 {}
dgst c934edb47ed50e04 f4cbda955f32bef8
heuristics/cert_id JISEC-CC-CRP-C0449 Certificate Number: 2015/92
heuristics/cpe_matches {} cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*
heuristics/extracted_sars ALC_DVS.1, ATE_IND.2, ALC_LCD.1, ATE_DPT.1, ALC_CMC.3, ASE_CCL.1, AGD_OPE.1, ASE_SPD.1, AVA_VAN.2, ADV_FSP.3, ASE_OBJ.2, ATE_COV.2, ALC_CMS.3, ADV_ARC.1, ATE_FUN.1, ADV_TDS.2, ASE_INT.1, ASE_TSS.1, ASE_REQ.2, ALC_DEL.1, AGD_PRE.1, ASE_ECD.1 ALC_CMS.1, AVA_VAN.1, ATE_IND.1, AGD_PRE.1, ALC_CMC.1, ADV_FSP.1, AGD_OPE.1
heuristics/extracted_versions 10 802.11, 3.6.1
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0449
  • certification_date: 01.11.2014
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0449_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is an IT product, composed of 2 parts, to protect data in a Multi Function Device (hereafter referred to as an“MFD”). One part is a hardware part in an MFD and provided in the form of an MFD. The other part is a firmware product and provided as an upgrade kit for the firmware of the MFD. An MFD is an office machine that has imaging functions such as copy, printer, image scanning and fax. TOE security functions The TOE counters unauthorized disclosure of image data by: - the encryption function, which encrypts data, such as image data that the MFD handles, before storing the data to the HDD in the MFD, - the cryptographic key generation function, generates a seed for a cryptographic key once when the TOE is installed, and generates a constant cryptographic key from the seed whenever the MFD is powered, and stores the key in a volatile memory for the encryption function, - the data erasure function, which automatically overwrites to erase image data no longer in use in the HDD, and overwrites to erase all data when invoked by the administrator of an MFD in use or no longer in use, - the authentication function, which authenticates the TOE administrator with a password, and provides the TOE administrator with a management function for changing his password, - the confidential file function, which provides image data filed by users with password protection, and - the network protection functions, which counters malicious attempts (of unauthorized network-accesses, communication data wiretaps, and network settings falsifications), and - the fax flow control function, which counters attempts to access to the internal network via the MFD network interface from public telephone networks on the MFD fax interface.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: MX-FR42
    • product_type: data protection function in Multi Function Device
    • report_link: https://www.ipa.go.jp/en/security/c0449_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0449_est.pdf
    • toe_version: D.10
    • vendor: Sharp Corporation
  • expiration_date: 01.12.2019
  • supplier: Sharp Corporation
  • toe_japan_name: MX-FR42D.10
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0449_it4490.html
  • toe_overseas_name: MX-FR42D.10
heuristics/protection_profiles {} 85bd097f74f5a51e
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_WLAN_AS_V1.0.pdf
pdf_data/report_filename c0449_erpt.pdf 2015_92_Cisco_Converged_Access_CR.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0449-01: 1
    • Certification No. C0449: 1
  • AU:
    • Certification Report 2015/92: 1
  • FR:
    • Certification Report 2015/92: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.OPERATOR: 1
  • T:
    • T.RECOVER: 2
    • T.REMOTE: 2
    • T.SPOOF: 1
    • T.TAMPER: 1
    • T.TAP: 2
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 33
    • Cisco Systems: 1
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES-: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA1: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 6
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 6
  • IPsec:
    • IPsec: 5
  • SSH:
    • SSH: 1
    • SSHv2: 1
  • TLS:
    • DTLS:
      • DTLS: 2
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS PUB 197: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Flow Control Identification and Authentication – note that Telnet and FTP are considered to be out of scope Security Management Protection of the TSF TOE Access Trusted Path/Channel 2 July - 2015: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20150126175113+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20150126175139+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 238111
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 34
  • /Author: ACA
  • /Company: Department of Defence
  • /CreationDate: D:20150703095705+10'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /ModDate: D:20150703095711+10'00'
  • /Objective-Classification: [Inherited - Restricted]
  • /Objective-CreationStamp: D:20150701
  • /Objective-Id: R22648793
  • /Objective-IsApproved: 0
  • /Objective-IsPublished: 0
  • /Objective-ModificationStamp: D:20150703
  • /Objective-Owner: Caulfield, Terence (MR)(ASD)
  • /Objective-Parent: Certification
  • /Objective-Path: Objective Global Folder - PROD:Defence Business Units:Intelligence and Security Group:Defence Signals Directorate:DSD : Defence Signals Directorate (DSD):CISD:ASCS:CSPD:Evals:Australasn Certn Auth:Certification:Operations:AISEP Certification Records:EFC-T
  • /Objective-State: Being Edited
  • /Objective-Title: EFC-T078 Certfication Report v1.0 (Final)
  • /Objective-Version: 0.4
  • /Objective-VersionNumber: 4
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /SourceModified: D:20150702234459
  • /Title:
  • pdf_file_size_bytes: 92825
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename c0449_est.pdf Cisco_Converged_Access_WLAN_ST_v1.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 8
    • FCS_COP.1: 14
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_IFC.1: 9
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL: 21
    • FIA_AFL.1: 4
    • FIA_SOS: 15
    • FIA_SOS.1: 2
    • FIA_UAU: 46
    • FIA_UAU.1: 10
    • FIA_UAU.2: 2
    • FIA_UAU.7: 2
    • FIA_UID: 25
    • FIA_UID.1: 10
    • FIA_UID.2: 2
  • FMT:
    • FMT_MOF: 27
    • FMT_MOF.1: 3
    • FMT_MSA.3: 5
    • FMT_MTD: 29
    • FMT_MTD.1: 3
    • FMT_SMF.1: 36
    • FMT_SMF.1.1: 1
    • FMT_SMR: 20
    • FMT_SMR.1: 16
  • FTA:
    • FTA_TSE.1: 9
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_TRP.1: 18
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_SEL.1: 5
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT.1: 4
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.3: 3
    • FAU_STG_EXT.3.1: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 2
    • FCS_CKM_EXT.4: 5
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 23
    • FCS_COP.1.1: 5
    • FCS_RBG_EXT.1: 8
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSH_EXT.1: 2
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_SSH_EXT.1.8: 1
    • FCS_SSH_EXT.1.9: 1
    • FCS_TLS_EXT.1: 8
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_RIP.2: 4
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.6: 4
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.5: 4
    • FIA_UAU_EXT.5.1: 1
    • FIA_UAU_EXT.5.2: 1
    • FIA_UIA.1: 1
    • FIA_UIA_EXT.1: 4
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 4
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMR.1.3: 1
  • FPT:
    • FPT_FLS.1: 4
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 4
    • FPT_ITT.1.1: 1
    • FPT_RPL.1: 4
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 3
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.1.2: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FRU:
    • FRU_RSA.1: 4
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 4
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE.1: 4
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 4
    • A.OPERATOR: 4
  • O:
    • O.FAXTONET: 6
    • O.FILTER: 9
    • O.MANAGE: 13
    • O.REMOVE: 7
    • O.RESIDUAL: 7
    • O.TRP: 8
    • O.USER: 7
  • OE:
    • OE.CIPHER: 3
    • OE.ERASEALL: 3
    • OE.FIREWALL: 3
    • OE.OPERATE: 3
    • OE.PC-USER: 4
    • OE.SUBNET: 3
    • OE.USER: 3
  • T:
    • T.RECOVER: 5
    • T.REMOTE: 3
    • T.SPOOF: 4
    • T.TAMPER: 3
    • T.TAP: 4
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.NO_TOE_BYPASS: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.AUTH_COMM: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.DISPLAY_BANNER: 1
    • O.FAIL_SECURE: 1
    • O.PROTECTED_COMMUNICATIONS: 1
    • O.PROTOCOLS: 1
    • O.REPLAY_DETECTION: 1
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.RESOURCE_AVAILABILITY: 1
    • O.ROBUST_TOE_ACCESS: 1
    • O.SESSION_LOCK: 1
    • O.SYSTEM_MONITORING: 1
    • O.TIME_STAMPS: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
    • O.WIRELESS_CLIENT_ACCESS: 1
  • OE:
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_TOE_BYPASS: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.RESOURCE_EXHAUSTION: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Cisco:
    • Cisco: 120
    • Cisco Systems, Inc: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
    • Rijndael:
      • Rijndael: 4
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 17
      • AES-: 2
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 19
      • Diffie-Hellman: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-256: 6
      • SHA-384: 4
      • SHA-512: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 21
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 16
  • IKE:
    • IKE: 40
    • IKEv1: 2
    • IKEv2: 7
  • IPsec:
    • IPsec: 76
  • SSH:
    • SSH: 48
    • SSHv2: 5
  • TLS:
    • DTLS:
      • DTLS: 16
    • TLS:
      • TLS: 31
      • TLS 1.0: 1
      • TLS 1.2: 1
      • TLS1.1: 1
      • TLSv1.0: 1
  • VPN:
    • VPN: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 2
  • RNG:
    • RBG: 6
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 3
  • CC:
    • CCMB-2009-007-001: 1
    • CCMB-2009-007-004: 1
  • FIPS:
    • FIPS 140-2: 7
    • FIPS 186-2: 1
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 3
    • FIPS PUB 186-2: 2
    • FIPS PUB 186-3: 4
    • FIPS PUB 197: 3
    • FIPS PUB 198-1: 2
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38C: 2
    • NIST SP 800-56A: 1
    • NIST SP 800-56B: 2
    • SP 800-90: 3
  • RFC:
    • RFC 2246: 1
    • RFC 2346: 1
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 3602: 1
    • RFC 4252: 1
    • RFC 4253: 1
    • RFC 4303: 1
    • RFC 4346: 1
    • RFC 4347: 1
    • RFC 4945: 1
    • RFC 5216: 1
    • RFC 5246: 1
    • RFC 5280: 2
    • RFC 5415: 1
  • X509:
    • X.509: 3
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20141022171011+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /GTS_PDFXConformance: PDF/X-1a:2001
  • /GTS_PDFXVersion: PDF/X-1:2001
  • /ModDate: D:20141022171018+09'00'
  • /Producer: Adobe PDF Library 11.0
  • /Title: Security Target
  • /Trapped: /False
  • pdf_file_size_bytes: 855255
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different