name |
Juniper Networks Odyssey Access Client (FIPS Edition), Version 4.56 |
SecureVue v3.6.3 CP1 |
category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
US |
US |
status |
archived |
archived |
not_valid_after |
20.07.2012 |
20.05.2015 |
not_valid_before |
23.09.2008 |
20.05.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10245-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10379-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10245-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10379-st.pdf |
manufacturer |
Juniper Networks, Inc. |
EiQ Networks, Inc. |
manufacturer_web |
https://www.juniper.net/ |
https://www.EiQNetworks.com/ |
security_level |
EAL3+, ALC_FLR.2 |
EAL2+, ALC_FLR.2 |
dgst |
c974eb48324fee97 |
78bafa65426e3c35 |
heuristics/cert_id |
CCEVS-VR-VID-10245-2008 |
CCEVS-VR-VID-10379-2013 |
heuristics/cert_lab |
US |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1, ALC_FLR.2 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
4.56 |
3.6.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Wireless LAN
- certification_date: 23.09.2008
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10245
- product: Juniper Networks Odyssey Access Client (FIPS Edition), Version 4.56
- scheme: US
- url: https://www.niap-ccevs.org/product/10245
- vendor: Juniper Networks, Inc.
|
- category: Enterprise Security Management, Network Management
- certification_date: 20.05.2013
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date: 20.05.2015
- id: CCEVS-VR-VID10379
- product: SecureVue v3.6.3 CP1
- scheme: US
- url: https://www.niap-ccevs.org/product/10379
- vendor: EiQ Networks, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10245-vr.pdf |
st_vid10379-vr.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10245-2008
- cert_item: Odyssey Access Client (FIPS Edition), Version 4.56
- cert_lab: US NIAP
|
- US:
- cert_id: CCEVS-VR-VID10379-2013
- cert_item: SecureVue, Version 3.6.3 CP1
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10245-2008: 1
|
- US:
- CCEVS-VR-VID10379-2013: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 3: 1
- EAL3: 6
- EAL3 augmented: 2
|
- EAL:
- EAL 2: 8
- EAL 2 augmented: 2
- EAL 3: 1
- EAL2: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 2
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 1
- ATE_IND.2: 5
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.2: 1
- FAU_GEN_EXP.1: 1
- FAU_SAA.1: 1
- FAU_SAR.1: 1
- FAU_SAR.2: 1
- FAU_SAR.3: 1
- FAU_SEL.1: 1
- FAU_STG.1: 1
- FAU_STG.3: 1
- FCS:
- FCS_BCM_EXP.1: 1
- FCS_CKM.1: 3
- FCS_CKM.4: 1
- FCS_CKM_EXP.2: 1
- FCS_COP_EXP.1: 1
- FCS_COP_EXP.2: 10
- FDP:
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FDP_RIP.1: 2
- FIA:
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_SMF.1: 3
- FMT_SMR.1: 1
- FPT:
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_STM.1: 1
- FPT_TST_EXP.1: 1
- FPT_TST_EXP.2: 1
- FTP:
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SAR.1: 3
- FAU_SAR.3: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_SOS.1: 1
- FIA_UAU.5: 1
- FIA_UAU.7: 1
- FIA_UAU_EXP.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_ITT_EXP.1: 3
- FPT_TST_EXP.1: 1
|
pdf_data/report_keywords/cc_claims |
- A:
- A.BASIC_ROBUSTNESS_IT_: 1
- A.NO_EVIL: 1
- A.PHYSICAL: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 5
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- both of which are out of scope: 1
- operating environment between the browser and the Apache/Microsoft IIS server (both of which are out of scope). 8 of 40 The TOE employs password masking during input, and a password policy that controls the: 1
- out of scope: 2
- resources. 4. The following are not included in the Evaluation Scope: TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe) Distributed and tiered: 1
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
st_vid10245-st.pdf |
st_vid10379-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 2
- EAL2: 1
- EAL2 augmented: 1
- EAL3: 4
- EAL3 augmented: 2
|
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL 4: 1
- EAL1: 1
- EAL2: 6
- EAL2 augmented: 4
- EAL3: 1
- EAL5: 1
- EAL7: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.2: 1
- ACM_CAP.3: 20
- ACM_SCP.1: 7
- ADO:
- ADO_DEL.1: 7
- ADO_IGS.1: 7
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 2
- ADV_HLD.2: 18
- ADV_RCR.1: 8
- AGD:
- AGD_ADM.1: 13
- AGD_USR.1: 11
- ALC:
- ALC_DVS.1: 11
- ALC_FLR.2: 20
- ATE:
- ATE_COV.1: 1
- ATE_COV.2: 9
- ATE_DPT.1: 7
- ATE_FUN.1: 15
- ATE_IND.1: 1
- ATE_IND.2: 8
- AVA:
- AVA_MSU.1: 12
- AVA_SOF.1: 8
- AVA_VLA.1: 10
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.2: 4
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.2: 2
- FAU_GEN.2.1: 1
- FAU_GEN_EXP: 2
- FAU_GEN_EXP.1: 5
- FAU_GEN_EXP.1.1: 1
- FAU_GEN_EXP.1.2: 1
- FAU_SAA.1: 2
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 2
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 2
- FAU_SAR.2.1: 1
- FAU_SAR.3: 2
- FAU_SAR.3.1: 1
- FAU_SEL: 3
- FAU_SEL.1: 4
- FAU_SEL.1.1: 1
- FAU_STG: 1
- FAU_STG.1: 2
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 2
- FAU_STG.3.1: 1
- FCS:
- FCS_BCM_EXP: 1
- FCS_BCM_EXP.1: 4
- FCS_BCM_EXP.1.1: 1
- FCS_BCM_EXP.1.2: 1
- FCS_BCM_EXP.1.3: 1
- FCS_CKM: 1
- FCS_CKM.1: 35
- FCS_CKM.2: 3
- FCS_CKM.4: 21
- FCS_CKM.4.1: 1
- FCS_CKM_EXP: 1
- FCS_CKM_EXP.2: 4
- FCS_CKM_EXP.2.1: 1
- FCS_COP.1: 3
- FCS_COP_EXP: 1
- FCS_COP_EXP.1: 3
- FCS_COP_EXP.1.1: 1
- FCS_COP_EXP.2: 66
- FCS_COP_EXP.2.1: 2
- FDP:
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 4
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_RIP: 1
- FDP_RIP.1: 13
- FIA:
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.2: 20
- FMT_MSA.2.1: 1
- FMT_MSA.3: 3
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 2
- FPT_RVM.1.1: 1
- FPT_SEP.1: 2
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 3
- FPT_STM.1.1: 1
- FPT_TST: 1
- FPT_TST_EXP: 2
- FPT_TST_EXP.1: 7
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FPT_TST_EXP.1.3: 1
- FPT_TST_EXP.2: 4
- FPT_TST_EXP.2.1: 1
- FPT_TST_EXP.2.2: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 6
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UAU_EXP.2: 17
- FIA_UAU_EXP.2.1: 2
- FIA_UID.1: 8
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 1
- FPT_ITT_EXP.1: 14
- FPT_ITT_EXP.1.1: 2
- FPT_ITT_EXP.1.2: 2
- FPT_STM.1: 2
- FPT_TST: 2
- FPT_TST_EXP.1: 13
- FPT_TST_EXP.1.1: 2
- FPT_TST_EXP.1.2: 2
- FPT_TST_EXP.1.3: 2
- FTP:
- FTP_ITC: 1
- FTP_ITT.1: 1
- FTP_ITT_EXP.1: 1
- FTP_TST_EXP.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.BASIC_ROBUSTNESS_IT_ENVIRONMENT: 2
- A.NO_EVIL: 1
- A.PHYSICAL: 1
- O:
- O.ADMIN_GUIDANCE: 1
- O.AUDIT_GENERATION: 1
- O.CONFIGURATION_: 1
- O.CORRECT_: 1
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPHY: 4
- O.DOCUMENTED_: 1
- O.MANAGE: 1
- O.PARTIAL_: 1
- O.RESIDUAL_: 1
- O.VULNERABILITY_: 1
- OE:
- OE.BASIC_ROBUSTNESS_OS: 2
- OE.CRYPTOGRAPHY: 3
- OE.MANAGE: 1
- OE.NO_EVIL: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_: 1
- OE.SELF_: 1
- OE.TIME_STAMPS: 1
- OE.TOE_ACCESS: 1
- T:
- T.ACCIDENTAL_ADMIN_: 1
- T.CRYPTO_COMPROMISE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 4
- FIPS 140-1: 8
- FIPS 140-2: 20
- FIPS 180-2: 1
- FIPS 186-2: 8
- FIPS 197: 1
- FIPS 198: 1
- FIPS PUB 140-1: 1
- PKCS:
- RFC:
|
- FIPS:
- RFC:
- RFC 2865: 1
- RFC 3080: 1
- RFC 4251: 2
- RFC 5424: 2
- RFC 959: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Data Collector Host OS Agents (UNIX, Windows) 1.4.8.2 Out-of-Scope TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe) Distributed and tiered: 1
- A: SecureVue v3.6 Data Collector is supported to run on VMWare ESX 4.x and ESXi platform but is out of scope of this evaluation. SecureVue Version 3.6.3 CP1 Security Target SecureVue Version 3.6.3 CP1: 1
- Server. Therefore, for the purpose of this evaluation this executable was not tested and considered out of scope. 1.4.4 Trusted Channel between TOE components The TSF includes a trusted communication: 1
- UNIX, Windows) 1.4.8.2 Out-of-Scope TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe: 1
- both of which are out of scope: 1
- operating environment between the browser and the Apache/Microsoft IIS server (both of which are out of scope). Each user has the type of authentication assigned to it (AD, RADIUS, or Native). If a user is: 1
- out of scope: 4
|
pdf_data/st_metadata |
- /Author: SAIC
- /Company: SAIC
- /CreationDate: D:20080926111130-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Manager: Rick O'Donnel
- /ModDate: D:20080926124308-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20080811191258
- /Subject: Security Target
- /Title: Juniper OAC Security Target
- pdf_file_size_bytes: 449660
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |