name |
Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7 |
Huawei GaussDB 200 version 6.5.1 build e3690037 |
category |
Other Devices and Systems |
Databases |
scheme |
US |
ES |
status |
active |
active |
not_valid_after |
31.01.2027 |
22.03.2027 |
not_valid_before |
31.01.2022 |
22.03.2022 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32_Certificado.pdf |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/st_vid11254-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-INF-3664.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/st_vid11254-st1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-ST.pdf |
manufacturer |
Vertiv IT Systems |
Huawei Technologies Co., Ltd. |
manufacturer_web |
|
https://www.huawei.com |
security_level |
{} |
EAL2+, ALC_FLR.2 |
dgst |
cae7cbcadc444d12 |
b91f3f25e268a1e0 |
heuristics/cert_id |
CCEVS-VR-VID-11254-2022 |
2019-32-INF-3664 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:a:huawei:gaussdb_200:6.5.1:*:*:*:*:*:*:*, cpe:2.3:a:huawei:gaussdb_200:6.5.1.5:*:*:*:*:*:*:*, cpe:2.3:a:huawei:gaussdb_200:6.5.1.1:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2020-1811, CVE-2020-1790, CVE-2020-1853 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ASE_REQ.2 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
40404 |
6.5.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Database management systems
- certification_date: 22.03.2022
- enhanced:
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei GaussDB 200 version 6.5.1 build e3690037
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/805-huawei-gaussdb-200-version-6-5-1-build-e3690037
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
3f6ac99252bbf14e |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088b_pdf.pdf |
pdf_data/cert_filename |
|
2019-32_Certificado.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20220310164952+01'00'
- /ModDate: D:20220310164952+01'00'
- /Producer: GPL Ghostscript 9.27
- pdf_file_size_bytes: 847729
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
st_vid11254-vr.pdf |
2019-32-INF-3664.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11254-2022
- cert_item: for the Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7 Peripheral Sharing Devices Version 1.0
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11254-2022: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 7
- EAL2+: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 3
- AGD_OPE.1: 1
- AGD_PRE: 4
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ALC_FLR.2: 8
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SEL.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_RIP.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_REV.1: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FTA:
- FTA_MCS.1: 1
- FTA_TSE.1: 1
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NO_TEMPEST: 1
- A.NO_WIRELESS_DEVICES: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- A.TRUSTED_CONFIG: 1
- A.USER_ALLOWED_ACCESS: 1
- T:
- T.DATA_LEAK: 1
- T.FAILED: 1
- T.LOGICAL_TAMPER: 1
- T.PHYSICAL_TAMPER: 1
- T.REPLACEMENT: 1
- T.RESIDUAL_LEAK: 1
- T.SIGNAL_LEAK: 1
- T.UNAUTHORIZED_DEVICES: 1
- T.UNINTENDED_USE: 1
|
|
pdf_data/report_keywords/vendor |
|
- Huawei:
- Huawei: 14
- Huawei Technologies Co: 3
|
pdf_data/report_keywords/eval_facility |
|
- DEKRA:
- DEKRA Testing and Certification: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- TLS:
- TLS:
- TLS: 3
- TLSv1.1: 1
- TLSv1.2: 2
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: ppatin
- /CreationDate: D:20220131200223-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20220131200223-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 459318
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
|
pdf_data/st_filename |
st_vid11254-st1.pdf |
2019-32-ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FDP:
- FDP_APC_EXT: 15
- FDP_APC_EXT.1: 10
- FDP_APC_EXT.1.1: 1
- FDP_APC_EXT.1.2: 1
- FDP_APC_EXT.1.3: 1
- FDP_APC_EXT.1.4: 1
- FDP_FIL_EXT: 15
- FDP_FIL_EXT.1: 7
- FDP_FIL_EXT.1.1: 1
- FDP_FIL_EXT.1.2: 1
- FDP_FIL_EXT.1.3: 1
- FDP_FLS_EXT: 1
- FDP_PDC_EXT: 16
- FDP_PDC_EXT.1: 25
- FDP_PDC_EXT.1.1: 2
- FDP_PDC_EXT.1.2: 1
- FDP_PDC_EXT.1.3: 1
- FDP_PDC_EXT.1.4: 1
- FDP_PDC_EXT.1.5: 1
- FDP_PDC_EXT.2: 6
- FDP_PDC_EXT.2.1: 1
- FDP_PDC_EXT.2.2: 1
- FDP_PDC_EXT.3: 7
- FDP_PDC_EXT.3.1: 1
- FDP_PDC_EXT.3.2: 1
- FDP_RDR_EXT: 4
- FDP_RDR_EXT.1: 14
- FDP_RDR_EXT.1.1: 2
- FDP_RIP_EXT: 4
- FDP_RIP_EXT.1: 8
- FDP_RIP_EXT.1.1: 2
- FDP_SWI_EXT: 4
- FDP_SWI_EXT.1: 10
- FDP_SWI_EXT.1.1: 2
- FDP_UDF_EXT: 10
- FDP_UDF_EXT.1: 5
- FDP_UDF_EXT.1.1: 1
- FPT:
- FPT_FLS_EXT: 3
- FPT_FLS_EXT.1: 9
- FPT_FLS_EXT.1.1: 3
- FPT_NTA_EXT: 4
- FPT_NTA_EXT.1: 8
- FPT_NTA_EXT.1.1: 2
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 2
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST_EXT: 4
- FPT_TST_EXT.1: 10
- FPT_TST_EXT.1.1: 2
- FTA:
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 10
- FAU_GEN.2.1: 2
- FAU_MTD.1: 2
- FAU_SEL.1: 10
- FAU_SEL.1.1: 2
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 2
- FDP_ACF.1: 17
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_RIP.1: 10
- FDP_RIP.1.1: 2
- FIA:
- FIA_ATD.1: 16
- FIA_ATD.1.1: 2
- FIA_UAU.1: 9
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID.1: 15
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_USB.1: 5
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_REV.1: 15
- FMT_REV.1.1: 5
- FMT_REV.1.2: 3
- FMT_SMF.1: 14
- FMT_SMF.1.1: 2
- FMT_SMR.1: 21
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.1: 1
- FPT_STM.1: 1
- FPT_TRC.1: 11
- FPT_TRC.1.1: 2
- FPT_TRC.1.2: 2
- FTA:
- FTA_MCS.1: 9
- FTA_MCS.1.1: 2
- FTA_MCS.1.2: 2
- FTA_TSE.1: 8
- FTA_TSE.1.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_PHYSICAL: 1
- A.NO_TEMPEST: 2
- A.NO_WIRELESS: 1
- A.NO_WIRELESS_DEVICES: 1
- A.PHYSICAL: 1
- A.TRUSTED: 1
- A.TRUSTED_ADMIN: 2
- A.TRUSTED_CONFIG: 1
- A.USER_ALLOWED: 1
- A.USER_ALLOWED_ACCESS: 1
- O:
- O.ANTI_TAMPERING: 2
- O.AUTHORIZED: 2
- O.COMPUTER: 5
- O.EMULATED_INPUT: 3
- O.LEAK: 1
- O.LEAK_PREVENTION: 1
- O.NO_OTHER: 3
- O.NO_TOE_ACCESS: 2
- O.NO_USER: 1
- O.NO_USER_DATA: 1
- O.PERIPHERAL: 1
- O.PERIPHERAL_PORTS: 1
- O.REJECT: 4
- O.SELF_TEST: 4
- O.SELF_TEST_FAIL: 2
- O.TAMPER: 1
- O.TAMPER_EVIDENT: 2
- O.UNIDIRECTIONAL: 3
- O.USER_DATA: 2
- OE:
- OE.NO_TEMPEST: 2
- OE.NO_WIRELESS: 1
- OE.NO_WIRELESS_DEVICES: 1
- OE.PHYSICAL: 3
- OE.TRUSTED: 2
- OE.TRUSTED_ADMIN: 1
- OE.TRUSTED_CONFIG: 1
- T:
- T.DATA_LEAK: 2
- T.FAILED: 2
- T.LOGICAL: 1
- T.LOGICAL_TAMPER: 1
- T.PHYSICAL: 1
- T.PHYSICAL_TAMPER: 1
- T.REPLACEMENT: 2
- T.RESIDUAL: 1
- T.RESIDUAL_LEAK: 1
- T.SIGNAL_LEAK: 2
- T.UNAUTHORIZED: 1
- T.UNAUTHORIZED_DEVICES: 1
- T.UNINTENDED: 1
- T.UNINTENDED_USE: 1
|
- A:
- A.AUTHUSER: 2
- A.CONNECT: 3
- A.MANAGE: 3
- A.NO_GENERA: 1
- A.NO_GENERAL_PURPOSE: 2
- A.PEER_FUNC: 1
- A.PHYSICAL: 3
- A.SUPPORT: 4
- A.TRAINEDUS: 1
- A.TRAINEDUSER: 1
- O:
- O.ADMIN_RO: 3
- O.ADMIN_ROL: 1
- O.ADMIN_ROLE: 7
- O.AUDIT: 2
- O.AUDIT_GE: 2
- O.AUDIT_GENERATION: 3
- O.DISCRETIO: 3
- O.DISCRETIONARY: 1
- O.DISCRETIONARY_ACCESS: 5
- O.MANAGE: 13
- O.MEDIATE: 9
- O.RESIDUAL: 2
- O.RESIDUAL_: 1
- O.RESIDUAL_I: 1
- O.RESIDUAL_INFORM: 1
- O.RESIDUAL_INFORMATION: 6
- O.TOE_ACCE: 8
- O.TOE_ACCES: 1
- O.TOE_ACCESS: 10
- OE:
- OE.ADMIN: 10
- OE.INFO: 5
- OE.INFO_PRO: 4
- OE.INFO_PROTECT: 11
- OE.IT_REMOT: 4
- OE.IT_REMOTE: 6
- OE.IT_TRUST: 4
- OE.IT_TRUSTED: 1
- OE.IT_TRUSTED_SYSTEM: 5
- OE.NO_GENE: 3
- OE.NO_GENERAL: 1
- OE.NO_GENERAL_PURPOSE: 4
- OE.PHYSICAL: 8
- T:
- T.ACCESS_TSF: 2
- T.ACCESS_TSFDATA: 2
- T.ACCESS_TSFFUNC: 1
- T.IA_MASQUE: 2
- T.IA_MASQUERADE: 2
- T.IA_USER: 2
- T.RESIDUAL_: 1
- T.RESIDUAL_DATA: 2
- T.TSF: 1
- T.TSF_COMPR: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTHOR: 2
- T.UNAUTHORIZED_ACCESS: 2
|
pdf_data/st_keywords/vendor |
|
- Huawei:
- Huawei: 9
- Huawei Technologies Co: 87
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Physical Tampering: 1
- physical tampering: 6
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 1_SLES.tar.gz Clients Clients (including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Server Tools Server Tools: 1
- Co., Ltd. 6 Item Requirement ● NeoKylin 7.6 Software The Software of Python v2.7.5 is also out of scope and thus not included in the TOE. JDK v1.8 (server version) FusionInsight_BASE_6.5.1_SLES.tar.gz: 1
- Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the: 1
- including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE: 1
- is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE. They are used to manager and monitor the TOE. Firewall Used to: 1
- out of scope: 7
- provide the required environment for installing and running the TOE. Data Network channel is also out of scope and thus not included in the TOE. It is used to transmit service data between node instances in a: 1
- this is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE: 1
- with new information. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are: 1
|
pdf_data/st_metadata |
- /Author: Teresa MacArthur
- /Client Full Name: Vertiv
- /Client Short Name: Vertiv
- /Comments: CC V3.1 Security Target
Template Version 1_0
- /Company: EWA-Canada
- /CreationDate: D:20220105170543+01'00'
- /Creator: Acrobat PDFMaker 17 for Word
- /Document Number: 2149-001-D102C4B
- /ModDate: D:20220105170614+01'00'
- /Producer: Adobe PDF Library 17.11.238
- /Product_Name: Vertiv Secure USB HID Filter
- /ST_Date: 5 January 2022
- /ST_Version: 1.15
- /SourceModified: D:20220105160457
- /Title: Security Target
- pdf_file_size_bytes: 763032
- pdf_hyperlinks: mailto:[email protected], http://www.vertiv.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |