Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ARUBA NETWORKS VIRTUAL MOBILITY CONTROLLER (HARDENED CHASSIS RUNNING VMWARE ESXI) WITH ARUBAOS 6.4.2.0 - 1.3 FIPS
Certificate Number: 2017/107
Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program Version: 70-02-05-00/00(R7-02-06A)
JISEC-CC-CRP-C0315
name ARUBA NETWORKS VIRTUAL MOBILITY CONTROLLER (HARDENED CHASSIS RUNNING VMWARE ESXI) WITH ARUBAOS 6.4.2.0 - 1.3 FIPS Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program Version: 70-02-05-00/00(R7-02-06A)
category Network and Network-Related Devices and Systems Access Control Devices and Systems
scheme AU JP
not_valid_after 03.05.2022 03.10.2016
not_valid_before 03.05.2017 30.09.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Aruba%20NMCv6.4.2.0-1.3_2017_107_CRv1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0315_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Aruba%20NVM%20Controller%20OS%206.4.2.0-1.3%20FIPS_STv1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0315_est.pdf
manufacturer Aruba Networks Hitachi, Ltd.
manufacturer_web https://www.arubanetworks.com https://www.hitachi.com/
security_level {} EAL2
dgst d88fedd7a40219ab eecf16a3a9948989
heuristics/cert_id Certificate Number: 2017/107 JISEC-CC-CRP-C0315
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 6.4.2.0, 1.3 02, 70, 05, 00
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0315
  • certification_date: 01.09.2011
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : "Hitachi Virtual Storage Platform" (also known as "Hitachi Virtual Storage Platform VP9500"). The TOE has the capabilities to control read/write accesses of a host computer to the area of the storage system which is allowed to the computer through identification and authentication. The TOE also has the functions of managing encryption keys which are used to encrypt data written in the storage system by the host computer, and securely erasing data stored in the storage system. TOE security functionality The TOE has the following security functions to protect user data stored in the storage system. - Controlling accesses from Storage Navigator users and support personnel to granted partitions specified by the groups of storage resources - Controlling accesses from host computers to the granted logical devices in the storage system. - Authentication of host computers - Identification and authentication of Storage Navigator users and support personnel - Encrypted communication between Storage Navigator and SVP PC, and SVP PC and external authentication servers. - Encryption of stored data(Encryption key management) - Shredding - Audit logging
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program
    • product_type: Control Program for storage system
    • report_link: https://www.ipa.go.jp/en/security/c0315_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0315_est.pdf
    • toe_version: 70-02-05-00/00(R7-02-06A)
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.10.2016
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0315_it0313.html
  • toe_japan_name: Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program 70-02-05-00/00(R7-02-06A)
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/protection_profiles bb67fb1b4f10e7a5, d7508f508083d040, ac9abe3d5c5a31f0 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf {}
pdf_data/report_filename Aruba NMCv6.4.2.0-1.3_2017_107_CRv1.0.pdf c0315_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • AU:
    • Certification Report 2017/107: 1
  • FR:
    • Certification Report 2017/107: 1
  • JP:
    • CRP-C0315-01: 1
    • Certification No. C0315: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.CONNECT_STORAGE: 1
    • A.EXTERNAL_SERVER: 2
    • A.MANAGEMENT_PC: 1
    • A.MANAGE_SECRET: 1
    • A.NOEVIL: 1
    • A.NOEVIL_MNT: 1
    • A.PHYSICAL_SEC: 1
  • T:
    • T.CHG_CONFIG: 1
    • T.HDD_REUSE: 1
    • T.HDD_THEFT: 1
    • T.ILLEGAL_XCNTL: 1
    • T.LP_LEAK: 1
    • T.TSF_COMP: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 3
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 1
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 2
    • SSHv2: 1
  • TLS:
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 12
  • TLS:
    • SSL:
      • SSL: 7
    • TLS:
      • TLS: 2
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 2
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_metadata
  • /Author: Terence.caulfield
  • /CreationDate: D:20170508103456+10'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20170508103456+10'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: Microsoft Word - EFC-T084_ARUBA Neworks Virtual Mobility Controller v 6.4.2.0-1.3_ Certification Report v1.0.DOC
  • pdf_file_size_bytes: 56688
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /CreationDate: D:20111222113805+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20111222113848+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 474751
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 41
pdf_data/st_filename Aruba NVM Controller OS 6.4.2.0-1.3 FIPS_STv1.0.pdf c0315_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 1
  • EAL:
    • EAL2: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 4
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE: 25
    • AGD_OPE.1: 2
    • AGD_PRE: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 2
    • ALC_CMC.1: 2
    • ALC_CMS: 2
    • ALC_CMS.1: 1
  • ASE:
    • ASE_TSS: 26
  • ATE:
    • ATE_IND: 35
    • ATE_IND.1: 5
    • ATE_TSS: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 26
    • FCS_CKM.1.1: 4
    • FCS_CKM_EXT.4: 8
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP: 3
    • FCS_COP.1: 46
    • FCS_COP.1.1: 5
    • FCS_HTTP: 1
    • FCS_IPSE: 1
    • FCS_RBG: 2
    • FCS_RBG_EXT.1: 18
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSH_EXT.1: 8
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 2
    • FCS_SSH_EXT.1.5: 2
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_TLS_EXT.1: 9
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_RIP.2: 5
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 6
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT.1: 7
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 3
    • FIA_PSK_EXT.1.3: 2
    • FIA_PSK_EXT.1.4: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 5
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA: 1
    • FIA_UIA_EXT.1: 10
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UIA_EXT.2: 1
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MTD: 2
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW: 1
    • FPT_APW_EXT.1: 5
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_FLS.1: 4
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 3
    • FPT_SKP_EXT.1: 9
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 5
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.1.2: 1
    • FPT_TUD_EXT.1: 6
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 2
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 6
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE.1: 4
    • FTA_TSE.1.1: 1
    • FTA_VCM_EXT.1: 5
    • FTA_VCM_EXT.1.1: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_TRP: 1
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 18
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 10
    • FAU_STG.3.1: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 2
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 19
    • FIA_ATD.1: 6
    • FIA_SOS: 20
    • FIA_SOS.1: 2
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 16
    • FIA_UID.2.1: 1
    • FIA_USB: 18
    • FIA_USB.1: 6
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 10
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 1
    • FPT_STM.1: 13
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 9
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECTIONS: 2
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.ADDRESS_FILTERING: 2
    • O.ASSIGNED_PRIVATE_ADD: 1
    • O.AUTHENTICATION: 1
    • O.CLIENT_ESTABLISHMENT: 1
    • O.CRYPTOGRAPHIC_FUNCT: 1
    • O.DISPLAY_BANNER: 1
    • O.FAIL_SECURE: 1
    • O.PORT_FILTERING: 2
    • O.PROTECTED: 1
    • O.RELATED_CONNECTION: 1
    • O.REMOTE_SESSION_TERM: 1
    • O.RESIDUAL_INFORMATION: 1
    • O.SESSION_LOCK: 1
    • O.STATEFUL_INSPECTION: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.CONNECTIONS: 2
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.DATA_INTEGRITY: 1
    • T.HIJACKED_SESSION: 1
    • T.NETWORK_DISCLOSURE: 2
    • T.NETWORK_DOS: 1
    • T.NETWORK_MISUSE: 2
    • T.REPLAY_ATTACK: 1
    • T.TSF_FAILURE: 2
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_CONNE: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.UNPROTECTED_CLIENT_: 1
    • T.USER_DATA_REUSE: 1
  • A:
    • A.CONNECT_STORAGE: 3
    • A.EXTERNAL_SERVER: 3
    • A.MANAGEMENT_PC: 3
    • A.MANAGE_SECRET: 3
    • A.NOEVIL: 3
    • A.NOEVIL_MNT: 3
    • A.PHYSICAL_SEC: 3
  • O:
    • O.ADM_AUTH: 9
    • O.ADM_ROLE: 5
    • O.AUD_GEN: 8
    • O.HDD_: 2
    • O.HDD_ENC: 6
    • O.HDD_SHRED: 3
    • O.HOST_ACCESS: 8
    • O.HOST_AUTH: 5
    • O.SEC_COMM: 8
  • OE:
    • OE.CONNECT_STORAGE: 2
    • OE.EXTERNAL_SERVER: 3
    • OE.FC-SP_HBA: 3
    • OE.HDD_ENC: 2
    • OE.MANAGEMENT_PC: 3
    • OE.MANAGE_SECRET: 2
    • OE.NOEVIL: 2
    • OE.NOEVIL-MNT: 1
    • OE.NOEVIL_MNT: 1
    • OE.PHYSICAL_SEC: 4
  • T:
    • T.CHG_CONFIG: 3
    • T.HDD_REUSE: 3
    • T.HDD_THEFT: 3
    • T.ILLEGAL_XCNTL: 3
    • T.LP_LEAK: 3
    • T.TSF_COMP: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
      • AES-: 2
      • AES-128: 1
      • AES-256: 1
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 5
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 5
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 3
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 23
  • FF:
    • DH:
      • DH: 14
      • DHE: 1
      • Diffie-Hellman: 15
  • RSA:
    • RSA 2048: 3
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 512: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 3
    • SHA2:
      • SHA-256: 3
      • SHA-384: 2
      • SHA-512: 2
      • SHA256: 5
      • SHA384: 2
      • SHA512: 5
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
  • MAC:
    • MAC: 3
  • KEX:
    • Key exchange: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 37
    • IKEv1: 20
    • IKEv2: 14
  • IPsec:
    • IPsec: 31
  • SSH:
    • SSH: 43
    • SSHv2: 16
  • TLS:
    • TLS:
      • TLS: 43
      • TLS 1.2: 2
  • VPN:
    • VPN: 59
  • TLS:
    • SSL:
      • SSL: 8
      • SSLv3.0: 2
    • TLS:
      • TLS: 2
      • TLSv1.0: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 13
  • RNG:
    • RBG: 15
    • RNG: 18
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 2
  • GCM:
    • GCM: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 16
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 5
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 10
    • FIPS 186-2: 4
    • FIPS 186-3: 3
    • FIPS 186-4: 3
    • FIPS PUB 186-2: 2
    • FIPS PUB 186-3: 7
    • FIPS PUB 197: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-90: 1
    • SP 800-90a: 6
  • PKCS:
    • PKCS#12: 1
  • RFC:
    • RFC 2460: 3
    • RFC 2560: 1
    • RFC 2818: 1
    • RFC 2986: 1
    • RFC 3261: 2
    • RFC 3513: 1
    • RFC 3602: 1
    • RFC 4106: 1
    • RFC 4109: 1
    • RFC 4158: 1
    • RFC 4253: 2
    • RFC 4301: 1
    • RFC 4303: 1
    • RFC 4443: 2
    • RFC 4868: 2
    • RFC 4945: 1
    • RFC 5246: 2
    • RFC 5280: 1
    • RFC 5735: 1
    • RFC 5759: 1
    • RFC 6379: 1
    • RFC 768: 3
    • RFC 791: 3
    • RFC 792: 2
    • RFC 793: 3
    • RFC 959: 2
  • X509:
    • X.509: 8
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 180-2: 1
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 1
pdf_data/st_metadata
  • /Author: Terence.caulfield
  • /CreationDate: D:20170505145049+10'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20170505145049+10'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: Microsoft Word - ArubaOS 6.4.X VMC Security Target v1.0.docx
  • pdf_file_size_bytes: 862027
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 89
  • /CreationDate: D:20111221190410
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20111221190410
  • /Producer: Microsoft® Office Word 2007
  • /Subject: CC EAL2 Security Target
  • /Title: VSP ST
  • pdf_file_size_bytes: 1094064
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 77
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different