name |
MX-FRX2 Version M.10 |
MISTRAL VS9 (Software v9.2.3.5 / Hardware IP9001 & IP9010) (ANSSI-CC-2025/06) |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
active |
not_valid_after |
10.12.2010 |
12.02.2030 |
not_valid_before |
31.10.2006 |
12.02.2025 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_06fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0058_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_06fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0058_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2025_06en.pdf |
manufacturer |
Sharp Corporation |
Thales |
manufacturer_web |
https://sharp-world.com/ |
|
security_level |
EAL3+, ADV_SPM.1 |
EAL4+, ALC_FLR.3 |
dgst |
f012659528e4f9b7 |
d8b3b6188c1ed69c |
heuristics/cert_id |
JISEC-CC-CRP-C0058 |
ANSSI-CC-2025/06 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
10 |
9.2.3.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0058
- certification_date: 01.10.2006
- claim: EAL3+ ADV_SPM.1
- enhanced:
- assurance_level: EAL3 +ADV_SPM.1
- cert_link: https://www.ipa.go.jp/en/security/c0058_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is an IT product composed of 2 parts for a Multi Function Device (hereafter referred as to "MFD") to reduce the risk that image data stored or remaining in the HDD and the Flash Memory be disclosed. One part is a hardware part in an MFD and provided in the form of an MFD. The other part is a firmware product and provided as an upgrade kit for the firmware of the MFD. The TOE counters unauthorized disclosure of image data by: - the encryption function, that encrypts and spools image data that the MFD handles for jobs (of copy, printer, image-scanning, fax transmission/reception and PC-Fax), - the erasure function, that overwrites the spooled data area when each job is completed, - the confidential file function, that protects image data that a user files with a password, - the IP/MAC address filter function, that refuses unauthorized network accesses, and - the SSL function, that protects communications data against wiretapping.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: MX-FRX2
- product_type: IT Product ( data protection function in Multi Function Device )
- report_link: https://www.ipa.go.jp/en/security/c0058_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0058_est.pdf
- toe_version: Version M.10
- vendor: Sharp Corporation
- expiration_date: 01.01.2011
- supplier: Sharp Corporation
- toe_japan_name: MX-FRX2 Version M.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0058_it6074.html
- toe_overseas_name: MX-FRX2 Version M.10
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
Certificat-ANSSI-CC-2025_06fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20250213160255+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20250213160309+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 143188
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0058_erpt.pdf |
ANSSI-CC-2025_06fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0058-01: 1
- Certification No. C0058: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.OPERATOR: 1
- T:
- T.RECOVER: 1
- T.REMOTE: 1
- T.SPOOF: 1
- T.TAMPER: 1
- T.TAP: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20061117165933+09'00'
- /ModDate: D:20061117165933+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 130478
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
|
pdf_data/st_filename |
c0058_est.pdf |
ANSSI-Cible-CC-2025_06en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- NL:
- CC-01: 1
- CC-02: 2
- CC-03: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL3: 1
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 4
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 3
- ADV_HLD.2: 2
- ADV_RCR.1: 4
- ADV_SPM.1: 13
- AGD:
- AGD_ADM.1: 7
- AGD_USR.1: 5
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN: 1
- ATE_FUN.1: 4
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 3
- AVA_VLA.1: 3
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 10
- ADV_IMP.1: 5
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 5
- AGD:
- AGD_OPE.1: 10
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.1: 1
- ALC_CMS.4: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 3
- ALC_FLR.3: 7
- ALC_LCD.1: 4
- ALC_TAT.1: 4
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 5
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 4
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_COP.1: 17
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 4
- FDP_IFC.1: 3
- FDP_ITC.1: 2
- FDP_RIP.1: 16
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 28
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_SOS.1: 27
- FIA_SOS.1.1: 2
- FIA_UAU.1: 10
- FIA_UAU.2: 37
- FIA_UAU.2.1: 2
- FIA_UAU.7: 27
- FIA_UAU.7.1: 2
- FIA_UID.1: 10
- FIA_UID.2: 25
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 47
- FMT_MOF.1.1: 3
- FMT_MSA.1: 4
- FMT_MSA.2: 17
- FMT_MSA.2.1: 1
- FMT_MTD.1: 40
- FMT_MTD.1.1: 3
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 38
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_RVM: 2
- FPT_RVM.1: 31
- FPT_RVM.1.1: 1
- FTA:
- FTA_TSE.1: 11
- FTA_TSE.1.1: 1
- FTP:
- FTP_RVM.1: 5
- FTP_TRP.1: 14
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 16
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 6
- FAU_STG.1: 1
- FAU_STG.3: 1
- FAU_STG_EXT: 10
- FAU_STG_EXT.1: 13
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 4
- FAU_STG_EXT.2: 2
- FCO:
- FCO_CPC_EXT: 14
- FCO_CPC_EXT.1: 12
- FCO_CPC_EXT.1.1: 2
- FCO_CPC_EXT.1.2: 2
- FCO_CPC_EXT.1.3: 2
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 54
- FCS_CKM.1.1: 1
- FCS_CKM.2: 13
- FCS_CKM.2.1: 1
- FCS_CKM.4: 26
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 13
- FCS_CKM_EXT.5: 17
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.5.3: 1
- FCS_COP: 120
- FCS_COP.1: 21
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 21
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_TLSC_EXT: 4
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 10
- FCS_TLSC_EXT.2.1: 2
- FCS_TLSC_EXT.2.2: 2
- FCS_TLSC_EXT.2.3: 2
- FCS_TLSC_EXT.2.4: 2
- FCS_TLSC_EXT.2.5: 2
- FCS_TLSS_EXT: 4
- FCS_TLSS_EXT.2: 6
- FCS_TLSS_EXT.2.1: 2
- FCS_TLSS_EXT.2.2: 2
- FCS_TLSS_EXT.2.3: 2
- FCS_TLSS_EXT.2.4: 2
- FCS_TLSS_EXT.2.5: 2
- FCS_TLSS_EXT.2.6: 2
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC: 6
- FDP_ETC.2: 4
- FDP_IFC: 19
- FDP_IFC.1: 9
- FDP_IFF: 16
- FDP_IFF.1: 14
- FDP_ITC: 13
- FDP_ITC.1: 19
- FDP_ITC.2: 29
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 9
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 2
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 10
- FIA_UAU_EXT.2.1: 2
- FIA_UIA: 1
- FIA_UIA_EXT: 4
- FIA_UIA_EXT.1: 14
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 5
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 10
- FMT_MOF.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 4
- FMT_SMR.2: 7
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 10
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_PTD: 1
- FPT_RCV.1: 5
- FPT_RCV.1.1: 1
- FPT_RCV.2: 5
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
- FPT_SDP_EXT: 3
- FPT_SDP_EXT.2: 10
- FPT_SDP_EXT.2.1: 2
- FPT_SDP_EXT.2.2: 2
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 3
- FPT_STM: 2
- FPT_STM.1: 1
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 16
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 2
- FPT_TDC: 11
- FPT_TDC.1: 7
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 10
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 11
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 18
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 10
- FTP_TRP.1: 11
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 6
- A.OPERATOR: 5
- O:
- O.FILTER: 6
- O.MANAGE: 11
- O.REMOVE: 8
- O.RESIDUAL: 8
- O.TRP: 7
- O.USER: 7
- OE:
- OE.CIPHER: 6
- OE.ERASEALL: 3
- OE.FIREWALL: 3
- OE.OPERATE: 3
- OE.PC-USER: 3
- OE.SUBNET: 3
- OE.USER: 3
- T:
- T.RECOVER: 6
- T.REMOTE: 4
- T.SPOOF: 5
- T.TAMPER: 4
- T.TAP: 5
|
- A:
- A.ACCESS_CONTROL_MANAGEMENT_DEVICES: 1
- A.ADMINISTRATION_NETWORK: 1
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.ALARM: 1
- A.AUDIT: 2
- A.BIOS_PASSWORD: 2
- A.DATA_TRANSPORTATION: 2
- A.EXTERNAL_KEYS: 1
- A.LIMITED_FUNCTIONALITY: 2
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PERSISTENT_ASSETS_PROTECTION: 2
- A.PHYSICAL_ENV_MANAGEMENT_DEVIC: 1
- A.PHYSICAL_ENV_MANAGEMENT_DEVICES: 1
- A.PHYSICAL_PROTECTION: 1
- A.POLICIES_CONTINUITY: 2
- A.REGULAR_UPDATES: 2
- A.SECURED_MANAGEMENT_DEVICES: 2
- A.SENSITIVE_DATA_ERASURE: 1
- A.SS_MMC_TO_TOE: 1
- A.TRUSTED_ADMINISTRATOR: 2
- O:
- O.AUDIT: 15
- O.AUDIT_PROTECTION: 5
- O.AUTHENTICATION_FAILURE: 10
- O.BOOT_CONTROL: 5
- O.CERTIFICATE_INJECTION: 4
- O.CRYPTO_PERIOD: 9
- O.CRYPTO_REGULATION: 7
- O.DATA_ERASURE: 9
- O.DISPLAY_BANNER: 6
- O.LOCAL_DATA_PROTECTION: 15
- O.MANAGEMENT: 7
- O.POL_DEFAULT: 13
- O.POL_FILTERING: 8
- O.PROTECTED_COMMUNICATION: 3
- O.PROTECTED_COMMUNICATIONS: 13
- O.RESIDUAL_INFORMATION_CLEA: 1
- O.RESIDUAL_INFORMATION_CLEAR: 4
- O.ROLES: 12
- O.SELF_TEST: 12
- O.SESSION_LOCK: 4
- O.SOFTWARE_UPDATES: 9
- O.SUPERVISION: 6
- O.SUPERVISION_IMPACT: 9
- O.TIME_BASE: 4
- O.TOE_REDUNDANCY: 4
- O.VIEW_RULES: 12
- OE:
- OE.ACCESS_CONTROL_MANAGE: 1
- OE.ACCESS_CONTROL_MANAGEMENT_DEVICE: 2
- OE.ACCESS_CONTROL_MANAGEMENT_DEVICES: 3
- OE.ADMIN_CREDENTIALS_SECUR: 1
- OE.ADMIN_CREDENTIALS_SECURE: 3
- OE.ALARM: 3
- OE.AUDIT: 2
- OE.AUDIT_RECORD: 3
- OE.BIOS_PASSWORD: 2
- OE.DATA_TRANSPORTATION: 5
- OE.EXTERNAL_KEYS: 2
- OE.LMGT_CONNECTION: 5
- OE.NO_GENERAL_PURPOSE: 2
- OE.NO_THRU_TRAFFIC_PROTECTION: 2
- OE.PHYSICAL: 2
- OE.PHYSICAL_ENV_MANAGEMEN: 1
- OE.PHYSICAL_ENV_MANAGEMENT_DEVICES: 4
- OE.POLICIES_CONTINUITY: 2
- OE.SECURED_MANAGEMENT_DE: 1
- OE.SECURED_MANAGEMENT_DEVICES: 4
- OE.SECURE_PERSISTENT_ASSET: 2
- OE.SS_MMC_TO_TOE: 5
- OE.TIME_TOE: 3
- OE.TOE_DATA_ERASURE: 5
- OE.TOE_INTEGRITY: 7
- OE.TOE_PRODUCTION: 3
- OE.TRUSTED_ADMIN: 3
- OE.UPDATES: 4
- T:
- T.MISUSE: 5
- T.PASSWORD_CRACKING: 5
- T.RESIDUAL_DATA: 5
- T.SECURITY_FUNCTIONALITY: 2
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 3
- T.SECURITY_FUNCTIONALITY_FAILURE: 3
- T.TIME_BASE: 3
- T.TOE_CAPTURE: 5
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 3
- T.UNDETECTED_ACTIVITY: 5
- T.UNTRUSTED_COMMUNICATI: 2
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 3
- T.UPDATE_COMPROMISE: 5
- T.USER_DATA_REUSE: 3
- T.WEAK_AUTHENTICATION_EN: 2
- T.WEAK_AUTHENTICATION_ENDPOINTS: 3
- T.WEAK_CRYPTOGRAPHY: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA256: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 24
- IKEv1: 5
- IKEv2: 23
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 4
- SSL 2.0: 1
- SSL 3.0: 2
- SSL2.0: 1
- TLS:
- TLS: 55
- TLS 1.0: 2
- TLS 1.1: 4
- TLS 1.2: 5
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- NIST:
- secp256r1: 11
- secp384r1: 2
- secp521r1: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- ISO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
- ISO/IEC 18031:2011: 4
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-: 3
- PKCS:
- RFC:
- RFC 2131: 2
- RFC 2986: 2
- RFC 4106: 2
- RFC 4109: 1
- RFC 4301: 2
- RFC 4303: 2
- RFC 4304: 1
- RFC 4346: 2
- RFC 4868: 3
- RFC 4945: 2
- RFC 5246: 4
- RFC 5280: 5
- RFC 5282: 2
- RFC 5759: 2
- RFC 6125: 2
- RFC 6960: 4
- RFC 7296: 3
- RFC5289: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Out of scope: 1
- System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9 MISTRAL VS9 IPSEC GATEWAY SOFTWARE DUAL USE: 1
- of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. The Mistral Management Center device: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: K.Nakagawa
- /Company: Sharp Corporation
- /CreationDate: D:20061116111756+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20061116115023+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /SourceModified: D:20061116021458
- /Title: MX-FRX2 Security Target
- pdf_file_size_bytes: 1047457
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 49
|
- /Author: ERIC AUGE
- /CreationDate: D:20250128123410+01'00'
- /ModDate: D:20250128123410+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - ST_lite_GATEWAY_IPSEC_MISTRAL_VS9_63535113lite-306_AF
- pdf_file_size_bytes: 2522320
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 134
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |