name |
F5 Networks BIG-IP® Application Delivery Firewall (ADF-Base) version 11.5 HF10 |
bizhub PRO 950 Control Software Image Control Program(Image Control I1):00I1-G00-10 Controller Control Program(IC Controller P):00P1-G00-11 |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
DE |
JP |
status |
archived |
archived |
not_valid_after |
02.08.2022 |
28.04.2014 |
not_valid_before |
03.08.2017 |
21.04.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0856a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0212_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0856b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0212_est.pdf |
manufacturer |
F5 Networks, Inc. |
Konica Minolta Business Technologies, Inc |
manufacturer_web |
https://www.f5.com/ |
https://www.konicaminolta.com/ |
security_level |
EAL4+, ALC_FLR.3 |
EAL3 |
dgst |
f34044c28e3c540c |
48ea19b7c16c1685 |
heuristics/cert_id |
BSI-DSZ-CC-0856-2017 |
JISEC-CC-CRP-C0212 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
11.5 |
950, 11, 10 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-0975-2018 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-0975-2018 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0212
- certification_date: 01.04.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0212_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This product (bizhub PRO 950 Control Software *1 ), that is installed with digital MFP (bizhub PRO 950 ) manufactured by Konica Minolta Business Technologies, Inc., is a software product for the purpose of reducing the risk for disclosure of document data in bizhub PRO 950. Bizhub PRO 950 Control Software prevents document data in bizhub PRO 950 from disclosing during the use of functions such as copier and printer. It offers the protection function *2 with password lock system against the risk of reading data out illegally from HDD (Hard Disk Drive) which is a medium for storing temporarily document data. *1: shows "bizhub PRO 950 Zentai Seigyo Software" for Japan and "bizhub PRO 950 Control Software" for overseas are the same product with different calling name. *2: HDD has the password so that it cannot be removed and read in another equipment. HDD lock password is set in the HDD lock function. TOE security functions TOE security function is as follows - IA.ADM_ADD; Registration of administrator - IA.ADM_AUTH; Identification and Authentication of administrator - IA.CE_AUTH; Identification and Authentication of CE - IA.PASS; Change of Password - ACL.USR; Rule and Control of user's access - AUD.LOG; Audit Record - AUD.MNG; Management of audit area - MNG.MODE; Configuration of Security Mode - MNG.ADM; Function of Management Support(Administrator) - MNG.HDD; Function of HDD lock password
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Japan : bizhub PRO 950 Zentai Seigyo Software Overseas: bizhub PRO 950 Control Software
- product_type: IT Product (data protection function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0212_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0212_est.pdf
- toe_version: Image Control Program(Image Control I1):00I1-G00-10 Controller Control Program(IC Control P):00P1-G00-11
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.04.2014
- revalidations: [frozendict({'date': '2010-03', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0212_it8219_01.html'})]
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub PRO 950 Zentai Seigyo Software Image Control Program(Image Control I1):00I1-G00-10 Controller Control Program(IC Control P):00P1-G00-11
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0212_it8219.html
- toe_overseas_name: bizhub PRO 950 / VarioLink 9522 / ineo 950 control software Image Control Program( Image Control I1):00I1-G00-22 Controller Control Program(IC Control P):00P1-G00-20
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0856a_pdf.pdf |
c0212_erpt.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.3
- cc_version: Product specific Security Target Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0856-2017
- cert_item: F5 Networks BIG-IP® Application Delivery Firewall (ADF-Base), version 11.5.1 HF10
- cert_lab: BSI
- developer: F5 Networks, Inc
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0212-01: 1
- Certification No. C0212: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 10
- EAL 4 augmented: 3
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- EAL4: 1
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 1
- AGD_PRE: 4
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FIA:
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
- OE:
- T:
- T.ACCESS: 1
- T.HDDACCESS: 1
- T.IMPADMIN: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-384: 7
- SHA256: 2
- SHA384: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IKE:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 14
- TLS v1.1: 2
- TLSv1.1: 6
- TLSv1.2: 7
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
- NIST:
- NIST P-256: 1
- P-256: 1
- secp256r1: 8
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- FIPS:
- FIPS180-3: 16
- FIPS180-310: 1
- FIPS180-4: 1
- FIPS186-3: 6
- FIPS186-39: 1
- FIPS186-4: 1
- FIPS198-1: 3
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC1321: 1
- RFC2104: 1
- RFC3447: 10
- RFC3526: 1
- RFC4251: 1
- RFC4252: 2
- RFC4253: 4
- RFC4346: 5
- RFC4492: 6
- RFC5246: 6
- RFC6151: 1
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Version 5.1, 2017-07-28, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 2017-07-05, CI list for documentation in Perforce: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20170816150424+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, F5 Networks, BIG-IP, Application Delivery Firewall (ADF-Base) version 11.5.1 HF10"
- /ModDate: D:20170817100036+02'00'
- /Producer: LibreOffice 5.2
- /Subject: Certification Report, Zertifizierungsreport
- /Title: Certification Report BSI-DSZ-CC-0856-2017
- pdf_file_size_bytes: 1712889
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://askF5.com/, https://www.bsi.bund.de/zertifizierung, https://downloads.f5.com/, https://www.bsi.bund.de/zertifizierungsreporte, https://support.f5.com/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20090803101046+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20090803101109+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20090803005803
- /Title: CRP-e
- pdf_file_size_bytes: 350221
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
0856b_pdf.pdf |
c0212_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 3
- EAL4 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG_EXT.1: 14
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.4: 3
- FCS_CKM_EXT.4: 19
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 33
- FCS_COP.1.1: 3
- FCS_RBG_EXT.1: 15
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FCS_SSH_EXT.1: 15
- FCS_SSH_EXT.1.1: 2
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 2
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 2
- FCS_SSH_EXT.1.6: 2
- FCS_SSH_EXT.1.7: 2
- FCS_TLS_EXT.1: 21
- FCS_TLS_EXT.1.1: 2
- FCS_TLS_EXT.1.2: 2
- FDP:
- FDP_ACC.1: 17
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 14
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 5
- FDP_RIP.2: 11
- FDP_RIP.2.1: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_PMG_EXT.1: 14
- FIA_PMG_EXT.1.1: 1
- FIA_SOS: 1
- FIA_UAU.1: 2
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 14
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 21
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 3
- FIA_UIU_EXT.1: 1
- FMT:
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_APW: 1
- FPT_APW_EXT.1: 13
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_SKP: 1
- FPT_SKP_EXT.1: 13
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 2
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 13
- FPT_TST_EXT.1.1: 2
- FPT_TUD: 1
- FPT_TUD_EXT.1: 14
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FRU:
- FRU_RSA.1: 9
- FRU_RSA.1.1: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTA_SSL.4: 10
- FTA_SSL.4.1: 1
- FTA_TAB.1: 13
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 21
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 15
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 13
- FAU_SAR.1.1: 1
- FAU_SAR.2: 11
- FAU_SAR.2.1: 1
- FAU_STG.1: 13
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 10
- FDP:
- FDP_ACC.1: 26
- FDP_ACC.1.1: 2
- FDP_ACF.1: 28
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_MTD.1: 16
- FDP_MTD.1.1: 1
- FDP_SOS: 1
- FDP_SOS.1: 20
- FDP_SOS.1.1: 1
- FDP_UAU.2: 1
- FDP_UID.2: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 13
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS: 2
- FIA_SOS.1: 32
- FIA_SOS.1.1: 2
- FIA_UAU: 2
- FIA_UAU.1: 9
- FIA_UAU.2: 20
- FIA_UAU.2.1: 1
- FIA_UAU.7: 15
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 10
- FIA_UID.2: 23
- FMT:
- FMT_MOF.1: 43
- FMT_MOF.1.1: 1
- FMT_MSA.1: 13
- FMT_MSA.1.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 56
- FMT_MTD.1.1: 5
- FMT_RVM.1: 1
- FMT_SMF.1: 24
- FMT_SMF.1.1: 1
- FMT_SMR.1: 30
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 39
- FPT_RVM.1.1: 1
- FPT_SEP.1: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECTIONS: 3
- A.KEYS: 2
- A.LDAP: 3
- A.LOGSERVER: 3
- A.MGMTNET: 3
- A.NO_GENERAL_PURPOSE: 3
- A.PEERTRUST: 3
- A.PHYSICAL: 3
- A.TIME: 3
- A.TRAINED_ADMIN: 3
- A.TRUSTED_ADMIN: 3
- O:
- O.ADDRESS_FILTERING: 9
- O.DISPLAY_BANNER: 5
- O.FAILOVER: 5
- O.LTM-TRAFFICMGMT: 13
- O.PORT_FILTERING: 9
- O.PROTECTED_COMMUNICATIONS: 19
- O.RELATED_CONNECTION_FILTERING: 6
- O.RESIDUAL_INFORMATION_CLEARING: 5
- O.RESOURCE_AVAILABILITY: 5
- O.SESSION_LOCK: 6
- O.STATEFUL_INSPECTION: 4
- O.SYSTEM_MONITORING: 9
- O.TOE_ADMINISTRATION: 19
- O.TSF_SELF_TEST: 5
- O.VERIFIABLE_UPDATES: 5
- OE:
- OE.CONNECTIONS: 3
- OE.KEYS: 2
- OE.LDAP: 4
- OE.LOGSERVER: 3
- OE.MGMTNET: 3
- OE.NO_GENERAL_PURPOSE: 3
- OE.PEERTRUST: 3
- OE.PHYSICAL: 3
- OE.TIME: 5
- OE.TRAINED_ADMIN: 4
- OE.TRUSTED_ADMIN: 4
- T:
- T.ADMIN_ERROR: 5
- T.NETWORK_ACCESS: 5
- T.NETWORK_DISCLOSURE: 2
- T.NETWORK_DOS: 4
- T.NETWORK_MISUSE: 2
- T.PUBLIC_NETWORKS: 3
- T.RESOURCE_EXHAUSTION: 3
- T.TSF_FAILURE: 3
- T.UNAUTHORIZED_ACCESS: 4
- T.UNAUTHORIZED_UPDATE: 3
- T.UNDETECTED_ACTIONS: 3
- T.USER_DATA_REUSE: 3
|
- O:
- O.AUDIT: 9
- O.CE: 5
- O.DATAACCESS: 8
- O.IA: 11
- O.MANAGE: 7
- OE:
- OE.ADMIN: 4
- OE.CE: 4
- OE.HDD: 6
- OE.NET: 4
- OE.PLACE: 4
- OE.USR: 4
- OE.WATCH: 2
- T:
- T.ACCESS: 2
- T.HDDACCESS: 2
- T.IMPADMIN: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 11
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 6
- DHE: 2
- Diffie-Hellman: 2
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 10
- SHA-384: 9
- SHA256: 1
- SHA384: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- SSH:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 83
- TLS 1.0: 4
- TLS 1.1: 4
- TLS 1.2: 2
- TLS v1.1: 1
- TLSv1.1: 4
- TLSv1.2: 7
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- NIST P-256: 10
- P-256: 13
- curve P-256: 1
- secp256r1: 8
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 140-2: 6
- FIPS 186-2: 1
- FIPS PUB 186-3: 3
- FIPS197: 2
- FIPS198-1: 2
- PKCS:
- RFC:
- RFC 2246: 1
- RFC 2460: 1
- RFC 2818: 1
- RFC 3513: 1
- RFC 4253: 2
- RFC 4346: 1
- RFC 4443: 1
- RFC 5246: 1
- RFC 768: 1
- RFC 791: 1
- RFC 792: 1
- RFC 793: 1
- RFC1321: 2
- RFC2104: 2
- RFC2326: 2
- RFC2460: 4
- RFC2818: 2
- RFC3261: 2
- RFC3447: 11
- RFC3526: 2
- RFC4251: 4
- RFC4252: 5
- RFC4253: 9
- RFC4254: 2
- RFC4291: 3
- RFC4346: 9
- RFC4443: 4
- RFC4492: 7
- RFC5228: 2
- RFC5246: 8
- RFC5280: 3
- RFC5722: 2
- RFC5735: 4
- RFC6151: 1
- RFC768: 4
- RFC791: 4
- RFC792: 4
- RFC793: 4
- RFC959: 4
- X509:
|
- CC:
- CCIMB-2005-08-001: 2
- CCIMB-2005-08-002: 1
- CCIMB-2005-08-003: 1
- ISO:
- ISO/IEC 15408: 6
- ISO/IEC 15408:2005: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- TOE, including the fipscardsync utility provided with BIG-IP for convenience, are considered to be out of scope for this evaluation. 7.1.3.3 Certificate validation For TLS sessions, the TOE implements: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /AAPL:Keywords: ['Security Target', 'Common Criteria', 'F5', 'Application Delivery Controller', 'Firewall', 'Networking']
- /Author: David Ochel, Gordon McIntosh, Staffan Persson (generated by CCTool version 2.8.1.16)
- /CreationDate: D:20170216134702Z
- /Creator: Unknown
- /Keywords: Security Target, Common Criteria, F5, Application Delivery Controller, Firewall, Networking
- /ModDate: D:20170816153147+02'00'
- /Producer: Mac OS X 10.12.3 Quartz PDFContext
- /Subject: BIG-IP ADF-Base
- /Title: BIG-IP 11.5.1 HF 10 ADF-Base Security Target (version 1.7 as of 2017-02-06)
- pdf_file_size_bytes: 3458585
- pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf, http://www.ietf.org/rfc/rfc2104.txt, http://www.ietf.org/rfc/rfc5228.txt, https://devcentral.f5.com/wiki/iRules.Events.ashx, http://www.ietf.org/rfc/rfc1321.txt, http://www.ietf.org/rfc/rfc3447.txt, http://tmml.sourceforge.net/doc/tcl/index.html, http://www.ietf.org/rfc/rfc4492.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf, http://www.ietf.org/rfc/rfc5246.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf, http://www.ietf.org/rfc/rfc3526.txt, http://www.cs.ucr.edu/~marios/ethereal-tcpdump.pdf, https://devcentral.f5.com/wiki/iRules.Commands.ashx, http://www.ietf.org/rfc/rfc5280.txt
- pdf_is_encrypted: False
- pdf_number_of_pages: 103
|
- /CreationDate: D:20090731103907+09'00'
- /ModDate: D:20090731103907+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 382882
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 89
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |