name |
F5 Networks BIG-IP® Application Delivery Firewall (ADF-Base) version 11.5 HF10 |
HP StorageWorks P9000 Command View Advanced Edition Software Common Component Version: 7.0.1-00 |
category |
Network and Network-Related Devices and Systems |
Access Control Devices and Systems |
scheme |
DE |
JP |
status |
archived |
archived |
not_valid_after |
02.08.2022 |
01.09.2016 |
not_valid_before |
03.08.2017 |
15.08.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0856a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0305_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0856b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0305_est.pdf |
manufacturer |
F5 Networks, Inc. |
Hewlett-Packard Company |
manufacturer_web |
https://www.f5.com/ |
https://www.hp.com |
security_level |
EAL4+, ALC_FLR.3 |
EAL2+, ALC_FLR.1 |
dgst |
f34044c28e3c540c |
c63773cb15a5150c |
heuristics/cert_id |
BSI-DSZ-CC-0856-2017 |
JISEC-CC-CRP-C0305 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:h:hp:9000:-:*:*:*:*:*:*:*, cpe:2.3:a:hp:p9000_command_view_advanced_edition_software:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2016-2003, CVE-2010-4107 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
11.5 |
7.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-0975-2018 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-0975-2018 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0305
- certification_date: 01.08.2011
- claim: EAL2+ ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0305_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: HP StorageWorks P9000 Device Manager Software, HP StorageWorks P9000 Replication Manager Software, HP StorageWorks P9000 Tiered Storage Manager Software, and HP StorageWorks P9000 Tuning Manager Software. These products, in combination with TOE, are commonly referred to as HP StorageWorks P9000 Command View Advanced Edition Software. TOE is a foundational module for HP StorageWorks P9000 Command View Advanced Edition Software, and is packaged with all products. TOE security functions TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: HP StorageWorks P9000 Command View Advanced Edition Software Common Component
- product_type: Foundational Module Software
- report_link: https://www.ipa.go.jp/en/security/c0305_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0305_est.pdf
- toe_version: 7.0.1-00
- vendor: Hewlett-Packard Company
- expiration_date: 01.09.2016
- supplier: Hewlett-Packard Company
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0305_it0331.html
- toe_overseas_name: HP StorageWorks P9000 Command View Advanced Edition Software Common Component 7.0.1-00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0856a_pdf.pdf |
c0305_erpt.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.3
- cc_version: Product specific Security Target Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0856-2017
- cert_item: F5 Networks BIG-IP® Application Delivery Firewall (ADF-Base), version 11.5.1 HF10
- cert_lab: BSI
- developer: F5 Networks, Inc
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0305-01: 1
- Certification No. C0305: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 10
- EAL 4 augmented: 3
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- EAL4: 1
- ITSEC:
|
- EAL:
- EAL2: 4
- EAL2 augmented: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 1
- AGD_PRE: 4
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
- ALC:
- ALC_FLR.1: 3
- ALC_FLR.2: 1
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FIA:
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMINISTRATORS: 1
- A.CLIENTS: 1
- A.NETWORKS: 1
- A.PASSWORD: 1
- A.PHYSICAL: 1
- A.SECURE_CHANNEL: 1
- A.SRV_MGMT: 1
- A.VERSION: 1
- T:
- T.ILLEGAL_ACCESS: 2
- T.UNAUTHORISED_ACCESS: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-384: 7
- SHA256: 2
- SHA384: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IKE:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 14
- TLS v1.1: 2
- TLSv1.1: 6
- TLSv1.2: 7
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
- NIST:
- NIST P-256: 1
- P-256: 1
- secp256r1: 8
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- FIPS:
- FIPS180-3: 16
- FIPS180-310: 1
- FIPS180-4: 1
- FIPS186-3: 6
- FIPS186-39: 1
- FIPS186-4: 1
- FIPS198-1: 3
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC1321: 1
- RFC2104: 1
- RFC3447: 10
- RFC3526: 1
- RFC4251: 1
- RFC4252: 2
- RFC4253: 4
- RFC4346: 5
- RFC4492: 6
- RFC5246: 6
- RFC6151: 1
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Version 5.1, 2017-07-28, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 2017-07-05, CI list for documentation in Perforce: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20170816150424+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, F5 Networks, BIG-IP, Application Delivery Firewall (ADF-Base) version 11.5.1 HF10"
- /ModDate: D:20170817100036+02'00'
- /Producer: LibreOffice 5.2
- /Subject: Certification Report, Zertifizierungsreport
- /Title: Certification Report BSI-DSZ-CC-0856-2017
- pdf_file_size_bytes: 1712889
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://askF5.com/, https://www.bsi.bund.de/zertifizierung, https://downloads.f5.com/, https://www.bsi.bund.de/zertifizierungsreporte, https://support.f5.com/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110927171053+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110928093233+09'00'
- /Producer: Acrobat Distiller 8.3.0 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 347111
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
0856b_pdf.pdf |
c0305_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 3
- EAL4 augmented: 1
|
- EAL:
- EAL2: 7
- EAL2 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG_EXT.1: 14
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.4: 3
- FCS_CKM_EXT.4: 19
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 33
- FCS_COP.1.1: 3
- FCS_RBG_EXT.1: 15
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FCS_SSH_EXT.1: 15
- FCS_SSH_EXT.1.1: 2
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 2
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 2
- FCS_SSH_EXT.1.6: 2
- FCS_SSH_EXT.1.7: 2
- FCS_TLS_EXT.1: 21
- FCS_TLS_EXT.1.1: 2
- FCS_TLS_EXT.1.2: 2
- FDP:
- FDP_ACC.1: 17
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 14
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 5
- FDP_RIP.2: 11
- FDP_RIP.2.1: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_PMG_EXT.1: 14
- FIA_PMG_EXT.1.1: 1
- FIA_SOS: 1
- FIA_UAU.1: 2
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 14
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 21
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 3
- FIA_UIU_EXT.1: 1
- FMT:
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_APW: 1
- FPT_APW_EXT.1: 13
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_SKP: 1
- FPT_SKP_EXT.1: 13
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 2
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 13
- FPT_TST_EXT.1.1: 2
- FPT_TUD: 1
- FPT_TUD_EXT.1: 14
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FRU:
- FRU_RSA.1: 9
- FRU_RSA.1.1: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTA_SSL.4: 10
- FTA_SSL.4.1: 1
- FTA_TAB.1: 13
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 21
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 15
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECTIONS: 3
- A.KEYS: 2
- A.LDAP: 3
- A.LOGSERVER: 3
- A.MGMTNET: 3
- A.NO_GENERAL_PURPOSE: 3
- A.PEERTRUST: 3
- A.PHYSICAL: 3
- A.TIME: 3
- A.TRAINED_ADMIN: 3
- A.TRUSTED_ADMIN: 3
- O:
- O.ADDRESS_FILTERING: 9
- O.DISPLAY_BANNER: 5
- O.FAILOVER: 5
- O.LTM-TRAFFICMGMT: 13
- O.PORT_FILTERING: 9
- O.PROTECTED_COMMUNICATIONS: 19
- O.RELATED_CONNECTION_FILTERING: 6
- O.RESIDUAL_INFORMATION_CLEARING: 5
- O.RESOURCE_AVAILABILITY: 5
- O.SESSION_LOCK: 6
- O.STATEFUL_INSPECTION: 4
- O.SYSTEM_MONITORING: 9
- O.TOE_ADMINISTRATION: 19
- O.TSF_SELF_TEST: 5
- O.VERIFIABLE_UPDATES: 5
- OE:
- OE.CONNECTIONS: 3
- OE.KEYS: 2
- OE.LDAP: 4
- OE.LOGSERVER: 3
- OE.MGMTNET: 3
- OE.NO_GENERAL_PURPOSE: 3
- OE.PEERTRUST: 3
- OE.PHYSICAL: 3
- OE.TIME: 5
- OE.TRAINED_ADMIN: 4
- OE.TRUSTED_ADMIN: 4
- T:
- T.ADMIN_ERROR: 5
- T.NETWORK_ACCESS: 5
- T.NETWORK_DISCLOSURE: 2
- T.NETWORK_DOS: 4
- T.NETWORK_MISUSE: 2
- T.PUBLIC_NETWORKS: 3
- T.RESOURCE_EXHAUSTION: 3
- T.TSF_FAILURE: 3
- T.UNAUTHORIZED_ACCESS: 4
- T.UNAUTHORIZED_UPDATE: 3
- T.UNDETECTED_ACTIONS: 3
- T.USER_DATA_REUSE: 3
|
- A:
- A.ADMINISTRATORS: 3
- A.ADMINISTROTORS: 1
- A.CLIENTS: 4
- A.NETWORKS: 3
- A.PASSWORD: 3
- A.PHYSICAL: 4
- A.SECURE_CHANNEL: 3
- A.SRV_MGMT: 3
- A.VERSION: 4
- O:
- O.BANNER: 6
- O.MGMT: 9
- O.PASSWORD: 7
- OE:
- OE.BANNER: 4
- OE.PASSWORD: 4
- OE.SECURE_CHANNEL: 4
- T:
- T.ILLEGAL_ACCESS: 4
- T.UNAUTHORISED_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 4
- Microsoft Corporation: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 11
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 6
- DHE: 2
- Diffie-Hellman: 2
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 10
- SHA-384: 9
- SHA256: 1
- SHA384: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- SSH:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 83
- TLS 1.0: 4
- TLS 1.1: 4
- TLS 1.2: 2
- TLS v1.1: 1
- TLSv1.1: 4
- TLSv1.2: 7
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- NIST P-256: 10
- P-256: 13
- curve P-256: 1
- secp256r1: 8
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 140-2: 6
- FIPS 186-2: 1
- FIPS PUB 186-3: 3
- FIPS197: 2
- FIPS198-1: 2
- PKCS:
- RFC:
- RFC 2246: 1
- RFC 2460: 1
- RFC 2818: 1
- RFC 3513: 1
- RFC 4253: 2
- RFC 4346: 1
- RFC 4443: 1
- RFC 5246: 1
- RFC 768: 1
- RFC 791: 1
- RFC 792: 1
- RFC 793: 1
- RFC1321: 2
- RFC2104: 2
- RFC2326: 2
- RFC2460: 4
- RFC2818: 2
- RFC3261: 2
- RFC3447: 11
- RFC3526: 2
- RFC4251: 4
- RFC4252: 5
- RFC4253: 9
- RFC4254: 2
- RFC4291: 3
- RFC4346: 9
- RFC4443: 4
- RFC4492: 7
- RFC5228: 2
- RFC5246: 8
- RFC5280: 3
- RFC5722: 2
- RFC5735: 4
- RFC6151: 1
- RFC768: 4
- RFC791: 4
- RFC792: 4
- RFC793: 4
- RFC959: 4
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- TOE, including the fipscardsync utility provided with BIG-IP for convenience, are considered to be out of scope for this evaluation. 7.1.3.3 Certificate validation For TLS sessions, the TOE implements: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /AAPL:Keywords: ['Security Target', 'Common Criteria', 'F5', 'Application Delivery Controller', 'Firewall', 'Networking']
- /Author: David Ochel, Gordon McIntosh, Staffan Persson (generated by CCTool version 2.8.1.16)
- /CreationDate: D:20170216134702Z
- /Creator: Unknown
- /Keywords: Security Target, Common Criteria, F5, Application Delivery Controller, Firewall, Networking
- /ModDate: D:20170816153147+02'00'
- /Producer: Mac OS X 10.12.3 Quartz PDFContext
- /Subject: BIG-IP ADF-Base
- /Title: BIG-IP 11.5.1 HF 10 ADF-Base Security Target (version 1.7 as of 2017-02-06)
- pdf_file_size_bytes: 3458585
- pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf, http://www.ietf.org/rfc/rfc2104.txt, http://www.ietf.org/rfc/rfc5228.txt, https://devcentral.f5.com/wiki/iRules.Events.ashx, http://www.ietf.org/rfc/rfc1321.txt, http://www.ietf.org/rfc/rfc3447.txt, http://tmml.sourceforge.net/doc/tcl/index.html, http://www.ietf.org/rfc/rfc4492.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf, http://www.ietf.org/rfc/rfc5246.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf, http://www.ietf.org/rfc/rfc3526.txt, http://www.cs.ucr.edu/~marios/ethereal-tcpdump.pdf, https://devcentral.f5.com/wiki/iRules.Commands.ashx, http://www.ietf.org/rfc/rfc5280.txt
- pdf_is_encrypted: False
- pdf_number_of_pages: 103
|
- /Author: Hewlett-Packard Company
- /CreationDate: D:20110926112601
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110926112601
- /Producer: Microsoft® Office Word 2007
- /Subject: CVAE-ST
- /Title: HP StorageWorks P9000 Command View Advanced Edition Software Common Component Security Target
- pdf_file_size_bytes: 448528
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |