name |
Cisco Adaptive Security Appliances Version: ASA software version 9.1(2) Components: ASA 5500 (5505, 5510, 5520, 5540, 5550, 5580-20-40), ASA 5500-X Series (5512-X, 5515-X, 5525-X, 5545-X, 5555-X), ASA 5585-X (5585-10, 5585-20, 5585-40, 5585-60), ASA Services Module (ASA-SM) |
Ricoh imagio MP C7501 SP/C6001 SP both with imagio FAX Unit Type23, imagio Security Card Type7, and imagio HDD Encryption Card Type7 Version: - Software version: System/Copy 1.03, Network Support 9.62, Scanner 01.05, Printer 1.03, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.04, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.6, RPCS Font 1.00, Engine 1.07:06, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-18(WW) 02.00.00, Data Erase Opt 1.01x |
category |
Network and Network-Related Devices and Systems |
Multi-Function Devices |
scheme |
AU |
JP |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
03.10.2016 |
not_valid_before |
05.09.2013 |
30.09.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ASA_CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0320_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ASA_ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0320_est.pdf |
manufacturer |
Cisco Systems, Inc. |
Ricoh Company, Ltd. |
manufacturer_web |
https://www.cisco.com |
https://www.ricoh.com/ |
security_level |
{} |
ALC_FLR.2, EAL3+ |
dgst |
f79f5a3bdb302ec0 |
35a245a49d5ea495 |
heuristics/cert_id |
Certificate Number: 2013/86 |
JISEC-CC-CRP-C0320 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)21:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(5\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(3\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(1.7\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)9:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.10:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(2\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)29:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)4:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.7.23:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)12:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)13:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(6.11\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.7.4:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.7.13:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)19:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)16:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)7:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)6:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)25:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)23:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)20:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)11:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(1\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7.245\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)15:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.7.15:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2017-3807, CVE-2013-5510, CVE-2016-6432, CVE-2017-3793, CVE-2014-2126, CVE-2013-5560, CVE-2015-6326, CVE-2020-3580, CVE-2016-1379, CVE-2020-3581, CVE-2013-5512, CVE-2022-20760, CVE-2013-5509, CVE-2022-20742, CVE-2016-6461, CVE-2017-6609, CVE-2013-5507, CVE-2015-0677, CVE-2022-20759, CVE-2014-2128, CVE-2022-20737, CVE-2013-5542, CVE-2014-0739, CVE-2014-3392, CVE-2017-6770, CVE-2013-5511, CVE-2022-20715, CVE-2013-5515, CVE-2015-6360, CVE-2017-6765, CVE-2015-6325, CVE-2017-6608, CVE-2016-6424, CVE-2016-1287, CVE-2020-3578, CVE-2017-6610, CVE-2013-5508, CVE-2015-6327, CVE-2014-3393, CVE-2016-6431, CVE-2015-4458, CVE-2015-6324, CVE-2014-2127, CVE-2015-0676, CVE-2020-3582, CVE-2022-20745, CVE-2014-2129, CVE-2013-5513, CVE-2015-0675, CVE-2017-6607 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_PRE.1, ALC_CMS.1, ADV_FSP.1, AVA_VAN.1, AGD_OPE.1, ATE_IND.1, ALC_CMC.1 |
ASE_INT.1, ATE_FUN.1, ALC_DVS.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_CMC.3, ATE_IND.2, ASE_SPD.1, ASE_OBJ.2, ADV_TDS.2, ATE_COV.2, ALC_CMS.3, ASE_REQ.2, ADV_ARC.1, ALC_DEL.1, ATE_DPT.1, AGD_OPE.1, ALC_LCD.1, ALC_FLR.2, ASE_ECD.1, ADV_FSP.3, AVA_VAN.2 |
heuristics/extracted_versions |
9.1 |
3.10.6, 1.07, 1.03, 9.62, 01.05, 02.00.00, 1.01, 1.00, 1.04 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0320
- certification_date: 01.09.2011
- claim: EAL3+ ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL3 Augmented with ALC_FLR.2
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0320_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Ricoh imagio MP C7501 SP/C6001 SP both with imagio FAX Unit Type23, imagio Security Card Type7, and imagio HDD Encryption Card Type7
- product_type: Multi Function Product
- protection_profile: IEEE Std 2600.1-2009
- report_link: https://www.ipa.go.jp/en/security/c0320_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0320_est.pdf
- toe_version: -Software version: System/Copy 1.03 Network Support 9.62 Scanner 01.05 Printer 1.03 Fax 02.00.00 RemoteFax 02.00.00 Web Support 1.04 Web Uapl 1.01 NetworkDocBox 1.01 animation 1.00 RPCS 3.10.6 RPCS Font 1.00 Engine 1.07:06 OpePanel 1.04 LANG0 1.03 LANG1 1.03 -Hardware version: Ic Key 01020700 Ic Ctlr 03 -Option version: GWFCU3-18(WW) 02.00.00 Data Erase Opt 1.01x
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.10.2016
- supplier: RICOH COMPANY, LTD.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0320_it1340.html
- toe_japan_name: Ricoh imagio MP C7501 SP/C6001 SP both with imagio FAX Unit Type23, imagio Security Card Type7, and imagio HDD Encryption Card Type7 - Software version: System/Copy 1.03, Network Support 9.62, Scanner 01.05, Printer 1.03, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.04, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.6, RPCS Font 1.00, Engine 1.07:06, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-18(WW) 02.00.00, Data Erase Opt 1.01x
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ASA_CR.pdf |
c0320_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- AU:
- Certification Report 2013/86: 1
- FR:
- Certification Report 2013/86: 1
|
- JP:
- CRP-C0320-01: 1
- Certification No. C0320: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL3: 4
- EAL3 augmented: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.7: 1
- FCS_TLS_EXT.1: 1
- FIA:
- FIA_PMG: 1
- FIA_UIA_EXT.1: 1
- FPT:
- FPT_ITC.1: 1
- FPT_STM: 1
- FPT_TUD_EXT.1: 1
- FTA:
- FTA_SSL.4: 1
- FTA_SSL_EXT.1: 1
- FTA_TAB.1: 1
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
|
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 2
- T.DOC: 2
- T.FUNC: 1
- T.PROT: 1
|
pdf_data/report_keywords/vendor |
- Cisco:
- Cisco: 57
- Cisco Systems: 2
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2012-09-004: 1
- CCMB-2012-09-00: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: ACA
- /Company: Department of Defence
- /CreationDate: D:20130905151709+10'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /ModDate: D:20130905151729+10'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /SourceModified: D:20130905050059
- /Title:
- pdf_file_size_bytes: 76300
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /CreationDate: D:20111130123147+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20111130123228+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 355118
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
ASA_ST.pdf |
c0320_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_FLR.2: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.1.1: 1
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 23
- FCS_COP.1.1: 4
- FCS_IKE_EXT.1: 1
- FCS_RBG_EXT.1: 6
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT.1: 6
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_TLS_EXT.1: 7
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_RIP.2: 6
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.6: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.5: 1
- FIA_UIA_EXT.1: 6
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SFR.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_ITT.1: 3
- FPT_ITT.1.1: 1
- FPT_PTD_EXT.1: 2
- FPT_RPL.1: 1
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FRU:
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 1
- FTA_SSL_EXT.1: 7
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 7
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 31
- FDP_ACC.1.1: 2
- FDP_ACF.1: 31
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 8
- FDP_ACF.1.4: 3
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 10
- FIA_SOS.1.1: 1
- FIA_UAU.1: 31
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 39
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 20
- FMT_MSA.1.1: 2
- FMT_MSA.3: 23
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR.1: 29
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 5
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 21
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TST.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 4
- A.PHYSICAL: 2
- A.TRUSTED_ADMIN: 4
- O:
- O.ADDRESS_FILTERING: 6
- O.DISPLAY_BANNER: 4
- O.PORT_FILTERING: 4
- O.PROTECTED_COMMUNI: 1
- O.PROTECTED_COMMUNICA: 1
- O.PROTECTED_COMMUNICAT: 1
- O.PROTECTED_COMMUNICATIONS: 3
- O.RELATED_CONNECTION: 1
- O.RELATED_CONNECTION_FI: 2
- O.RELATED_CONNECTION_FILTERING: 3
- O.RESIDUAL_INFORMATIO: 1
- O.RESIDUAL_INFORMATION_: 2
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.RESOURCE_AVAILABILI: 1
- O.RESOURCE_AVAILABILITY: 4
- O.SESSION_LOCK: 4
- O.STATEFUL_INSPECTION: 4
- O.SYSTEM_MONITORING: 6
- O.TOE_ADMINISTRATION: 6
- O.TSF_SELF_TEST: 6
- O.VERIFIABLE_UPDATES: 4
- OE:
- OE.CONNECTIONS: 2
- OE.NO_GENERAL_PURPOS: 1
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 3
- OE.TRUSTED_ADMIN: 3
- T:
- T.ADMIN_ERROR: 4
- T.NETWORK_ACCESS: 1
- T.NETWORK_DISCLOSURE: 3
- T.NETWORK_DOS: 4
- T.NETWORK_MISUSE: 5
- T.RESOURCE_EXHAUSTION: 3
- T.TRANSMIT: 3
- T.TSF_FAILURE: 4
- T.UNAUTHORIZED_ACCESS: 4
- T.UNAUTHORIZED_UPDATE: 2
- T.UNDETECTED_ACTIONS: 2
- T.USER_DATA_REUSE: 2
|
- A:
- A.ACCESS: 5
- A.ADMIN: 10
- A.USER: 4
- O:
- O.AUDIT: 9
- O.CONF: 18
- O.DOC: 18
- O.FUNC: 9
- O.INTERFACE: 9
- O.PROT: 9
- O.RCGATE: 13
- O.SOFTWARE: 9
- O.STORAGE: 14
- O.USER: 21
- OE:
- OE.ADMIN: 8
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_ACCESS_AUTHORIZED: 1
- OE.AUDIT_STORAGE: 3
- OE.INTERFACE: 4
- OE.PHYSICAL: 4
- OE.USER: 21
- T:
- T.CONF: 10
- T.DOC: 10
- T.FUNC: 5
- T.PROT: 5
|
pdf_data/st_keywords/vendor |
- Cisco:
- Cisco: 37
- Cisco Systems, Inc: 4
- Microsoft:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- miscellaneous:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 2
- SHA-512: 8
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 40
- TLS 1.0: 1
- TLS v1.0: 1
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-009-001: 1
- CCMB-2012-009-004: 1
- FIPS:
- FIPS 140-2: 3
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 2
- FIPS PUB 186-2: 3
- FIPS PUB 186-3: 3
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-56B: 3
- RFC:
- RFC 2246: 1
- RFC 2460: 3
- RFC 2818: 1
- RFC 3513: 2
- RFC 3602: 2
- RFC 4109: 1
- RFC 4253: 1
- RFC 4303: 2
- RFC 4443: 3
- RFC 5735: 2
- RFC 768: 3
- RFC 791: 3
- RFC 792: 3
- RFC 793: 3
- RFC 959: 1
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- out of scope: 1
- purpose other than securing traffic flows that originate from or terminate to the ASA itself) is out of scope for this evaluated configuration, so will not be used in the TOE. In the certified configuration: 1
|
|
pdf_data/st_metadata |
|
- /Author: rskak1200296
- /CreationDate: D:20111128111025+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20111128111025+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: Microsoft Word - MP_C6001_ST_DOM_1.00_ENG_0.03.doc
- pdf_file_size_bytes: 569476
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 90
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |