HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2
CSV information ?
Status | archived |
---|---|
Valid from | 18.03.2015 |
Valid until | 18.03.2020 |
Scheme | 🇲🇾 MY |
Manufacturer | HP TippingPoint |
Category | Network and Network-Related Devices and Systems |
Security level | ALC_FLR.2, EAL3+ |
Maintenance updates | Trend Micro TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, S6100N, S5100N, S2500N and S660N model appliances running TippingPoint Operating System v3.8.0 (25.04.2016) Certification report Security target |
Trend Micro TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.8.2 (21.07.2016) Certification report Security target | |
HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, S6100N, S5100N, S2500N and S660N model appliances running TippingPoint Operating System v3.8.0 (07.04.2015) Certification report Security target |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Schemes
MACProtocols
SSH, SSLSecurity level
EAL3, EAL2Security Assurance Requirements (SAR)
ALC_FLR.2Security Functional Requirements (SFR)
FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4.1, FAU_SEL.1.1, FMT_SMF.1.1, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Certificates
ISCB-5-RPT-C055-CR-v1Standards
FIPS 140-2, ISO/IEC15408, ISO/IEC 18045File metadata
Title | C055 Certification Report |
---|---|
Subject | HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2 |
Keywords | HP TippingPoint Intrusion Prevention System |
Author | ISCB Department |
Creation date | D:20150318142844+08'00' |
Modification date | D:20150318142844+08'00' |
Pages | 29 |
Creator | Microsoft® Word 2013 |
Producer | Microsoft® Word 2013 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, RC2, RC4, DES, 3DES, BlowfishAsymmetric Algorithms
DSASchemes
MACProtocols
SSH, SSLLibraries
OpenSSLSecurity level
EAL 3, EAL3, EAL 3 augmentedClaims
O.SENSOR, O.ANALYZER, O.RESPONSE, O.REVIEW, O.ADMIN, O.ACCESS, O.AUDIT, O.INTEGRITY, O.STORAGE, O.TRAFFIC, T.COMPROMISE, T.LOSSOF, T.PRIVILEGE, T.CONFIG, T.INFLUX, T.ACCOUNT, T.MISUSE, T.ACCIDENT, T.MALICE, A.ACCESS, A.PROTECT, A.MANAGE, A.NOEVIL, OE.INSTALL, OE.PHYSICAL, OE.PERSONNEL, OE.CONFIDSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_SEL, FAU_STG, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1, FAU_SAR.2, FAU_SEL.1, FAU_STG.4, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.2, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4.1, FAU_STG.1, FDP_IFC, FDP_IFF, FDP_IFF.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_UAU.1, FIA_UID.1, FMT_MTD.1, FMT_MOF, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.3, FPT_STM, FPT_STM.1, FPT_STM.1.1, FTP_TRP, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Evaluation facilities
LeidosSide-channel analysis
malfunctionStandards
FIPS 140-2, X.509File metadata
Creation date | D:20150318142909+08'00' |
---|---|
Modification date | D:20150318142917+08'00' |
Pages | 58 |
Producer | Foxit Reader PDF Printer Version 7.0.1.831 |
Heuristics ?
Extracted SARs
ATE_COV.2, ASE_CCL.1, ATE_DPT.1, ALC_LCD.1, ALC_CMC.3, ASE_TSS.1, ALC_DEL.1, ADV_FSP.3, ASE_REQ.2, ADV_TDS.2, ADV_ARC.1, AGD_PRE.1, ALC_FLR.2, ATE_FUN.1, ASE_SPD.1, ATE_IND.2, ASE_ECD.1, AGD_OPE.1, AVA_VAN.2, ALC_CMS.3, ASE_OBJ.2, ASE_INT.1, ALC_DVS.1Similar certificates
Name | Certificate ID | |
---|---|---|
HP TippingPoint Intrusion Prevention Systems (S6100N, S5100N, S2500N, S1400N, S660N running TippingPoint OS v3.2.1; S330, S110, S10 running TippingPoint OS v3.1.4) | CCEVS-VR-VID-10345-2011 | Compare |
References ?
No references are available for this certificate.
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2c1c43a666a3fc88559e91db9cb80b213e0836113429e361bdc7000dad0854ec', 'txt_hash': '9b9db6bb6759e1a61d0fe2f3841d0bc635a4fd7c09b9a1f95ade2be0ba083979'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'cff9a1bcdc3e242cb429e5ba2dc4677e32ff1fb42a98872beae7766c75d39e6f', 'txt_hash': '5a2ae1ecd47b81bf3736e7072cc96dd7cab836c8116cea6aa28f2de9047f44fe'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 733406, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 29, '/Title': 'C055 Certification Report', '/Author': 'ISCB Department', '/Subject': 'HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2', '/Keywords': 'HP TippingPoint Intrusion Prevention System', '/Creator': 'Microsoft® Word 2013', '/CreationDate': "D:20150318142844+08'00'", '/ModDate': "D:20150318142844+08'00'", '/Producer': 'Microsoft® Word 2013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.commoncriteriaportal.org/', 'http://www.cybersecurity.my/mycc']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1322388, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 58, '/Producer': 'Foxit Reader PDF Printer Version 7.0.1.831', '/Creator': '', '/CreationDate': "D:20150318142909+08'00'", '/ModDate': "D:20150318142917+08'00'", '/Author': '', '/Keywords': '', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'MY': {'ISCB-5-RPT-C055-CR-v1': 28}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 8, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 6}}, 'cc_sfr': {'FAU': {'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_STG.4.1': 1, 'FAU_SEL.1.1': 1}, 'FMT': {'FMT_SMF.1.1': 1, 'FMT_MTD.1.1': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1.1': 1}, 'FTP': {'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'SSH': {'SSH': 3}, 'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}, 'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 5, 'EAL3': 1, 'EAL 3 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 10, 'ADV_FSP.3': 12, 'ADV_TDS.2': 13}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.2': 18, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_CMC.3': 13, 'ALC_CMS.3': 6, 'ALC_DEL.1': 5, 'ALC_DVS.1': 5, 'ALC_LCD.1': 6}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 5, 'ATE_DPT.1': 5, 'ATE_FUN.1': 8, 'ATE_IND.2': 7}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.2': 7}, 'ASE': {'ASE_INT': 1, 'ASE_CCL': 1, 'ASE_SPD': 1, 'ASE_OBJ': 1, 'ASE_ECD': 1, 'ASE_REQ': 1, 'ASE_TSS': 1, 'ASE_INT.1': 12, 'ASE_CCL.1': 14, 'ASE_SPD.1': 7, 'ASE_OBJ.2': 10, 'ASE_ECD.1': 10, 'ASE_REQ.2': 13, 'ASE_TSS.1': 5}}, 'cc_sfr': {'FAU': {'FAU_GEN': 2, 'FAU_SAR': 5, 'FAU_SEL': 2, 'FAU_STG': 2, 'FAU_GEN.1': 13, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1': 12, 'FAU_SAR.2': 6, 'FAU_SEL.1': 6, 'FAU_STG.4': 7, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 6, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.2': 9, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_STG.4.1': 1, 'FAU_STG.1': 2}, 'FDP': {'FDP_IFC': 2, 'FDP_IFF': 2, 'FDP_IFF.1': 12, 'FDP_IFC.1': 8, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 1}, 'FIA': {'FIA_AFL': 2, 'FIA_ATD': 3, 'FIA_SOS': 2, 'FIA_UAU': 2, 'FIA_UID': 1, 'FIA_AFL.1': 7, 'FIA_SOS.1': 8, 'FIA_UAU.2': 12, 'FIA_UID.2': 10, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 7, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 3}, 'FMT': {'FMT_MTD.1': 14, 'FMT_MOF': 2, 'FMT_MTD': 1, 'FMT_SMF': 2, 'FMT_SMR': 2, 'FMT_MOF.1': 7, 'FMT_SMF.1': 7, 'FMT_SMR.1': 12, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 6, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.3': 2}, 'FPT': {'FPT_STM': 3, 'FPT_STM.1': 9, 'FPT_STM.1.1': 1}, 'FTP': {'FTP_TRP': 2, 'FTP_TRP.1': 7, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.SENSOR': 7, 'O.ANALYZER': 6, 'O.RESPONSE': 7, 'O.REVIEW': 6, 'O.ADMIN': 4, 'O.ACCESS': 4, 'O.AUDIT': 4, 'O.INTEGRITY': 3, 'O.STORAGE': 4, 'O.TRAFFIC': 3}, 'T': {'T.COMPROMISE': 3, 'T.LOSSOF': 2, 'T.PRIVILEGE': 3, 'T.CONFIG': 2, 'T.INFLUX': 3, 'T.ACCOUNT': 2, 'T.MISUSE': 3, 'T.ACCIDENT': 2, 'T.MALICE': 3}, 'A': {'A.ACCESS': 3, 'A.PROTECT': 2, 'A.MANAGE': 3, 'A.NOEVIL': 2}, 'OE': {'OE.INSTALL': 2, 'OE.PHYSICAL': 2, 'OE.PERSONNEL': 2, 'OE.CONFID': 2}}, 'vendor': {}, 'eval_facility': {'Leidos': {'Leidos': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}, 'RC': {'RC2': 2, 'RC4': 2}}, 'DES': {'DES': {'DES': 2}, '3DES': {'3DES': 2}}, 'miscellaneous': {'Blowfish': {'Blowfish': 1}}}, 'asymmetric_crypto': {'FF': {'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 3}}, 'crypto_protocol': {'SSH': {'SSH': 9}, 'TLS': {'SSL': {'SSL': 5}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 2}, 'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ISCB-5-RPT-C055-CR-v1.pdf
. - The st_filename property was set to
TippingPointST 1-0.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ISCB-5-RPT-C055-CR-v1
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C055-CR-v1.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%201-0.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "2cfde4db66d5e375",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C055-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.7.2"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2015-04-07",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C055A-AMR-v1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%202-0.pdf",
"maintenance_title": "HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, S6100N, S5100N, S2500N and S660N model appliances running TippingPoint Operating System v3.8.0"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-04-25",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-M003-AMR-v2.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%202-1-clean.pdf",
"maintenance_title": "Trend Micro TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, S6100N, S5100N, S2500N and S660N model appliances running TippingPoint Operating System v3.8.0"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-07-21",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-M005-AMR-v1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%202-2.pdf",
"maintenance_title": "Trend Micro TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.8.2"
}
]
},
"manufacturer": "HP TippingPoint",
"manufacturer_web": "https://www.hp.com/",
"name": "HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2",
"not_valid_after": "2020-03-18",
"not_valid_before": "2015-03-18",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ISCB-5-RPT-C055-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C055-CR-v1": 28
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 6
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL3": 8
}
},
"cc_sfr": {
"FAU": {
"FAU_SEL.1.1": 1,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1,
"FAU_STG.4.1": 1
},
"FMT": {
"FMT_MTD.1.1": 2,
"FMT_SMF.1.1": 1,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1.1": 1
},
"FTP": {
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 3
},
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1
},
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "ISCB Department",
"/CreationDate": "D:20150318142844+08\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/Keywords": "HP TippingPoint Intrusion Prevention System",
"/ModDate": "D:20150318142844+08\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Subject": "HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2",
"/Title": "C055 Certification Report",
"pdf_file_size_bytes": 733406,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.commoncriteriaportal.org/",
"http://www.cybersecurity.my/mycc"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
},
"st_filename": "TippingPointST 1-0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 3,
"A.MANAGE": 3,
"A.NOEVIL": 2,
"A.PROTECT": 2
},
"O": {
"O.ACCESS": 4,
"O.ADMIN": 4,
"O.ANALYZER": 6,
"O.AUDIT": 4,
"O.INTEGRITY": 3,
"O.RESPONSE": 7,
"O.REVIEW": 6,
"O.SENSOR": 7,
"O.STORAGE": 4,
"O.TRAFFIC": 3
},
"OE": {
"OE.CONFID": 2,
"OE.INSTALL": 2,
"OE.PERSONNEL": 2,
"OE.PHYSICAL": 2
},
"T": {
"T.ACCIDENT": 2,
"T.ACCOUNT": 2,
"T.COMPROMISE": 3,
"T.CONFIG": 2,
"T.INFLUX": 3,
"T.LOSSOF": 2,
"T.MALICE": 3,
"T.MISUSE": 3,
"T.PRIVILEGE": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 10,
"ADV_FSP": 1,
"ADV_FSP.3": 12,
"ADV_TDS": 1,
"ADV_TDS.2": 13
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 10,
"AGD_PRE": 1,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.3": 13,
"ALC_CMS": 1,
"ALC_CMS.3": 6,
"ALC_DEL": 1,
"ALC_DEL.1": 5,
"ALC_DVS": 1,
"ALC_DVS.1": 5,
"ALC_FLR": 1,
"ALC_FLR.2": 18,
"ALC_LCD": 1,
"ALC_LCD.1": 6
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 14,
"ASE_ECD": 1,
"ASE_ECD.1": 10,
"ASE_INT": 1,
"ASE_INT.1": 12,
"ASE_OBJ": 1,
"ASE_OBJ.2": 10,
"ASE_REQ": 1,
"ASE_REQ.2": 13,
"ASE_SPD": 1,
"ASE_SPD.1": 7,
"ASE_TSS": 1,
"ASE_TSS.1": 5
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 5,
"ATE_DPT": 1,
"ATE_DPT.1": 5,
"ATE_FUN": 1,
"ATE_FUN.1": 8,
"ATE_IND": 1,
"ATE_IND.2": 7
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.2": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 5,
"EAL 3 augmented": 4,
"EAL3": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 13,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR": 5,
"FAU_SAR.1": 12,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 6,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 6,
"FAU_SAR.3.1": 1,
"FAU_SEL": 2,
"FAU_SEL.1": 6,
"FAU_SEL.1.1": 1,
"FAU_STG": 2,
"FAU_STG.1": 2,
"FAU_STG.2": 9,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1,
"FAU_STG.4": 7,
"FAU_STG.4.1": 1
},
"FDP": {
"FDP_IFC": 2,
"FDP_IFC.1": 8,
"FDP_IFC.1.1": 1,
"FDP_IFF": 2,
"FDP_IFF.1": 12,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 2,
"FDP_IFF.1.5": 1
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 3,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_SOS": 2,
"FIA_SOS.1": 8,
"FIA_SOS.1.1": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 1,
"FIA_UAU.2": 12,
"FIA_UAU.2.1": 1,
"FIA_UID": 1,
"FIA_UID.1": 3,
"FIA_UID.2": 10,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_MSA.3": 2,
"FMT_MTD": 1,
"FMT_MTD.1": 14,
"FMT_MTD.1.1": 6,
"FMT_SMF": 2,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 12,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM": 3,
"FPT_STM.1": 9,
"FPT_STM.1.1": 1
},
"FTP": {
"FTP_TRP": 2,
"FTP_TRP.1": 7,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"SSH": {
"SSH": 9
},
"TLS": {
"SSL": {
"SSL": 5
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Leidos": {
"Leidos": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
},
"RC": {
"RC2": 2,
"RC4": 2
}
},
"DES": {
"3DES": {
"3DES": 2
},
"DES": {
"DES": 2
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20150318142909+08\u002700\u0027",
"/Creator": "",
"/Keywords": "",
"/ModDate": "D:20150318142917+08\u002700\u0027",
"/Producer": "Foxit Reader PDF Printer Version 7.0.1.831",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 1322388,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 58
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C055-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%201-0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2c1c43a666a3fc88559e91db9cb80b213e0836113429e361bdc7000dad0854ec",
"txt_hash": "9b9db6bb6759e1a61d0fe2f3841d0bc635a4fd7c09b9a1f95ade2be0ba083979"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "cff9a1bcdc3e242cb429e5ba2dc4677e32ff1fb42a98872beae7766c75d39e6f",
"txt_hash": "5a2ae1ecd47b81bf3736e7072cc96dd7cab836c8116cea6aa28f2de9047f44fe"
}
},
"status": "archived"
}