Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5)
CSV information ?
Status | archived |
---|---|
Valid from | 20.02.2014 |
Valid until | 01.09.2019 |
Scheme | 🇩🇪 DE |
Manufacturer | Cisco Systems, Inc. |
Category | Network and Network-Related Devices and Systems |
Security level | |
Maintenance updates | Cisco Catalyst 6500-E Series Switches, Hardware models - WS-C6503-E, WS-C6504-E, WS-C6506-E, WS-C6509-E, and WS-C6513-E with Supervisor 2T (Sup2T) Cards (VS-S2T-10G or VS-S2T-10G-XL) Software version - IOS15.1(1)SY1 (14.04.2014) Certification report Security target |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
HMAC-SHA-256Asymmetric Algorithms
DHHash functions
SHA-1, SHA-256, SHA-384Schemes
Key Exchange, Key AgreementProtocols
SSH, IKE, IPsec, VPNRandomness
RNGVendor
Cisco, Cisco Systems, IncSecurity level
EAL1, EAL4, EAL 4, EAL3, EAL5, EAL7, EAL2, EAL6, ITSEC EvaluationClaims
OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, ADV_ARC.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMS.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_IND.1, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN.5, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_OBJ.1, ASE_REQ.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FCS_RBG, FCS_IPSECertificates
BSI-DSZ-CC-0937-2014, BSI-DSZ-CC-0838-2014Side-channel analysis
SPACertification process
8] Evaluation Technical Report, Version 1.5, Date 2014-2-19, ETR Part Summary, media transfer AG, (confidential document) [9] Guidance documentation, Cisco Catalyst 6500-E Series Switches, Common Criteria OperationalStandards
FIPS PUB 197, FIPS PUB 186-3, FIPS PUB 180-3, NIST SP 800-38A, NIST SP 800-38D, SP 800-90A, AIS 20, AIS 32, RFC 1059, RFC 1119, RFC 1305, RFC 5424, RFC 2865, RFC 3162, RFC 1492, RFC 2409Technical reports
BSI TR-02102, BSI 7125, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-0937-2014 |
---|---|
Subject | Cisco Catalyst 6500-E Series Switches |
Keywords | "Common Criteria, Certification, Zertifizierung, “Cisco Catalyst 6500-E Series”, switching, routing, NDPP" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20140411134927+02'00' |
Modification date | D:20140411135416+02'00' |
Pages | 36 |
Creator | Writer |
Producer | LibreOffice 3.6 |
Frontpage
Certificate ID | BSI-DSZ-CC-0937-2014 |
---|---|
Certified item | Cisco Catalyst 6500-E Series Switches - Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5 |
Certification lab | BSI |
Developer | Cisco Systems, Inc |
References
Outgoing- BSI-DSZ-CC-0838-2014 - archived - Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5)
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, HMAC, HMAC-SHA-256, HMAC-SHA-512, CBC-MAC, CMACAsymmetric Algorithms
ECDSA, DH, Diffie-Hellman, DSAHash functions
SHA1, SHA-1, SHA-256, SHA-384, SHA-512, MD5Schemes
MAC, Key ExchangeProtocols
SSH, TLS, IKEv1, IKEv2, IKE, IPsec, VPNRandomness
PRNG, DRBG, RNG, RBGElliptic Curves
P-256, P-384, P-521Block cipher modes
CBC, GCM, CCMVendor
Cisco Systems, Inc, Cisco, Cisco SystemsSecurity level
EAL2, EAL2+, EAL2 augmentedClaims
O.PROTECTED_COMMUNICATIONS, O.VERIFIABLE_UPDATES, O.SYSTEM_MONITORING, O.DISPLAY_BANNER, O.TOE_ADMINISTRATION, O.RESIDUAL_INFORMATION_CLEARING, O.RESOURCE_AVAILABILITY, O.SESSION_LOCK, O.TSF_SELF_TEST, O.PROTECTED_COMMUNICATIO, O.RESIDUAL_INFORMATION_CLE, O.PROTECTED_COMMUNICA, O.RESIDUAL_INFORMATION, O.RESIDUAL_INFORMATION_, T.ADMIN_ERROR, T.RESOURCE_EXHAUSTION, T.TSF_FAILURE, T.UNDETECTED_ACTIONS, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, A.PHYSICAL, A.TRUSTED_ADMIN, A.NO_GENERAL_PURPOSE, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, ADV_ARC, ADV_FSP, ADV_TDS, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_CMC.2, ALC_CMC, ALC_CMS, ALC_DEL, ATE_IND.1, ATE_IND, ATE_COV, ATE_FUN, AVA_VAN.1, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_STG_EXT.1, FAU_STG_EXT.3, FAU_STG_EXT.1.1, FAU_STG.3, FAU_STG_EXT.3.1, FAU_GEN, FAU_STG_EXT, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FCS_CKM_EXT.4, FCS_RBG_EXT.1, FCS_CKM_EXT.4.1, FCS_COP.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_CKM, FCS_CKM_EXT, FCS_RBG_EXT, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_CKM.1.1, FCS_SSH_EXT.1, FCS_SSH_EXT.1.7, FCS_SSH_EXT.1.4, FCS_SSH_EXT.1.5, FDP_IFF.1, FDP_RIP, FDP_RIP.2, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FDP_RIP.2.1, FIA_PMG_EXT.1, FIA_UIA_EXT.1, FIA_UAU_EXT.5, FIA_PMG_EXT.1.1, FIA_UAU.6, FIA_UAU_EXT.5.1, FIA_UAU_EXT.5.2, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_PMG_EXT, FIA_UIA_EXT, FIA_UAU_EXT, FIA_UAU, FIA_UAU.7, FIA_UID.1, FIA_UAU.6.1, FIA_UAU.1, FIA_UAU.7.1, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SFR.1, FPT_TUD_EXT.1, FPT_TST_EXT.1, FPT_PTD.1, FPT_PTD_EXT.1, FPT_PTD.1.1, FPT_TST_EXT, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_ITT.1, FPT_RPL, FPT_STM, FPT_TUD_EXT, FPT_STM.1, FPT_RPL.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FRU_RSA, FRU_RSA.1, FRU_RSA.1.1, FTA_SSL_EXT.1, FTA_SSL_EXT.1.1, FTA_SSL_EXT, FTA_SSL, FTA_TAB, FTA_SSL.3, FTA_TAB.1, FTA_SSL.3.1, FTA_TAB.1.1, FTP_ITC.1, FTP_TRP.1Certificates
BSI-DSZ-CC-0937Standards
FIPS 140-2, FIPS PUB 197, FIPS PUB 186-3, FIPS PUB 180-3, FIPS 186-3, FIPS PUB 186-2, SP 800-90, NIST SP 800-38A, NIST SP 800-38D, NIST SP 800-90, NIST SP 800-56B, SP 900-90A, RFC 1059, RFC 1119, RFC 1305, RFC 2865, RFC 3162, RFC 1492, RFC 0894, RFC 0791, RFC 2460, RFC 4303, RFC 3602, RFC 4106, RFC 4109, RFC 4868, RFC 2409, RFC 4869, RFC 4253, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003File metadata
Author | Cisco Systems |
---|---|
Creation date | D:20140507101718-04'00' |
Modification date | D:20140507101718-04'00' |
Pages | 90 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Heuristics ?
Extracted SARs
ADV_FSP.1, ASE_CCL.1, ALC_DEL.1, ALC_DVS.2, ADV_ARC.1, ASE_TSS.1, ADV_IMP.2, ATE_FUN.2, ASE_SPD.1, ASE_REQ.2, ATE_IND.1, ALC_LCD.2, ADV_TDS.6, APE_INT.1, ALC_FLR.3, AGD_OPE.1, ATE_COV.3, APE_CCL.1, ALC_TAT.3, APE_REQ.2, APE_ECD.1, ATE_DPT.4, ASE_ECD.1, ADV_INT.3, AVA_VAN.1, ADV_SPM.1, ALC_CMS.1, ALC_CMC.2, ASE_INT.1, APE_OBJ.2, AGD_PRE.1, APE_SPD.1, ASE_OBJ.2Similar certificates
Name | Certificate ID | |
---|---|---|
Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5) | BSI-DSZ-CC-0838-2014 | Compare |
Cisco Catalyst 3850 Series Switches running IOS-XE 3.6.0E and Catalyst 6500 Series Switches running IOS 15.1(2)SY3 | NSCIB-CC-14-39582-CR | Compare |
Cisco Catalyst 6500 Series Switches running IOS 15.0(1)SY1 | CCEVS-VR-10490-2012 | Compare |
Cisco Firewall Services Module (FWSM) Version 3.1.(3.17) for: Cisco Catalyst 6500 Switches and Cisco 7600 Series routers | CCEVS-VR-0027-2007 | Compare |
References ?
Updates ?
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Network Devices', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_nd_v1.0.pdf', 'pp_ids': None}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '17171bc4b5e50c46df9fbd194bf0e97434ae567d3d5c754deaa8048f8071d84e', 'txt_hash': 'a2953270ddee4224187fcf023647f7eae0aac399c4581416a11d399332c8d0ba'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7069022dd069072ad5f9cb35de5701717aa582638a0c8278d58ada9ed90d3b75', 'txt_hash': 'ae1636e9d6be9fe703f51d8f2ecc61a4b858e247833ac839640384ced6583502'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1112717, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 36, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20140411134927+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, “Cisco Catalyst 6500-E Series”, switching, routing, NDPP"', '/ModDate': "D:20140411135416+02'00'", '/Producer': 'LibreOffice 3.6', '/Subject': 'Cisco Catalyst 6500-E Series Switches', '/Title': 'Certification Report BSI-DSZ-CC-0937-2014', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1252376, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 90, '/Author': 'Cisco Systems', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20140507101718-04'00'", '/ModDate': "D:20140507101718-04'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0937-2014', 'cert_item': 'Cisco Catalyst 6500-E Series Switches - Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5', 'developer': 'Cisco Systems, Inc', 'cert_lab': 'BSI'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0937-2014': 19, 'BSI-DSZ-CC-0838-2014': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 7, 'EAL4': 6, 'EAL 4': 1, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 4, 'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 4, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.1': 4, 'ALC_CMS.1': 4, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMC.5': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 1, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_IND.1': 4, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.1': 4, 'AVA_VAN.2': 2, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN.5': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_CCL.1': 4, 'ASE_ECD.1': 4, 'ASE_INT.1': 4, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 4, 'ASE_SPD.1': 4, 'ASE_TSS.1': 4, 'ASE_OBJ.1': 1, 'ASE_REQ.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FCS': {'FCS_RBG': 1, 'FCS_IPSE': 6}}, 'cc_claims': {'OE': {'OE.NO_GENERAL_PURPOSE': 1, 'OE.PHYSICAL': 1, 'OE.TRUSTED_ADMIN': 1}}, 'vendor': {'Cisco': {'Cisco': 30, 'Cisco Systems, Inc': 8}}, 'eval_facility': {}, 'symmetric_crypto': {'constructions': {'MAC': {'HMAC-SHA-256': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-256': 4, 'SHA-384': 1}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 1}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'SSH': {'SSH': 4}, 'IKE': {'IKE': 2}, 'IPsec': {'IPsec': 15}, 'VPN': {'VPN': 1}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7125': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 2, 'FIPS PUB 186-3': 2, 'FIPS PUB 180-3': 1}, 'NIST': {'NIST SP 800-38A': 2, 'NIST SP 800-38D': 2, 'SP 800-90A': 1}, 'BSI': {'AIS 20': 2, 'AIS 32': 1}, 'RFC': {'RFC 1059': 1, 'RFC 1119': 1, 'RFC 1305': 1, 'RFC 5424': 1, 'RFC 2865': 1, 'RFC 3162': 1, 'RFC 1492': 1, 'RFC 2409': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'8] Evaluation Technical Report, Version 1.5, Date 2014-2-19, ETR Part Summary, media transfer AG, (confidential document) [9] Guidance documentation, Cisco Catalyst 6500-E Series Switches, Common Criteria Operational': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0937': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL2+': 1, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 19, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 6, 'AGD_PRE': 2, 'AGD_OPE.1': 17, 'AGD_PRE.1': 10}, 'ALC': {'ALC_CMC.1': 5, 'ALC_CMS.1': 8, 'ALC_CMC.2': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1}, 'ATE': {'ATE_IND.1': 7, 'ATE_IND': 4, 'ATE_COV': 1, 'ATE_FUN': 1}, 'AVA': {'AVA_VAN.1': 8, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 16, 'ASE_ECD.1': 14, 'ASE_INT.1': 16, 'ASE_OBJ.2': 13, 'ASE_REQ.2': 17, 'ASE_SPD.1': 10, 'ASE_TSS.1': 7, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT.1': 12, 'FAU_STG_EXT.3': 9, 'FAU_STG_EXT.1.1': 2, 'FAU_STG.3': 1, 'FAU_STG_EXT.3.1': 2, 'FAU_GEN': 2, 'FAU_STG_EXT': 2, 'FAU_GEN.1': 14, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 6, 'FAU_GEN.2.1': 1}, 'FCS': {'FCS_CKM_EXT.4': 12, 'FCS_RBG_EXT.1': 8, 'FCS_CKM_EXT.4.1': 2, 'FCS_COP.1': 51, 'FCS_RBG_EXT.1.1': 2, 'FCS_RBG_EXT.1.2': 3, 'FCS_CKM': 1, 'FCS_CKM_EXT': 1, 'FCS_RBG_EXT': 1, 'FCS_CKM.1': 26, 'FCS_CKM.2': 1, 'FCS_CKM.4': 6, 'FCS_CKM.1.1': 1, 'FCS_SSH_EXT.1': 2, 'FCS_SSH_EXT.1.7': 1, 'FCS_SSH_EXT.1.4': 1, 'FCS_SSH_EXT.1.5': 1}, 'FDP': {'FDP_IFF.1': 3, 'FDP_RIP': 1, 'FDP_RIP.2': 7, 'FDP_ITC.1': 8, 'FDP_ITC.2': 4, 'FDP_RIP.1': 1, 'FDP_RIP.2.1': 1}, 'FIA': {'FIA_PMG_EXT.1': 9, 'FIA_UIA_EXT.1': 13, 'FIA_UAU_EXT.5': 9, 'FIA_PMG_EXT.1.1': 2, 'FIA_UAU.6': 7, 'FIA_UAU_EXT.5.1': 2, 'FIA_UAU_EXT.5.2': 2, 'FIA_UIA_EXT.1.1': 2, 'FIA_UIA_EXT.1.2': 2, 'FIA_PMG_EXT': 1, 'FIA_UIA_EXT': 1, 'FIA_UAU_EXT': 1, 'FIA_UAU': 2, 'FIA_UAU.7': 7, 'FIA_UID.1': 5, 'FIA_UAU.6.1': 1, 'FIA_UAU.1': 2, 'FIA_UAU.7.1': 1}, 'FMT': {'FMT_MTD': 1, 'FMT_SMF': 1, 'FMT_SMR': 1, 'FMT_MTD.1': 7, 'FMT_SMF.1': 7, 'FMT_SMR.1': 9, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SFR.1': 1}, 'FPT': {'FPT_TUD_EXT.1': 9, 'FPT_TST_EXT.1': 8, 'FPT_PTD.1': 4, 'FPT_PTD_EXT.1': 19, 'FPT_PTD.1.1': 2, 'FPT_TST_EXT': 2, 'FPT_TST_EXT.1.1': 2, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2, 'FPT_ITT.1': 13, 'FPT_RPL': 1, 'FPT_STM': 1, 'FPT_TUD_EXT': 1, 'FPT_STM.1': 10, 'FPT_RPL.1': 8, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_STM.1.1': 1}, 'FRU': {'FRU_RSA': 1, 'FRU_RSA.1': 7, 'FRU_RSA.1.1': 1}, 'FTA': {'FTA_SSL_EXT.1': 10, 'FTA_SSL_EXT.1.1': 2, 'FTA_SSL_EXT': 1, 'FTA_SSL': 2, 'FTA_TAB': 1, 'FTA_SSL.3': 7, 'FTA_TAB.1': 7, 'FTA_SSL.3.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC.1': 24, 'FTP_TRP.1': 22}}, 'cc_claims': {'O': {'O.PROTECTED_COMMUNICATIONS': 3, 'O.VERIFIABLE_UPDATES': 4, 'O.SYSTEM_MONITORING': 6, 'O.DISPLAY_BANNER': 4, 'O.TOE_ADMINISTRATION': 6, 'O.RESIDUAL_INFORMATION_CLEARING': 1, 'O.RESOURCE_AVAILABILITY': 6, 'O.SESSION_LOCK': 4, 'O.TSF_SELF_TEST': 6, 'O.PROTECTED_COMMUNICATIO': 1, 'O.RESIDUAL_INFORMATION_CLE': 1, 'O.PROTECTED_COMMUNICA': 2, 'O.RESIDUAL_INFORMATION': 1, 'O.RESIDUAL_INFORMATION_': 1}, 'T': {'T.ADMIN_ERROR': 3, 'T.RESOURCE_EXHAUSTION': 3, 'T.TSF_FAILURE': 3, 'T.UNDETECTED_ACTIONS': 2, 'T.UNAUTHORIZED_ACCESS': 4, 'T.UNAUTHORIZED_UPDATE': 3, 'T.USER_DATA_REUSE': 2}, 'A': {'A.PHYSICAL': 2, 'A.TRUSTED_ADMIN': 3, 'A.NO_GENERAL_PURPOSE': 3}, 'OE': {'OE.NO_GENERAL_PURPOSE': 3, 'OE.PHYSICAL': 3, 'OE.TRUSTED_ADMIN': 3}}, 'vendor': {'Cisco': {'Cisco Systems, Inc': 90, 'Cisco': 38, 'Cisco Systems': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 21}}, 'DES': {'DES': {'DES': 2}, '3DES': {'TDES': 1}}, 'constructions': {'MAC': {'HMAC': 2, 'HMAC-SHA-256': 1, 'HMAC-SHA-512': 1, 'CBC-MAC': 1, 'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}}, 'FF': {'DH': {'DH': 19, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1, 'SHA-1': 4}, 'SHA2': {'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 3}}, 'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 21}, 'TLS': {'TLS': {'TLS': 12}}, 'IKE': {'IKEv1': 22, 'IKEv2': 6, 'IKE': 34}, 'IPsec': {'IPsec': 5}, 'VPN': {'VPN': 3}}, 'randomness': {'PRNG': {'PRNG': 1, 'DRBG': 2}, 'RNG': {'RNG': 7, 'RBG': 20}}, 'cipher_mode': {'CBC': {'CBC': 4}, 'GCM': {'GCM': 3}, 'CCM': {'CCM': 1}}, 'ecc_curve': {'NIST': {'P-256': 2, 'P-384': 2, 'P-521': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 5, 'FIPS PUB 197': 1, 'FIPS PUB 186-3': 3, 'FIPS PUB 180-3': 2, 'FIPS 186-3': 2, 'FIPS PUB 186-2': 1}, 'NIST': {'SP 800-90': 2, 'NIST SP 800-38A': 2, 'NIST SP 800-38D': 2, 'NIST SP 800-90': 1, 'NIST SP 800-56B': 1, 'SP 900-90A': 1}, 'RFC': {'RFC 1059': 1, 'RFC 1119': 1, 'RFC 1305': 1, 'RFC 2865': 1, 'RFC 3162': 1, 'RFC 1492': 1, 'RFC 0894': 1, 'RFC 0791': 1, 'RFC 2460': 1, 'RFC 4303': 2, 'RFC 3602': 2, 'RFC 4106': 2, 'RFC 4109': 3, 'RFC 4868': 1, 'RFC 2409': 1, 'RFC 4869': 1, 'RFC 4253': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0937a_pdf.pdf
. - The st_filename property was set to
0937b_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0937-2014
. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0838-2014']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0838-2014']}}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0937a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0937b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data.
- The report_references property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "01f49d1518c2c9ca",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0937-2014",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 6
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"15.1"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0838-2014"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0838-2014"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2014-04-14",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0937ma1a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0937ma1b_pdf.pdf",
"maintenance_title": "Cisco Catalyst 6500-E Series Switches, Hardware models - WS-C6503-E, WS-C6504-E, WS-C6506-E, WS-C6509-E, and WS-C6513-E with Supervisor 2T (Sup2T) Cards (VS-S2T-10G or VS-S2T-10G-XL) Software version - IOS15.1(1)SY1"
}
]
},
"manufacturer": "Cisco Systems, Inc.",
"manufacturer_web": "https://www.cisco.com",
"name": "Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5)",
"not_valid_after": "2019-09-01",
"not_valid_before": "2014-02-20",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0937a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0937-2014",
"cert_item": "Cisco Catalyst 6500-E Series Switches - Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5",
"cert_lab": "BSI",
"developer": "Cisco Systems, Inc",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0838-2014": 2,
"BSI-DSZ-CC-0937-2014": 19
}
},
"cc_claims": {
"OE": {
"OE.NO_GENERAL_PURPOSE": 1,
"OE.PHYSICAL": 1,
"OE.TRUSTED_ADMIN": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 4,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 4,
"AGD_PRE": 1,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 4,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 4,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 4,
"ASE_ECD": 1,
"ASE_ECD.1": 4,
"ASE_INT": 1,
"ASE_INT.1": 4,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 4,
"ASE_REQ.1": 1,
"ASE_REQ.2": 4,
"ASE_SPD": 1,
"ASE_SPD.1": 4,
"ASE_TSS": 1,
"ASE_TSS.1": 4,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 4,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 4,
"AVA_VAN.2": 2,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 6,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_IPSE": 6,
"FCS_RBG": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"8] Evaluation Technical Report, Version 1.5, Date 2014-2-19, ETR Part Summary, media transfer AG, (confidential document) [9] Guidance documentation, Cisco Catalyst 6500-E Series Switches, Common Criteria Operational": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 2
},
"IPsec": {
"IPsec": 15
},
"SSH": {
"SSH": 4
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 4,
"SHA-384": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"SCA": {
"SPA": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 32": 1
},
"FIPS": {
"FIPS PUB 180-3": 1,
"FIPS PUB 186-3": 2,
"FIPS PUB 197": 2
},
"NIST": {
"NIST SP 800-38A": 2,
"NIST SP 800-38D": 2,
"SP 800-90A": 1
},
"RFC": {
"RFC 1059": 1,
"RFC 1119": 1,
"RFC 1305": 1,
"RFC 1492": 1,
"RFC 2409": 1,
"RFC 2865": 1,
"RFC 3162": 1,
"RFC 5424": 1
}
},
"symmetric_crypto": {
"constructions": {
"MAC": {
"HMAC-SHA-256": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 30,
"Cisco Systems, Inc": 8
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20140411134927+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, \u201cCisco Catalyst 6500-E Series\u201d, switching, routing, NDPP\"",
"/ModDate": "D:20140411135416+02\u002700\u0027",
"/Producer": "LibreOffice 3.6",
"/Subject": "Cisco Catalyst 6500-E Series Switches",
"/Title": "Certification Report BSI-DSZ-CC-0937-2014",
"pdf_file_size_bytes": 1112717,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"st_filename": "0937b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"DH": 19,
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0937": 2
}
},
"cc_claims": {
"A": {
"A.NO_GENERAL_PURPOSE": 3,
"A.PHYSICAL": 2,
"A.TRUSTED_ADMIN": 3
},
"O": {
"O.DISPLAY_BANNER": 4,
"O.PROTECTED_COMMUNICA": 2,
"O.PROTECTED_COMMUNICATIO": 1,
"O.PROTECTED_COMMUNICATIONS": 3,
"O.RESIDUAL_INFORMATION": 1,
"O.RESIDUAL_INFORMATION_": 1,
"O.RESIDUAL_INFORMATION_CLE": 1,
"O.RESIDUAL_INFORMATION_CLEARING": 1,
"O.RESOURCE_AVAILABILITY": 6,
"O.SESSION_LOCK": 4,
"O.SYSTEM_MONITORING": 6,
"O.TOE_ADMINISTRATION": 6,
"O.TSF_SELF_TEST": 6,
"O.VERIFIABLE_UPDATES": 4
},
"OE": {
"OE.NO_GENERAL_PURPOSE": 3,
"OE.PHYSICAL": 3,
"OE.TRUSTED_ADMIN": 3
},
"T": {
"T.ADMIN_ERROR": 3,
"T.RESOURCE_EXHAUSTION": 3,
"T.TSF_FAILURE": 3,
"T.UNAUTHORIZED_ACCESS": 4,
"T.UNAUTHORIZED_UPDATE": 3,
"T.UNDETECTED_ACTIONS": 2,
"T.USER_DATA_REUSE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 19,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 6,
"AGD_OPE.1": 17,
"AGD_PRE": 2,
"AGD_PRE.1": 10
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 5,
"ALC_CMC.2": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 8,
"ALC_DEL": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 16,
"ASE_ECD": 1,
"ASE_ECD.1": 14,
"ASE_INT": 1,
"ASE_INT.1": 16,
"ASE_OBJ": 1,
"ASE_OBJ.2": 13,
"ASE_REQ": 1,
"ASE_REQ.2": 17,
"ASE_SPD": 1,
"ASE_SPD.1": 10,
"ASE_TSS": 1,
"ASE_TSS.1": 7
},
"ATE": {
"ATE_COV": 1,
"ATE_FUN": 1,
"ATE_IND": 4,
"ATE_IND.1": 7
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.1": 8
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL2 augmented": 1,
"EAL2+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 14,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 6,
"FAU_GEN.2.1": 1,
"FAU_STG.3": 1,
"FAU_STG_EXT": 2,
"FAU_STG_EXT.1": 12,
"FAU_STG_EXT.1.1": 2,
"FAU_STG_EXT.3": 9,
"FAU_STG_EXT.3.1": 2
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 26,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 6,
"FCS_CKM_EXT": 1,
"FCS_CKM_EXT.4": 12,
"FCS_CKM_EXT.4.1": 2,
"FCS_COP.1": 51,
"FCS_RBG_EXT": 1,
"FCS_RBG_EXT.1": 8,
"FCS_RBG_EXT.1.1": 2,
"FCS_RBG_EXT.1.2": 3,
"FCS_SSH_EXT.1": 2,
"FCS_SSH_EXT.1.4": 1,
"FCS_SSH_EXT.1.5": 1,
"FCS_SSH_EXT.1.7": 1
},
"FDP": {
"FDP_IFF.1": 3,
"FDP_ITC.1": 8,
"FDP_ITC.2": 4,
"FDP_RIP": 1,
"FDP_RIP.1": 1,
"FDP_RIP.2": 7,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_PMG_EXT": 1,
"FIA_PMG_EXT.1": 9,
"FIA_PMG_EXT.1.1": 2,
"FIA_UAU": 2,
"FIA_UAU.1": 2,
"FIA_UAU.6": 7,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 7,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT": 1,
"FIA_UAU_EXT.5": 9,
"FIA_UAU_EXT.5.1": 2,
"FIA_UAU_EXT.5.2": 2,
"FIA_UIA_EXT": 1,
"FIA_UIA_EXT.1": 13,
"FIA_UIA_EXT.1.1": 2,
"FIA_UIA_EXT.1.2": 2,
"FIA_UID.1": 5
},
"FMT": {
"FMT_MTD": 1,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_SFR.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 9,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT.1": 13,
"FPT_PTD.1": 4,
"FPT_PTD.1.1": 2,
"FPT_PTD_EXT.1": 19,
"FPT_RPL": 1,
"FPT_RPL.1": 8,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_STM": 1,
"FPT_STM.1": 10,
"FPT_STM.1.1": 1,
"FPT_TST_EXT": 2,
"FPT_TST_EXT.1": 8,
"FPT_TST_EXT.1.1": 2,
"FPT_TUD_EXT": 1,
"FPT_TUD_EXT.1": 9,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 2,
"FPT_TUD_EXT.1.3": 2
},
"FRU": {
"FRU_RSA": 1,
"FRU_RSA.1": 7,
"FRU_RSA.1.1": 1
},
"FTA": {
"FTA_SSL": 2,
"FTA_SSL.3": 7,
"FTA_SSL.3.1": 1,
"FTA_SSL_EXT": 1,
"FTA_SSL_EXT.1": 10,
"FTA_SSL_EXT.1.1": 2,
"FTA_TAB": 1,
"FTA_TAB.1": 7,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC.1": 24,
"FTP_TRP.1": 22
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CCM": {
"CCM": 1
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 34,
"IKEv1": 22,
"IKEv2": 6
},
"IPsec": {
"IPsec": 5
},
"SSH": {
"SSH": 21
},
"TLS": {
"TLS": {
"TLS": 12
}
},
"VPN": {
"VPN": 3
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 2,
"P-384": 2,
"P-521": 2
}
},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
},
"SHA": {
"SHA1": {
"SHA-1": 4,
"SHA1": 1
},
"SHA2": {
"SHA-256": 3,
"SHA-384": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 2,
"PRNG": 1
},
"RNG": {
"RBG": 20,
"RNG": 7
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1
},
"FIPS": {
"FIPS 140-2": 5,
"FIPS 186-3": 2,
"FIPS PUB 180-3": 2,
"FIPS PUB 186-2": 1,
"FIPS PUB 186-3": 3,
"FIPS PUB 197": 1
},
"NIST": {
"NIST SP 800-38A": 2,
"NIST SP 800-38D": 2,
"NIST SP 800-56B": 1,
"NIST SP 800-90": 1,
"SP 800-90": 2,
"SP 900-90A": 1
},
"RFC": {
"RFC 0791": 1,
"RFC 0894": 1,
"RFC 1059": 1,
"RFC 1119": 1,
"RFC 1305": 1,
"RFC 1492": 1,
"RFC 2409": 1,
"RFC 2460": 1,
"RFC 2865": 1,
"RFC 3162": 1,
"RFC 3602": 2,
"RFC 4106": 2,
"RFC 4109": 3,
"RFC 4253": 1,
"RFC 4303": 2,
"RFC 4868": 1,
"RFC 4869": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 21
}
},
"DES": {
"3DES": {
"TDES": 1
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"CMAC": 1,
"HMAC": 2,
"HMAC-SHA-256": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 38,
"Cisco Systems": 3,
"Cisco Systems, Inc": 90
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Cisco Systems",
"/CreationDate": "D:20140507101718-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20140507101718-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 1252376,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 90
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_nd_v1.0.pdf",
"pp_name": "Protection Profile for Network Devices"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0937a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0937b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "17171bc4b5e50c46df9fbd194bf0e97434ae567d3d5c754deaa8048f8071d84e",
"txt_hash": "a2953270ddee4224187fcf023647f7eae0aac399c4581416a11d399332c8d0ba"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7069022dd069072ad5f9cb35de5701717aa582638a0c8278d58ada9ed90d3b75",
"txt_hash": "ae1636e9d6be9fe703f51d8f2ecc61a4b858e247833ac839640384ced6583502"
}
},
"status": "archived"
}