Cisco Systems Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, and 7200 running Cisco IOS Release 12.4(11)T2; 7300, 7400, and 7600 running Cisco IOS Release 12.2(18) SXF8; 10000 and 12000 running 12.0(32)s7) and Cisco Secure ACS version 4.1.2.12
CSV information ?
Status | archived |
---|---|
Valid from | 29.02.2008 |
Valid until | 20.07.2012 |
Scheme | 🇺🇸 US |
Manufacturer | Cisco Systems, Inc. |
Category | Network and Network-Related Devices and Systems |
Security level | EAL3 |
Maintenance updates | Cisco Systems Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, and 7200 running Cisco IOS Release 12.4(15)T10; 7300 and 7600 running Cisco IOS Release 12.2(18)SXF16) and a Cisco Secure Access Control Server version 4.1.2.12 (11.12.2009) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DESAsymmetric Algorithms
ECCSchemes
MACProtocols
SSHv1, SSHv2, SSL, IKE, VPNVendor
Cisco, Cisco Systems, Cisco Systems, IncSecurity level
EAL 3, EAL 1, EAL 4, EAL3Claims
A.NOEVIL, A.TRAIN_AUDIT, A.TRAIN_GUIDAN, A.LOCATE, A.CONFIDENTIALITY, A.GENPUR, A.INTEROPERABILITY, A.LOWEXPSecurity Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_VLA.1, AVA_SOF.1Certificates
CCEVS-VR-VID6014-2008File metadata
Title | Microsoft Word - VID6014_VR-v0.95-final-corrected.doc |
---|---|
Author | dmhale1 |
Creation date | D:20090220114340-05'00' |
Modification date | D:20090220114340-05'00' |
Pages | 55 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 7.0 (Windows) |
Frontpage
Certificate ID | CCEVS-VR-VID6014-2008 |
---|---|
Certified item | Cisco System Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, 7200, 7300, and 7400) running IOS 12.4(11)T2, 7600 running IOS 12.2(18)SXF8; 10000 and 12000 running 12.0(32)S7 and Cisco Secure ACS version 4.1.2.12 |
Certification lab | US NIAP |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DESAsymmetric Algorithms
Diffie-HellmanHash functions
MD5Schemes
MACProtocols
SSH, SSHv1, SSHv2, SSL, IKE, VPNVendor
Cisco Systems, Inc, Cisco Systems, CiscoSecurity level
EAL3, EAL 3, EAL3 augmentedClaims
O.ACCESS_CONTROL, O.AUDIT_GEN, O.AUDIT_VIEW, O.CFG_MANAGE, O.IDAUTH, O.MEDIATE, O.SELFPRO, O.STARTUP_TEST, O.TIME, T.AUDIT_REVIEW, T.MEDIATE, T.NOAUDIT, T.NOAUTH, T.NOMGT, T.UNAUTH_MGT_ACCESS, T.TIME, A.NOEVIL, A.TRAIN_AUDIT, A.TRAIN_GUIDAN, A.LOCATE, A.CONFIDENTIALITY, A.GENPUR, A.INTEROPERABILITY, A.LOWEXP, OE.ACS_PROTECT, OE.ACS_TIME, OE.AUDIT_REVIEW, OE.CONFIDENTIALITY, OE.GENPUR, OE.INTEROPERABILITY, OE.LOCATE, OE.LOWEXP, OE.NOEVIL, OE.TRAIN_GUIDANSecurity Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS, ALC_FLR.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_STG.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_IFC.1, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FIA_AFL.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_UID.1, FMT_MSA.1, FMT_SMR.1, FMT_MOF.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF, FPT_ITT.1, FPT_RVM.1, FPT_ITT.1.1, FPT_RVM.1.1, FPT_STM.1, FPT_SEP, FPT_STM, FPT_SEP.1, FPT_SEP_EXP.1Standards
FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 140-1, FIPS 197, PKCS #1, RFC 2865, RFC 2403, ISO/IEC 15408:2004File metadata
Title | Cisco_IOS_Routers_EAL3_ST_v1 8.fm |
---|---|
Author | juparker |
Creation date | D:20071213152518Z |
Modification date | D:20090220112615-05'00' |
Pages | 56 |
Creator | FrameMaker 7.2 |
Producer | Acrobat Distiller 8.1.0 (Windows) |
Heuristics ?
Extracted SARs
ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1Similar certificates
Scheme data ?
Product | Cisco Systems Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, 7200, 7300, and 7400) running IOS 12.4(11)T2; 7600 running IOS 12.2(18)SXF8; 10000 and 12000 running 12.0(32)S7 and Cisco Secure ACS version 4.1.2.12 | |
---|---|---|
Id | CCEVS-VR-VID6014 | |
Url | https://www.niap-ccevs.org/product/6014 | |
Certification Date | 29.02.2008 | |
Expiration Date | None | |
Category | Network Switch, Router | |
Vendor | Cisco Systems, Inc. | |
Evaluation Facility | Arca CCTL | |
Scheme | US |
References ?
No references are available for this certificate.
Updates ?
-
03.04.2025 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'crypto_protocol': {'__update__': {'SSH': {'SSHv1': 1, 'SSHv2': 1}}}}
data. - The st_keywords property was updated, with the
{'crypto_protocol': {'__update__': {'SSH': {'__insert__': {'SSHv1': 1, 'SSHv2': 1}, '__update__': {'SSH': 9}}}}}
data.
- The report_keywords property was updated, with the
-
10.02.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Cisco Systems Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, 7200, 7300, and 7400) running IOS 12.4(11)T2; 7600 running IOS 12.2(18)SXF8; 10000 and 12000 running 12.0(32)S7 and Cisco Secure ACS version 4.1.2.12', 'id': 'CCEVS-VR-VID6014', 'url': 'https://www.niap-ccevs.org/product/6014', 'certification_date': '2008-02-29', 'expiration_date': None, 'category': 'Network Switch, Router', 'vendor': 'Cisco Systems, Inc.', 'evaluation_facility': 'Arca CCTL', 'scheme': 'US'}
.
- The scheme_data property was set to
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': None, 'eal': 'EAL3'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
. - The scheme_data property was set to
None
.
- The report property was updated, with the
-
06.01.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Cisco Systems Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, 7200, 7300, and 7400) running IOS 12.4(11)T2; 7600 running IOS 12.2(18)SXF8; 10000 and 12000 running 12.0(32)S7 and Cisco Secure ACS version 4.1.2.12', 'id': 'CCEVS-VR-VID6014', 'url': 'https://www.niap-ccevs.org/product/6014', 'certification_date': '2008-02-29', 'expiration_date': None, 'category': 'Network Switch, Router', 'vendor': 'Cisco Systems, Inc.', 'evaluation_facility': 'Arca CCTL', 'scheme': 'US'}
.
- The scheme_data property was set to
-
30.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Cisco Systems Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, 7200, 7300, and 7400) running IOS 12.4(11)T2; 7600 running IOS 12.2(18)SXF8; 10000 and 12000 running 12.0(32)S7 and Cisco Secure ACS version 4.1.2.12', 'id': 'CCEVS-VR-VID6014', 'url': 'https://www.niap-ccevs.org/product/6014', 'certification_date': '2008-02-29', 'expiration_date': None, 'category': 'Network Switch, Router', 'vendor': 'Cisco Systems, Inc.', 'evaluation_facility': 'Arca CCTL', 'scheme': 'US'}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2008-02-29'}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f62e9b92d0a76bd8afc8b58c35c010b4ba9f119bdc05803781871e2da47d20cc', 'txt_hash': '2cbc2cd406116dea186930a91867d7f6660b53d886e40d1c172df05a6e8cff0c'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '839010ce0dd266b8680f4e78f7bd5cd3aca380393a43f8c20eb4cf9135769bab', 'txt_hash': 'bcc0c82d421cf3dc95b457a7874dffb0170409d3c595f58f0b1f169bae7eafd8'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 322904, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 55, '/CreationDate': "D:20090220114340-05'00'", '/Author': 'dmhale1', '/Creator': 'PScript5.dll Version 5.2.2', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/ModDate': "D:20090220114340-05'00'", '/Title': 'Microsoft Word - VID6014_VR-v0.95-final-corrected.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 799948, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 56, '/CreationDate': 'D:20071213152518Z', '/Author': 'juparker', '/Creator': 'FrameMaker 7.2', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/ModDate': "D:20090220112615-05'00'", '/Title': 'Cisco_IOS_Routers_EAL3_ST_v1 8.fm', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html']}}
. - The report_frontpage property was set to
{'US': {'cert_id': 'CCEVS-VR-VID6014-2008', 'cert_item': 'Cisco System Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, 7200, 7300, and 7400) running IOS 12.4(11)T2, 7600 running IOS 12.2(18)SXF8; 10000 and 12000 running 12.0(32)S7 and Cisco Secure ACS version 4.1.2.12', 'cert_lab': 'US NIAP'}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-VID6014-2008': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 2, 'EAL 1': 1, 'EAL 4': 1, 'EAL3': 20}}, 'cc_sar': {'ACM': {'ACM_CAP.3': 1, 'ACM_SCP.1': 1}, 'ADO': {'ADO_DEL.1': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.1': 1, 'ADV_HLD.2': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_DVS.1': 1, 'ALC_FLR.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.1': 1, 'AVA_VLA.1': 1, 'AVA_SOF.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.NOEVIL': 1, 'A.TRAIN_AUDIT': 1, 'A.TRAIN_GUIDAN': 1, 'A.LOCATE': 1, 'A.CONFIDENTIALITY': 1, 'A.GENPUR': 1, 'A.INTEROPERABILITY': 1, 'A.LOWEXP': 1}}, 'vendor': {'Cisco': {'Cisco': 154, 'Cisco Systems': 19, 'Cisco Systems, Inc': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'DES': {'DES': 2}, '3DES': {'3DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'SSH': {'SSH': 1}, 'TLS': {'SSL': {'SSL': 1}}, 'IKE': {'IKE': 1}, 'VPN': {'VPN': 9}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 85, 'EAL 3': 6, 'EAL3 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.3': 20, 'ACM_SCP.1': 7}, 'ADO': {'ADO_DEL.1': 9, 'ADO_IGS.1': 10}, 'ADV': {'ADV_FSP.1': 12, 'ADV_HLD.2': 17, 'ADV_RCR.1': 8}, 'AGD': {'AGD_ADM.1': 17, 'AGD_USR.1': 13}, 'ALC': {'ALC_DVS': 2, 'ALC_FLR.1': 15, 'ALC_DVS.1': 8}, 'ATE': {'ATE_COV.2': 9, 'ATE_DPT.1': 8, 'ATE_FUN.1': 13, 'ATE_IND.2': 11}, 'AVA': {'AVA_MSU.1': 13, 'AVA_SOF.1': 10, 'AVA_VLA.1': 12}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 14, 'FAU_SAR.1': 9, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_STG.1': 4, 'FAU_SAR.1.1': 2, 'FAU_SAR.1.2': 2, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_CKM.1': 9, 'FCS_CKM.4': 9, 'FCS_COP.1': 7, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 2}, 'FDP': {'FDP_IFC.1': 12, 'FDP_IFF.1': 12, 'FDP_IFC.1.1': 4, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 2, 'FDP_IFF.1.3': 2, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_IFF.1.6': 2}, 'FIA': {'FIA_AFL.1': 7, 'FIA_ATD.1': 6, 'FIA_UAU.2': 11, 'FIA_UID.2': 9, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.1': 4, 'FMT_SMR.1': 12, 'FMT_MOF.1': 11, 'FMT_MSA.2': 10, 'FMT_MSA.3': 11, 'FMT_MTD.1': 7, 'FMT_SMF.1': 8, 'FMT_MOF.1.1': 2, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF': 1}, 'FPT': {'FPT_ITT.1': 7, 'FPT_RVM.1': 11, 'FPT_ITT.1.1': 1, 'FPT_RVM.1.1': 2, 'FPT_STM.1': 4, 'FPT_SEP': 3, 'FPT_STM': 1, 'FPT_SEP.1': 1, 'FPT_SEP_EXP.1': 1}}, 'cc_claims': {'O': {'O.ACCESS_CONTROL': 5, 'O.AUDIT_GEN': 5, 'O.AUDIT_VIEW': 7, 'O.CFG_MANAGE': 4, 'O.IDAUTH': 6, 'O.MEDIATE': 4, 'O.SELFPRO': 9, 'O.STARTUP_TEST': 4, 'O.TIME': 6}, 'T': {'T.AUDIT_REVIEW': 5, 'T.MEDIATE': 2, 'T.NOAUDIT': 6, 'T.NOAUTH': 2, 'T.NOMGT': 4, 'T.UNAUTH_MGT_ACCESS': 4, 'T.TIME': 4}, 'A': {'A.NOEVIL': 4, 'A.TRAIN_AUDIT': 2, 'A.TRAIN_GUIDAN': 4, 'A.LOCATE': 2, 'A.CONFIDENTIALITY': 4, 'A.GENPUR': 2, 'A.INTEROPERABILITY': 4, 'A.LOWEXP': 2}, 'OE': {'OE.ACS_PROTECT': 7, 'OE.ACS_TIME': 4, 'OE.AUDIT_REVIEW': 4, 'OE.CONFIDENTIALITY': 3, 'OE.GENPUR': 3, 'OE.INTEROPERABILITY': 3, 'OE.LOCATE': 3, 'OE.LOWEXP': 3, 'OE.NOEVIL': 3, 'OE.TRAIN_GUIDAN': 3}}, 'vendor': {'Cisco': {'Cisco Systems, Inc': 5, 'Cisco Systems': 69, 'Cisco': 101}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}}, 'DES': {'DES': {'DES': 1}, '3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 3}}}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 7}}}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {'SSH': {'SSH': 10}, 'TLS': {'SSL': {'SSL': 4}}, 'IKE': {'IKE': 1}, 'VPN': {'VPN': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 197': 1, 'FIPS PUB 140-1': 1, 'FIPS 197': 1}, 'PKCS': {'PKCS #1': 1}, 'RFC': {'RFC 2865': 1, 'RFC 2403': 1}, 'ISO': {'ISO/IEC 15408:2004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
st_vid6014-vr.pdf
. - The st_filename property was set to
st_vid6014-st.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
. - The cert_id property was set to
CCEVS-VR-VID-6014-2008
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6014-vr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6014-st.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Cisco Systems Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, and 7200 running Cisco IOS Release 12.4(11)T2; 7300, 7400, and 7600 running Cisco IOS Release 12.2(18) SXF8; 10000 and 12000 running 12.0(32)s7) and Cisco Secure ACS version 4.1.2.12 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "713c829a68c3fe37",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-VID-6014-2008",
"cert_lab": [
"US"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL3",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.1.2.12",
"12.0",
"12.4",
"12.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Network Switch, Router",
"certification_date": "2008-02-29",
"evaluation_facility": "Arca CCTL",
"expiration_date": null,
"id": "CCEVS-VR-VID6014",
"product": "Cisco Systems Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, 7200, 7300, and 7400) running IOS 12.4(11)T2; 7600 running IOS 12.2(18)SXF8; 10000 and 12000 running 12.0(32)S7 and Cisco Secure ACS version 4.1.2.12",
"scheme": "US",
"url": "https://www.niap-ccevs.org/product/6014",
"vendor": "Cisco Systems, Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2009-12-11",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6014-add1.pdf",
"maintenance_st_link": null,
"maintenance_title": "Cisco Systems Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, and 7200 running Cisco IOS Release 12.4(15)T10; 7300 and 7600 running Cisco IOS Release 12.2(18)SXF16) and a Cisco Secure Access Control Server version 4.1.2.12"
}
]
},
"manufacturer": "Cisco Systems, Inc.",
"manufacturer_web": "https://www.cisco.com",
"name": "Cisco Systems Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, and 7200 running Cisco IOS Release 12.4(11)T2; 7300, 7400, and 7600 running Cisco IOS Release 12.2(18) SXF8; 10000 and 12000 running 12.0(32)s7) and Cisco Secure ACS version 4.1.2.12",
"not_valid_after": "2012-07-20",
"not_valid_before": "2008-02-29",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "st_vid6014-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-VID6014-2008",
"cert_item": "Cisco System Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, 7200, 7300, and 7400) running IOS 12.4(11)T2, 7600 running IOS 12.2(18)SXF8; 10000 and 12000 running 12.0(32)S7 and Cisco Secure ACS version 4.1.2.12",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID6014-2008": 1
}
},
"cc_claims": {
"A": {
"A.CONFIDENTIALITY": 1,
"A.GENPUR": 1,
"A.INTEROPERABILITY": 1,
"A.LOCATE": 1,
"A.LOWEXP": 1,
"A.NOEVIL": 1,
"A.TRAIN_AUDIT": 1,
"A.TRAIN_GUIDAN": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.3": 1,
"ACM_SCP.1": 1
},
"ADO": {
"ADO_DEL.1": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP.1": 1,
"ADV_HLD.2": 1,
"ADV_RCR.1": 1
},
"AGD": {
"AGD_ADM.1": 1,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS.1": 1,
"ALC_FLR.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_MSU.1": 1,
"AVA_SOF.1": 1,
"AVA_VLA.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 2,
"EAL 4": 1,
"EAL3": 20
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1
},
"SSH": {
"SSHv1": 1,
"SSHv2": 1
},
"TLS": {
"SSL": {
"SSL": 1
}
},
"VPN": {
"VPN": 9
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"3DES": 2
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 154,
"Cisco Systems": 19,
"Cisco Systems, Inc": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "dmhale1",
"/CreationDate": "D:20090220114340-05\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20090220114340-05\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0 (Windows)",
"/Title": "Microsoft Word - VID6014_VR-v0.95-final-corrected.doc",
"pdf_file_size_bytes": 322904,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 55
},
"st_filename": "st_vid6014-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 3
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONFIDENTIALITY": 4,
"A.GENPUR": 2,
"A.INTEROPERABILITY": 4,
"A.LOCATE": 2,
"A.LOWEXP": 2,
"A.NOEVIL": 4,
"A.TRAIN_AUDIT": 2,
"A.TRAIN_GUIDAN": 4
},
"O": {
"O.ACCESS_CONTROL": 5,
"O.AUDIT_GEN": 5,
"O.AUDIT_VIEW": 7,
"O.CFG_MANAGE": 4,
"O.IDAUTH": 6,
"O.MEDIATE": 4,
"O.SELFPRO": 9,
"O.STARTUP_TEST": 4,
"O.TIME": 6
},
"OE": {
"OE.ACS_PROTECT": 7,
"OE.ACS_TIME": 4,
"OE.AUDIT_REVIEW": 4,
"OE.CONFIDENTIALITY": 3,
"OE.GENPUR": 3,
"OE.INTEROPERABILITY": 3,
"OE.LOCATE": 3,
"OE.LOWEXP": 3,
"OE.NOEVIL": 3,
"OE.TRAIN_GUIDAN": 3
},
"T": {
"T.AUDIT_REVIEW": 5,
"T.MEDIATE": 2,
"T.NOAUDIT": 6,
"T.NOAUTH": 2,
"T.NOMGT": 4,
"T.TIME": 4,
"T.UNAUTH_MGT_ACCESS": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.3": 20,
"ACM_SCP.1": 7
},
"ADO": {
"ADO_DEL.1": 9,
"ADO_IGS.1": 10
},
"ADV": {
"ADV_FSP.1": 12,
"ADV_HLD.2": 17,
"ADV_RCR.1": 8
},
"AGD": {
"AGD_ADM.1": 17,
"AGD_USR.1": 13
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.1": 8,
"ALC_FLR.1": 15
},
"ATE": {
"ATE_COV.2": 9,
"ATE_DPT.1": 8,
"ATE_FUN.1": 13,
"ATE_IND.2": 11
},
"AVA": {
"AVA_MSU.1": 13,
"AVA_SOF.1": 10,
"AVA_VLA.1": 12
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 6,
"EAL3": 85,
"EAL3 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 14,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 2,
"FAU_SAR.1": 9,
"FAU_SAR.1.1": 2,
"FAU_SAR.1.2": 2,
"FAU_STG.1": 4,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FCS": {
"FCS_CKM.1": 9,
"FCS_CKM.1.1": 2,
"FCS_CKM.4": 9,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 7,
"FCS_COP.1.1": 2
},
"FDP": {
"FDP_IFC.1": 12,
"FDP_IFC.1.1": 4,
"FDP_IFF.1": 12,
"FDP_IFF.1.1": 2,
"FDP_IFF.1.2": 2,
"FDP_IFF.1.3": 2,
"FDP_IFF.1.4": 2,
"FDP_IFF.1.5": 2,
"FDP_IFF.1.6": 2
},
"FIA": {
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 1,
"FIA_UID.2": 9,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 11,
"FMT_MOF.1.1": 2,
"FMT_MSA.1": 4,
"FMT_MSA.2": 10,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 11,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 8,
"FMT_SMR.1": 12,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT.1": 7,
"FPT_ITT.1.1": 1,
"FPT_RVM.1": 11,
"FPT_RVM.1.1": 2,
"FPT_SEP": 3,
"FPT_SEP.1": 1,
"FPT_SEP_EXP.1": 1,
"FPT_STM": 1,
"FPT_STM.1": 4
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1
},
"SSH": {
"SSH": 9,
"SSHv1": 1,
"SSHv2": 1
},
"TLS": {
"SSL": {
"SSL": 4
}
},
"VPN": {
"VPN": 2
}
},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 7
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 197": 1,
"FIPS PUB 140-1": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 3
},
"ISO": {
"ISO/IEC 15408:2004": 1
},
"PKCS": {
"PKCS #1": 1
},
"RFC": {
"RFC 2403": 1,
"RFC 2865": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
},
"DES": {
"3DES": {
"3DES": 1
},
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 101,
"Cisco Systems": 69,
"Cisco Systems, Inc": 5
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "juparker",
"/CreationDate": "D:20071213152518Z",
"/Creator": "FrameMaker 7.2",
"/ModDate": "D:20090220112615-05\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/Title": "Cisco_IOS_Routers_EAL3_ST_v1 8.fm",
"pdf_file_size_bytes": 799948,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 56
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6014-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6014-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f62e9b92d0a76bd8afc8b58c35c010b4ba9f119bdc05803781871e2da47d20cc",
"txt_hash": "2cbc2cd406116dea186930a91867d7f6660b53d886e40d1c172df05a6e8cff0c"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "839010ce0dd266b8680f4e78f7bd5cd3aca380393a43f8c20eb4cf9135769bab",
"txt_hash": "bcc0c82d421cf3dc95b457a7874dffb0170409d3c595f58f0b1f169bae7eafd8"
}
},
"status": "archived"
}