This page was not yet optimized for use on mobile
devices.
Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5)
CSV information
| Status | archived |
|---|---|
| Valid from | 20.02.2014 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Cisco Systems, Inc. |
| Category | Network and Network-Related Devices and Systems |
| Security level | EAL2+, ALC_FLR.2 |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0838-2014
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
HMAC-SHA-256Asymmetric Algorithms
DHHash functions
SHA-1, SHA-256, SHA-384Schemes
Key Exchange, Key AgreementProtocols
SSH, IKE, IPsec, VPNRandomness
RNGVendor
Cisco, Cisco Systems, IncSecurity level
EAL 2, EAL1, EAL4, EAL 4, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 2 augmented, ITSEC EvaluationClaims
OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.2, AVA_VAN.1, AVA_VAN.3, AVA_VAN.4, AVA_VAN.5, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FCS_RBG, FCS_IPSECertificates
BSI-DSZ-CC-0838-2014Side-channel analysis
SPACertification process
8] Evaluation Technical Report, Version 1.4, Date 2014-2-18, ETR Part Summary, media transfer AG, (confidential document) [9] Guidance documentation, Cisco Catalyst 6500-E Series Switches, Common Criteria OperationalStandards
FIPS PUB 197, FIPS PUB 186-3, FIPS PUB 180-3, NIST SP 800-38A, NIST SP 800-38D, SP 800-90A, AIS 20, AIS 32, RFC 1059, RFC 1119, RFC 1305, RFC 5424, RFC 2865, RFC 3162, RFC 1492, RFC 2409Technical reports
BSI TR-02102, BSI 7125, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0838-2014 |
|---|---|
| Subject | Cisco Catalyst 6500-E Series Switches |
| Keywords | "Common Criteria, Certification, Zertifizierung, “Cisco Catalyst 6500-E Series”, switching, routing, NDPP" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20140225134242+01'00' |
| Modification date | D:20140225134557+01'00' |
| Pages | 36 |
| Creator | Writer |
| Producer | LibreOffice 3.6 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0838-2014 |
|---|---|
| Certified item | Cisco Catalyst 6500-E Series Switches - Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5 |
| Certification lab | BSI |
| Developer | Cisco Systems, Inc |
References
Incoming- BSI-DSZ-CC-0937-2014 - archived - Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5)
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, HMAC, HMAC-SHA-256, HMAC-SHA-512, CBC-MAC, CMACAsymmetric Algorithms
ECDSA, DH, Diffie-Hellman, DSAHash functions
SHA1, SHA-1, SHA-256, SHA-384, SHA-512, MD5Schemes
MAC, Key ExchangeProtocols
SSH, SSHv2, TLS, IKEv1, IKEv2, IKE, IPsec, VPNRandomness
PRNG, DRBG, RNG, RBGElliptic Curves
P-256, P-384, P-521Block cipher modes
CBC, GCM, CCMVendor
Cisco Systems, Inc, Cisco, Cisco SystemsSecurity level
EAL2+, EAL2, EAL2 augmentedClaims
O.MEDIATE, O.PROTECTED_COMMUNICATIONS, O.VERIFIABLE_UPDATES, O.SYSTEM_MONITORING, O.DISPLAY_BANNER, O.TOE_ADMINISTRATION, O.RESIDUAL_INFORMATION_CLEARING, O.RESOURCE_AVAILABILITY, O.SESSION_LOCK, O.TSF_SELF_TEST, O.PROTECTED_COMMUNIC, O.RESIDUAL_INFORMATION, O.RESOURCE_AVAILABILIT, O.PROTECTED_COMMUNICA, O.RESIDUAL_INFORMATION_, T.MEDIATE, T.TRANSMIT, T.ADMIN_ERROR, T.RESOURCE_EXHAUSTION, T.TSF_FAILURE, T.UNDETECTED_ACTIONS, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, A.PHYSICAL, A.TRUSTED_ADMIN, A.NO_GENERAL_PURPOSE, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMIN, OE.NO_GENERAL_PURPOSSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, ADV_ARC, ADV_FSP, ADV_TDS, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_CMS.1, ALC_CMC.1, ALC_CMC, ALC_CMS, ALC_DEL, ATE_COV.1, ATE_FUN.1, ATE_IND.2, ATE_IND, ATE_COV, ATE_FUN, AVA_VAN.2, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_STG_EXT.1, FAU_STG_EXT.3, FAU_SAR.1, FAU_STG_EXT.1.1, FAU_STG.3, FAU_STG_EXT.3.1, FAU_GEN, FAU_STG_EXT, FAU_SAR, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FCS_CKM_EXT.4, FCS_RBG_EXT.1, FCS_CKM_EXT.4.1, FCS_COP.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_CKM, FCS_CKM_EXT, FCS_RBG_EXT, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_CKM.1.1, FCS_SSH_EXT.1, FCS_SSH_EXT.1.7, FCS_SSH_EXT.1.4, FCS_SSH_EXT.1.5, FDP_IFC.1, FDP_IFF.1, FDP_RIP, FDP_RIP.2, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FDP_RIP.2.1, FDP_ACC.1, FIA_PMG_EXT.1, FIA_UIA_EXT.1, FIA_UAU_EXT.5, FIA_ATD.1, FIA_PMG_EXT.1.1, FIA_UAU.6, FIA_UAU_EXT.5.1, FIA_UAU_EXT.5.2, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_PMG_EXT, FIA_UIA_EXT, FIA_UAU_EXT, FIA_UAU, FIA_ATD, FIA_UAU.7, FIA_UID.1, FIA_ATD.1.1, FIA_UAU.6.1, FIA_UAU.1, FIA_UAU.7.1, FMT_MOF.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MOF, FMT_MSA, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SFR.1, FPT_TUD_EXT.1, FPT_TST_EXT.1, FPT_PTD.1, FPT_PTD_EXT.1, FPT_PTD.1.1, FPT_TST_EXT, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_ITT.1, FPT_RPL, FPT_STM, FPT_TUD_EXT, FPT_STM.1, FPT_RPL.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FRU_RSA, FRU_RSA.1, FRU_RSA.1.1, FTA_SSL_EXT.1, FTA_SSL_EXT.1.1, FTA_SSL_EXT, FTA_SSL, FTA_TAB, FTA_SSL.3, FTA_TAB.1, FTA_SSL.3.1, FTA_TAB.1.1, FTP_ITC.1, FTP_TRP.1Certificates
BSI-DSZ-CC-0838Standards
FIPS 140-2, FIPS PUB 197, FIPS PUB 186-3, FIPS PUB 180-3, FIPS 186-3, FIPS PUB 186-2, SP 800-90, NIST SP 800-38A, NIST SP 800-38D, NIST SP 800-90, NIST SP 800-56B, SP 900-90A, RFC 1059, RFC 1119, RFC 1305, RFC 2865, RFC 3162, RFC 1492, RFC 0894, RFC 0791, RFC 2460, RFC 4303, RFC 3602, RFC 4106, RFC 4109, RFC 4868, RFC 2409, RFC 4869, RFC 4253, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003File metadata
| Author | Cisco Systems |
|---|---|
| Creation date | D:20140213210754-05'00' |
| Modification date | D:20140213210754-05'00' |
| Pages | 111 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0838-2014Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_DVS.2, ALC_FLR.2, ALC_LCD.2, ALC_TAT.3, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_DPT.4, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Similar certificates
| Name | Certificate ID | |
|---|---|---|
| Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5) | BSI-DSZ-CC-0937-2014 | Compare |
| Cisco Catalyst 3850 Series Switches running IOS-XE 3.6.0E and Catalyst 6500 Series Switches running IOS 15.1(2)SY3 | NSCIB-CC-14-39582-CR | Compare |
| Cisco Catalyst 6500 Series Switches running IOS 15.0(1)SY1 | CCEVS-VR-10490-2012 | Compare |
| Cisco Firewall Services Module (FWSM) Version 3.1.(3.17) for: Cisco Catalyst 6500 Switches and Cisco 7600 Series routers | CCEVS-VR-0027-2007 | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "7751384c515aefa5",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0838-2014",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"15.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0937-2014"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0937-2014"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Cisco Systems, Inc.",
"manufacturer_web": "https://www.cisco.com",
"name": "Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5)",
"not_valid_after": "2019-09-01",
"not_valid_before": "2014-02-20",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0838a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0838-2014",
"cert_item": "Cisco Catalyst 6500-E Series Switches - Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5",
"cert_lab": "BSI",
"developer": "Cisco Systems, Inc",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0838-2014": 19
}
},
"cc_claims": {
"OE": {
"OE.NO_GENERAL_PURPOSE": 1,
"OE.PHYSICAL": 1,
"OE.TRUSTED_ADMIN": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 5,
"ALC_FLR.3": 1,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 2,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 4,
"EAL 2 augmented": 3,
"EAL 4": 1,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 6,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_IPSE": 6,
"FCS_RBG": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"8] Evaluation Technical Report, Version 1.4, Date 2014-2-18, ETR Part Summary, media transfer AG, (confidential document) [9] Guidance documentation, Cisco Catalyst 6500-E Series Switches, Common Criteria Operational": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 2
},
"IPsec": {
"IPsec": 15
},
"SSH": {
"SSH": 4
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 4,
"SHA-384": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"SCA": {
"SPA": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 32": 1
},
"FIPS": {
"FIPS PUB 180-3": 1,
"FIPS PUB 186-3": 2,
"FIPS PUB 197": 2
},
"NIST": {
"NIST SP 800-38A": 2,
"NIST SP 800-38D": 2,
"SP 800-90A": 1
},
"RFC": {
"RFC 1059": 1,
"RFC 1119": 1,
"RFC 1305": 1,
"RFC 1492": 1,
"RFC 2409": 1,
"RFC 2865": 1,
"RFC 3162": 1,
"RFC 5424": 1
}
},
"symmetric_crypto": {
"constructions": {
"MAC": {
"HMAC-SHA-256": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 30,
"Cisco Systems, Inc": 8
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20140225134242+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, \u201cCisco Catalyst 6500-E Series\u201d, switching, routing, NDPP\"",
"/ModDate": "D:20140225134557+01\u002700\u0027",
"/Producer": "LibreOffice 3.6",
"/Subject": "Cisco Catalyst 6500-E Series Switches",
"/Title": "Certification Report BSI-DSZ-CC-0838-2014",
"pdf_file_size_bytes": 1116379,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"st_filename": "0838b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"DH": 19,
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0838": 2
}
},
"cc_claims": {
"A": {
"A.NO_GENERAL_PURPOSE": 3,
"A.PHYSICAL": 2,
"A.TRUSTED_ADMIN": 3
},
"O": {
"O.DISPLAY_BANNER": 4,
"O.MEDIATE": 5,
"O.PROTECTED_COMMUNIC": 1,
"O.PROTECTED_COMMUNICA": 2,
"O.PROTECTED_COMMUNICATIONS": 3,
"O.RESIDUAL_INFORMATION": 2,
"O.RESIDUAL_INFORMATION_": 1,
"O.RESIDUAL_INFORMATION_CLEARING": 1,
"O.RESOURCE_AVAILABILIT": 1,
"O.RESOURCE_AVAILABILITY": 5,
"O.SESSION_LOCK": 4,
"O.SYSTEM_MONITORING": 6,
"O.TOE_ADMINISTRATION": 6,
"O.TSF_SELF_TEST": 6,
"O.VERIFIABLE_UPDATES": 4
},
"OE": {
"OE.NO_GENERAL_PURPOS": 1,
"OE.NO_GENERAL_PURPOSE": 2,
"OE.PHYSICAL": 3,
"OE.TRUSTED_ADMIN": 3
},
"T": {
"T.ADMIN_ERROR": 3,
"T.MEDIATE": 3,
"T.RESOURCE_EXHAUSTION": 3,
"T.TRANSMIT": 4,
"T.TSF_FAILURE": 3,
"T.UNAUTHORIZED_ACCESS": 3,
"T.UNAUTHORIZED_UPDATE": 2,
"T.UNDETECTED_ACTIONS": 2,
"T.USER_DATA_REUSE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 14,
"ADV_FSP": 1,
"ADV_FSP.1": 5,
"ADV_FSP.2": 18,
"ADV_TDS": 1,
"ADV_TDS.1": 17
},
"AGD": {
"AGD_OPE": 6,
"AGD_OPE.1": 17,
"AGD_PRE": 2,
"AGD_PRE.1": 8
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 10,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 8,
"ALC_DEL": 1,
"ALC_DEL.1": 7,
"ALC_FLR.2": 19
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 16,
"ASE_ECD": 1,
"ASE_ECD.1": 14,
"ASE_INT": 1,
"ASE_INT.1": 16,
"ASE_OBJ": 1,
"ASE_OBJ.2": 13,
"ASE_REQ": 1,
"ASE_REQ.2": 17,
"ASE_SPD": 1,
"ASE_SPD.1": 10,
"ASE_TSS": 1,
"ASE_TSS.1": 7
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 9,
"ATE_FUN": 1,
"ATE_FUN.1": 12,
"ATE_IND": 4,
"ATE_IND.2": 9
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.2": 9
}
},
"cc_security_level": {
"EAL": {
"EAL2": 15,
"EAL2 augmented": 1,
"EAL2+": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 18,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 6,
"FAU_GEN.2.1": 1,
"FAU_SAR": 1,
"FAU_SAR.1": 9,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.3": 1,
"FAU_STG_EXT": 2,
"FAU_STG_EXT.1": 10,
"FAU_STG_EXT.1.1": 2,
"FAU_STG_EXT.3": 10,
"FAU_STG_EXT.3.1": 2
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 26,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 6,
"FCS_CKM_EXT": 1,
"FCS_CKM_EXT.4": 13,
"FCS_CKM_EXT.4.1": 2,
"FCS_COP.1": 51,
"FCS_RBG_EXT": 1,
"FCS_RBG_EXT.1": 8,
"FCS_RBG_EXT.1.1": 2,
"FCS_RBG_EXT.1.2": 3,
"FCS_SSH_EXT.1": 2,
"FCS_SSH_EXT.1.4": 1,
"FCS_SSH_EXT.1.5": 1,
"FCS_SSH_EXT.1.7": 1
},
"FDP": {
"FDP_ACC.1": 2,
"FDP_IFC.1": 33,
"FDP_IFF.1": 54,
"FDP_ITC.1": 8,
"FDP_ITC.2": 4,
"FDP_RIP": 1,
"FDP_RIP.1": 1,
"FDP_RIP.2": 7,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_ATD": 1,
"FIA_ATD.1": 12,
"FIA_ATD.1.1": 1,
"FIA_PMG_EXT": 1,
"FIA_PMG_EXT.1": 8,
"FIA_PMG_EXT.1.1": 2,
"FIA_UAU": 2,
"FIA_UAU.1": 2,
"FIA_UAU.6": 7,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 7,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT": 1,
"FIA_UAU_EXT.5": 9,
"FIA_UAU_EXT.5.1": 2,
"FIA_UAU_EXT.5.2": 2,
"FIA_UIA_EXT": 1,
"FIA_UIA_EXT.1": 13,
"FIA_UIA_EXT.1.1": 2,
"FIA_UIA_EXT.1.2": 2,
"FIA_UID.1": 5
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 11,
"FMT_MOF.1.1": 1,
"FMT_MSA": 2,
"FMT_MSA.1": 8,
"FMT_MSA.2": 7,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 17,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 1,
"FMT_MTD.1": 6,
"FMT_MTD.1.1": 1,
"FMT_SFR.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 16,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT.1": 13,
"FPT_PTD.1": 4,
"FPT_PTD.1.1": 2,
"FPT_PTD_EXT.1": 19,
"FPT_RPL": 1,
"FPT_RPL.1": 8,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_STM": 1,
"FPT_STM.1": 10,
"FPT_STM.1.1": 1,
"FPT_TST_EXT": 2,
"FPT_TST_EXT.1": 7,
"FPT_TST_EXT.1.1": 2,
"FPT_TUD_EXT": 1,
"FPT_TUD_EXT.1": 9,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 2,
"FPT_TUD_EXT.1.3": 2
},
"FRU": {
"FRU_RSA": 1,
"FRU_RSA.1": 7,
"FRU_RSA.1.1": 1
},
"FTA": {
"FTA_SSL": 2,
"FTA_SSL.3": 7,
"FTA_SSL.3.1": 1,
"FTA_SSL_EXT": 1,
"FTA_SSL_EXT.1": 10,
"FTA_SSL_EXT.1.1": 2,
"FTA_TAB": 1,
"FTA_TAB.1": 7,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC.1": 24,
"FTP_TRP.1": 22
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CCM": {
"CCM": 1
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 34,
"IKEv1": 22,
"IKEv2": 6
},
"IPsec": {
"IPsec": 5
},
"SSH": {
"SSH": 21,
"SSHv2": 1
},
"TLS": {
"TLS": {
"TLS": 12
}
},
"VPN": {
"VPN": 3
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 13
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 2,
"P-384": 2,
"P-521": 2
}
},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 3
}
},
"SHA": {
"SHA1": {
"SHA-1": 4,
"SHA1": 1
},
"SHA2": {
"SHA-256": 3,
"SHA-384": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 2,
"PRNG": 1
},
"RNG": {
"RBG": 20,
"RNG": 7
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1
},
"FIPS": {
"FIPS 140-2": 5,
"FIPS 186-3": 2,
"FIPS PUB 180-3": 2,
"FIPS PUB 186-2": 1,
"FIPS PUB 186-3": 3,
"FIPS PUB 197": 1
},
"NIST": {
"NIST SP 800-38A": 2,
"NIST SP 800-38D": 2,
"NIST SP 800-56B": 1,
"NIST SP 800-90": 1,
"SP 800-90": 2,
"SP 900-90A": 1
},
"RFC": {
"RFC 0791": 1,
"RFC 0894": 1,
"RFC 1059": 1,
"RFC 1119": 1,
"RFC 1305": 1,
"RFC 1492": 1,
"RFC 2409": 1,
"RFC 2460": 1,
"RFC 2865": 1,
"RFC 3162": 1,
"RFC 3602": 2,
"RFC 4106": 2,
"RFC 4109": 3,
"RFC 4253": 1,
"RFC 4303": 2,
"RFC 4868": 1,
"RFC 4869": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 21
}
},
"DES": {
"3DES": {
"TDES": 1
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"CMAC": 1,
"HMAC": 2,
"HMAC-SHA-256": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 39,
"Cisco Systems": 3,
"Cisco Systems, Inc": 111
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Cisco Systems",
"/CreationDate": "D:20140213210754-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20140213210754-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 1215413,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 111
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0838a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0838b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e9c65178d53934818a65bc4b63830e0c47f5c0d62775ea5ce3e9b72fe2ed73ac",
"txt_hash": "3f708221457f7bcac8322de20e38e6ef6b2b196c4493ce0f65bbc38715971c26"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "904533c608dbfe3d5d98ce2f50aa0b1191a51ef153118cbd168865633affc97a",
"txt_hash": "42160229be903a221b3013b8b3b04ce96ca46cef5efcf8f2b56c0dfe57e8a8db"
}
},
"status": "archived"
}