Hewlett Packard Enterprise HSR6600 Series, HSR6800 Series, and MSR1000 Series routers, all with Comware V7.1
CSV information ?
Status | archived |
---|---|
Valid from | 22.04.2016 |
Valid until | 22.04.2021 |
Scheme | 🇲🇾 MY |
Manufacturer | Hewlett Packard Enterprise |
Category | Network and Network-Related Devices and Systems |
Security level | ALC_FLR.2, EAL3+ |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSH, SSL, IPsec, VPNSecurity level
EAL3, EAL 3, EAL3+Security Assurance Requirements (SAR)
ALC_FLR.2Security Functional Requirements (SFR)
FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FIA_UID.2.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_TST.1.1, FTA_SSL.3.1, FTA_SSL.4.1Certificates
ISCB-5-RPT-C070-CR-v1Evaluation facilities
LeidosStandards
FIPS 140-2, ISO/IEC15408, ISO/IEC 18045File metadata
Title | Microsoft Word - ISCB-5-RPT-C070-CR-v1.docx |
---|---|
Author | idsafairis |
Creation date | D:20160426144556+08'00' |
Modification date | D:20160426144808+08'00' |
Pages | 34 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 11.0 (Windows) |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, HMACAsymmetric Algorithms
DHHash functions
SHA-1, SHA-256, SHA-512Protocols
SSH, IKEv1, IPsec, VPNRandomness
DRBG, RNGBlock cipher modes
CBCSecurity level
EAL3, EAL3 augmentedClaims
O.AUDIT, O.AUDIT_REVIEW, O.AUDIT_STORAGE, O.CRYPTOGRAPHY, O.MEDIATE, O.PASSWORD_CONTROLS, O.PROTECTED, O.SECURITY_MANAGEMENT, O.SESSION_TERMINATION, O.THROTTLE, O.PROTECTED_COMMS, O.I_AND_A, T.BRUTE_FORCE, T.MEDIATE, T.NETWORK_COMPROMISE, T.NO_ACCOUNTABILITY, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_ACTIVITY, A.MANAGE, A.NOEVIL, A.PROTECT, OE.PHYSICAL, OE.PERSONNELSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_STG, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3, FAU_SAR.3.1, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4, FAU_STG.4.1, FCS_CKM, FCS_COP.1, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM.2, FDP_ACC.1, FDP_IFC, FDP_IFF, FDP_IFF.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1, FDP_ITC.2, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2.1, FIA_UID.1, FIA_UAU.1, FMT_MOF, FMT_MSA, FMT_MTD, FMT_SMF, FMT_SMR, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM, FPT_TST, FPT_STM.1, FPT_STM.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL, FTA_SSL.3, FTA_SSL.3.1, FTA_SSL.4, FTA_SSL.4.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Standards
FIPS 140-2, FIPS 186-4, FIPS 197, FIPS 180-3, FIPS 198-1, FIPS PUB 197, FIPS PUB 198-1, FIPS PUB 180-3, FIPS PUB 186-4, NIST SP 800-90File metadata
Title | Microsoft Word - HP HSR-MSR Routers EAL3 ST v1.0.docx |
---|---|
Author | idsafairis |
Creation date | D:20160426144901+08'00' |
Modification date | D:20160426144901+08'00' |
Pages | 51 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 11.0 (Windows) |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Similar certificates
Name | Certificate ID | |
---|---|---|
Hewlett Packard Enterprise MSR 1000 Series, 2000 Series, 3000 Series, and 4000 Series Routers with Comware V7.1 | CCEVS-VR-VID-10670-2016 | Compare |
Scheme data ?
Cert No | 2016-001-C070 | |
---|---|---|
Developer | Hewlett Packard Enterprise | |
Level | EAL3+ALC_FLR.2 | |
Product | Hewlett Packard Enterprise HSR6600 Series, HSR6800 Series, and MSR1000 Series Routers, all with Comware V7.1 | |
Certification Date | 22.04.2016 | |
Expiration Date | 22.04.2021 | |
Recognition | CCRA | |
Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/115 | |
Enhanced | ||
Cert Id | C070 | |
Product | Hewlett Packard Enterprise HSR6600 Series, HSR6800 Series, and MSR1000 Series Routers, all with Comware V7.1 | |
Developer | HP EnterpriseTel: +1 512 432-2947Cell: +1 512 632-6308VoIP: +1 512 319-5317Email: [email protected] Tandem Blvd.Austin, TX 78728 – USA URL: http://www.hpe.com/ | |
Category | Network and Network-Related Devices and Systems | |
Type | Network and Network related Devices and Systems | |
Scope | The TOE is comprised of the HP HSR6600 Series (2 devices), HSR6800 Series (3 devices) and MSR1000 Series (2 devices) Routers, all with Comware V7.1 software. Each router is a stand-alone network appliance that provides layer 2 switching and layer 3 routing and service functions. The following security functions are implemented by the TOE: Security Audit: The TOE is able to generate audit records of security-relevant events occurring on the TOE. Cryptographic Support: The TOE implements cryptographic algorithms that provide key management, random bit generation, data encryption and decryption, digital signature generation and verification, and secure hashing and key-hashing features in support of higher level cryptographic protocols, including IPsec and SSHv2. User Data Protection: The TOE provides firewall capabilities that allow for the definition of firewall rules, collectively known as access control lists (ACLs), which are applied to applicable network traffic as it is received and which would pass through the TOE between connected networks. Identification and Authentication: The TOE requires administrators to be successfully identified and authenticated before they can access any security management functions available in the TOE. Security Management: The TOE provides a command line interface (CLI) to access its security management functions. TSF Protection: The TOE implements a number of self-tests that it performs when it starts up, to ensure its cryptographic functions operate properly and that the Comware and TSF executable files have not been modified. TOE Access: The TOE will terminate interactive sessions after a period of inactivity configurable by an administrator. Trusted Channel/Path: The TOE protects interactive communication with administrators using SSHv2 for CLI access. Using SSHv2, both integrity and disclosure protection is ensured. | |
Assurance Level | EAL3+ALC_FLR.2 | |
Certification Date | 22.04.2016 | |
Expiration Date | 22.04.2021 | |
Mutual Recognition | CCRA | |
Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C070/HP%20HSR-MSR%20Routers%20EAL3%20ST%20v1.0.pdf | |
Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C070/ISCB-5-RPT-C070-CR-v1.pdf | |
Status | Archive |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2016-04-22', 'expiration_date': '2021-04-22', 'enhanced': {'__update__': {'developer': 'HP EnterpriseTel: +1 512 432-2947Cell: +1 512 632-6308VoIP: +1 512 319-5317Email: [email protected] Tandem Blvd.Austin, TX 78728 – USA URL: http://www.hpe.com/', 'scope': 'The TOE is comprised of the HP HSR6600 Series (2 devices), HSR6800 Series (3 devices) and MSR1000 Series (2 devices) Routers, all with Comware V7.1 software. Each router is a stand-alone network appliance that provides layer 2 switching and layer 3 routing and service functions. The following security functions are implemented by the TOE: Security Audit: The TOE is able to generate audit records of security-relevant events occurring on the TOE. Cryptographic Support: The TOE implements cryptographic algorithms that provide key management, random bit generation, data encryption and decryption, digital signature generation and verification, and secure hashing and key-hashing features in support of higher level cryptographic protocols, including IPsec and SSHv2. User Data Protection: The TOE provides firewall capabilities that allow for the definition of firewall rules, collectively known as access control lists (ACLs), which are applied to applicable network traffic as it is received and which would pass through the TOE between connected networks. Identification and Authentication: The TOE requires administrators to be successfully identified and authenticated before they can access any security management functions available in the TOE. Security Management: The TOE provides a command line interface (CLI) to access its security management functions. TSF Protection: The TOE implements a number of self-tests that it performs when it starts up, to ensure its cryptographic functions operate properly and that the Comware and TSF executable files have not been modified. TOE Access: The TOE will terminate interactive sessions after a period of inactivity configurable by an administrator. Trusted Channel/Path: The TOE protects interactive communication with administrators using SSHv2 for CLI access. Using SSHv2, both integrity and disclosure protection is ensured.', 'certification_date': '2016-04-22', 'expiration_date': '2021-04-22'}}}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'af0e51b48c52f6329c4d773b62ab6123c7151c42f5f8d1ee66fa93620e1d0752', 'txt_hash': '568dfed1c77e6c4a56ee51de19b6c6efb917784a311a18d4f77e6568004084af'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'aaa826e4236afa347d0a8faf70f9146005c03528febb445c5883b377b352974f', 'txt_hash': 'a9b0b4c14910182d9a6633a7521b93fb6902aec7524c6467626084a0dc25dc10'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 446526, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 34, '/Author': 'idsafairis', '/CreationDate': "D:20160426144556+08'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20160426144808+08'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': 'Microsoft Word - ISCB-5-RPT-C070-CR-v1.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 467190, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 51, '/Author': 'idsafairis', '/CreationDate': "D:20160426144901+08'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20160426144901+08'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': 'Microsoft Word - HP HSR-MSR Routers EAL3 ST v1.0.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'MY': {'ISCB-5-RPT-C070-CR-v1': 33}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4, 'EAL 3': 3, 'EAL3+': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 8}}, 'cc_sfr': {'FAU': {'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FIA': {'FIA_UID.2.1': 1}, 'FMT': {'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_TST.1.1': 1}, 'FTA': {'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Leidos': {'Leidos': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 1}}, 'IPsec': {'IPsec': 7}, 'VPN': {'VPN': 3}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 2}, 'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 7, 'EAL3 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 10, 'ADV_FSP.3': 12, 'ADV_TDS.2': 13}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.2': 16, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_CMC.3': 13, 'ALC_CMS.3': 6, 'ALC_DEL.1': 5, 'ALC_DVS.1': 5, 'ALC_LCD.1': 6}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 5, 'ATE_DPT.1': 5, 'ATE_FUN.1': 8, 'ATE_IND.2': 7}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.2': 7}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 14, 'ASE_ECD.1': 10, 'ASE_INT.1': 12, 'ASE_OBJ.2': 10, 'ASE_REQ.2': 13, 'ASE_SPD.1': 7, 'ASE_TSS.1': 5}}, 'cc_sfr': {'FAU': {'FAU_GEN': 6, 'FAU_SAR': 6, 'FAU_STG': 6, 'FAU_GEN.1': 10, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 5, 'FAU_GEN.2.1': 1, 'FAU_SAR.1': 7, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3': 4, 'FAU_SAR.3.1': 1, 'FAU_STG.1': 6, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4': 4, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_CKM': 6, 'FCS_COP.1': 27, 'FCS_CKM.1': 9, 'FCS_CKM.1.1': 1, 'FCS_CKM.4': 6, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 5, 'FCS_CKM.2': 1}, 'FDP': {'FDP_ACC.1': 4, 'FDP_IFC': 2, 'FDP_IFF': 3, 'FDP_IFF.1': 6, 'FDP_IFC.1': 9, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1': 2, 'FDP_ITC.2': 2}, 'FIA': {'FIA_AFL': 3, 'FIA_ATD': 3, 'FIA_SOS': 3, 'FIA_UAU': 9, 'FIA_UID': 2, 'FIA_AFL.1': 6, 'FIA_SOS.1': 5, 'FIA_UAU.2': 11, 'FIA_UAU.5': 6, 'FIA_UID.2': 9, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7': 5, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 5, 'FIA_UAU.1': 2}, 'FMT': {'FMT_MOF': 2, 'FMT_MSA': 5, 'FMT_MTD': 1, 'FMT_SMF': 2, 'FMT_SMR': 2, 'FMT_SMF.1': 10, 'FMT_SMR.1': 12, 'FMT_MOF.1': 6, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 7, 'FMT_MSA.1.1': 1, 'FMT_MSA.3': 6, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 10, 'FMT_MTD.1.1': 3, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM': 3, 'FPT_TST': 2, 'FPT_STM.1': 7, 'FPT_STM.1.1': 1, 'FPT_TST.1': 4, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL': 6, 'FTA_SSL.3': 6, 'FTA_SSL.3.1': 1, 'FTA_SSL.4': 5, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_ITC': 2, 'FTP_TRP': 3, 'FTP_ITC.1': 7, 'FTP_TRP.1': 6, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.AUDIT': 7, 'O.AUDIT_REVIEW': 3, 'O.AUDIT_STORAGE': 5, 'O.CRYPTOGRAPHY': 3, 'O.MEDIATE': 5, 'O.PASSWORD_CONTROLS': 5, 'O.PROTECTED': 1, 'O.SECURITY_MANAGEMENT': 5, 'O.SESSION_TERMINATION': 3, 'O.THROTTLE': 5, 'O.PROTECTED_COMMS': 4, 'O.I_AND_A': 1}, 'T': {'T.BRUTE_FORCE': 3, 'T.MEDIATE': 2, 'T.NETWORK_COMPROMISE': 3, 'T.NO_ACCOUNTABILITY': 2, 'T.UNATTENDED_SESSION': 3, 'T.UNAUTHORIZED_ACCESS': 2, 'T.UNAUTHORIZED_ACTIVITY': 3}, 'A': {'A.MANAGE': 2, 'A.NOEVIL': 3, 'A.PROTECT': 3}, 'OE': {'OE.PHYSICAL': 2, 'OE.PERSONNEL': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 21}}, 'constructions': {'MAC': {'HMAC': 5}}}, 'asymmetric_crypto': {'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-256': 3, 'SHA-512': 3}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 15}, 'IKE': {'IKEv1': 1}, 'IPsec': {'IPsec': 14}, 'VPN': {'VPN': 5}}, 'randomness': {'PRNG': {'DRBG': 1}, 'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 7}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 6, 'FIPS 186-4': 4, 'FIPS 197': 2, 'FIPS 180-3': 3, 'FIPS 198-1': 2, 'FIPS PUB 197': 1, 'FIPS PUB 198-1': 1, 'FIPS PUB 180-3': 1, 'FIPS PUB 186-4': 1}, 'NIST': {'NIST SP 800-90': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ISCB-5-RPT-C070-CR-v1.pdf
. - The st_filename property was set to
HP HSR-MSR Routers EAL3 ST v1.0.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ISCB-5-RPT-C070-CR-v1
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C070-CR-v1.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HP%20HSR-MSR%20Routers%20EAL3%20ST%20v1.0.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
values discarded.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Hewlett Packard Enterprise HSR6600 Series, HSR6800 Series, and MSR1000 Series routers, all with Comware V7.1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "9fbd666e2a4e9776",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C070-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"7.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2016-001-C070",
"certification_date": "2016-04-22",
"developer": "Hewlett Packard Enterprise",
"enhanced": {
"assurance_level": "EAL3+ALC_FLR.2",
"category": "Network and Network-Related Devices and Systems",
"cert_id": "C070",
"certification_date": "2016-04-22",
"developer": "HP EnterpriseTel: +1 512 432-2947Cell: +1 512 632-6308VoIP: +1 512 319-5317Email: [email protected] Tandem Blvd.Austin, TX 78728 \u2013 USA URL: http://www.hpe.com/",
"expiration_date": "2021-04-22",
"mutual_recognition": "CCRA",
"product": "Hewlett Packard Enterprise HSR6600 Series, HSR6800 Series, and MSR1000 Series Routers, all with Comware V7.1",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C070/ISCB-5-RPT-C070-CR-v1.pdf",
"scope": "The TOE is comprised of the HP HSR6600 Series (2 devices), HSR6800 Series (3 devices) and MSR1000 Series (2 devices) Routers, all with Comware V7.1 software. Each router is a stand-alone network appliance that provides layer 2 switching and layer 3 routing and service functions. The following security functions are implemented by the TOE: Security Audit: The TOE is able to generate audit records of security-relevant events occurring on the TOE. Cryptographic Support: The TOE implements cryptographic algorithms that provide key management, random bit generation, data encryption and decryption, digital signature generation and verification, and secure hashing and key-hashing features in support of higher level cryptographic protocols, including IPsec and SSHv2. User Data Protection: The TOE provides firewall capabilities that allow for the definition of firewall rules, collectively known as access control lists (ACLs), which are applied to applicable network traffic as it is received and which would pass through the TOE between connected networks. Identification and Authentication: The TOE requires administrators to be successfully identified and authenticated before they can access any security management functions available in the TOE. Security Management: The TOE provides a command line interface (CLI) to access its security management functions. TSF Protection: The TOE implements a number of self-tests that it performs when it starts up, to ensure its cryptographic functions operate properly and that the Comware and TSF executable files have not been modified. TOE Access: The TOE will terminate interactive sessions after a period of inactivity configurable by an administrator. Trusted Channel/Path: The TOE protects interactive communication with administrators using SSHv2 for CLI access. Using SSHv2, both integrity and disclosure protection is ensured.",
"status": "Archive",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C070/HP%20HSR-MSR%20Routers%20EAL3%20ST%20v1.0.pdf",
"type": "Network and Network related Devices and Systems"
},
"expiration_date": "2021-04-22",
"level": "EAL3+ALC_FLR.2",
"product": "Hewlett Packard Enterprise HSR6600 Series, HSR6800 Series, and MSR1000 Series Routers, all with Comware V7.1",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/115"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Hewlett Packard Enterprise",
"manufacturer_web": "https://www.hpe.com/",
"name": "Hewlett Packard Enterprise HSR6600 Series, HSR6800 Series, and MSR1000 Series routers, all with Comware V7.1",
"not_valid_after": "2021-04-22",
"not_valid_before": "2016-04-22",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ISCB-5-RPT-C070-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C070-CR-v1": 33
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 3,
"EAL3": 4,
"EAL3+": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2.1": 1,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1
},
"FIA": {
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_TST.1.1": 1
},
"FTA": {
"FTA_SSL.3.1": 1,
"FTA_SSL.4.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 7
},
"SSH": {
"SSH": 2
},
"TLS": {
"SSL": {
"SSL": 1
}
},
"VPN": {
"VPN": 3
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Leidos": {
"Leidos": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 2
},
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "idsafairis",
"/CreationDate": "D:20160426144556+08\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20160426144808+08\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "Microsoft Word - ISCB-5-RPT-C070-CR-v1.docx",
"pdf_file_size_bytes": 446526,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 34
},
"st_filename": "HP HSR-MSR Routers EAL3 ST v1.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.MANAGE": 2,
"A.NOEVIL": 3,
"A.PROTECT": 3
},
"O": {
"O.AUDIT": 7,
"O.AUDIT_REVIEW": 3,
"O.AUDIT_STORAGE": 5,
"O.CRYPTOGRAPHY": 3,
"O.I_AND_A": 1,
"O.MEDIATE": 5,
"O.PASSWORD_CONTROLS": 5,
"O.PROTECTED": 1,
"O.PROTECTED_COMMS": 4,
"O.SECURITY_MANAGEMENT": 5,
"O.SESSION_TERMINATION": 3,
"O.THROTTLE": 5
},
"OE": {
"OE.PERSONNEL": 2,
"OE.PHYSICAL": 2
},
"T": {
"T.BRUTE_FORCE": 3,
"T.MEDIATE": 2,
"T.NETWORK_COMPROMISE": 3,
"T.NO_ACCOUNTABILITY": 2,
"T.UNATTENDED_SESSION": 3,
"T.UNAUTHORIZED_ACCESS": 2,
"T.UNAUTHORIZED_ACTIVITY": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 10,
"ADV_FSP": 1,
"ADV_FSP.3": 12,
"ADV_TDS": 1,
"ADV_TDS.2": 13
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 10,
"AGD_PRE": 1,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.3": 13,
"ALC_CMS": 1,
"ALC_CMS.3": 6,
"ALC_DEL": 1,
"ALC_DEL.1": 5,
"ALC_DVS": 1,
"ALC_DVS.1": 5,
"ALC_FLR": 1,
"ALC_FLR.2": 16,
"ALC_LCD": 1,
"ALC_LCD.1": 6
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 14,
"ASE_ECD": 1,
"ASE_ECD.1": 10,
"ASE_INT": 1,
"ASE_INT.1": 12,
"ASE_OBJ": 1,
"ASE_OBJ.2": 10,
"ASE_REQ": 1,
"ASE_REQ.2": 13,
"ASE_SPD": 1,
"ASE_SPD.1": 7,
"ASE_TSS": 1,
"ASE_TSS.1": 5
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 5,
"ATE_DPT": 1,
"ATE_DPT.1": 5,
"ATE_FUN": 1,
"ATE_FUN.1": 8,
"ATE_IND": 1,
"ATE_IND.2": 7
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.2": 7
}
},
"cc_security_level": {
"EAL": {
"EAL3": 7,
"EAL3 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 6,
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_SAR": 6,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.3": 4,
"FAU_SAR.3.1": 1,
"FAU_STG": 6,
"FAU_STG.1": 6,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.4": 4,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM": 6,
"FCS_CKM.1": 9,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 6,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 27,
"FCS_COP.1.1": 5
},
"FDP": {
"FDP_ACC.1": 4,
"FDP_IFC": 2,
"FDP_IFC.1": 9,
"FDP_IFC.1.1": 1,
"FDP_IFF": 3,
"FDP_IFF.1": 6,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC.1": 2,
"FDP_ITC.2": 2
},
"FIA": {
"FIA_AFL": 3,
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 3,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_SOS": 3,
"FIA_SOS.1": 5,
"FIA_SOS.1.1": 1,
"FIA_UAU": 9,
"FIA_UAU.1": 2,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 6,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.7": 5,
"FIA_UAU.7.1": 1,
"FIA_UID": 2,
"FIA_UID.1": 5,
"FIA_UID.2": 9,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF.1": 6,
"FMT_MOF.1.1": 1,
"FMT_MSA": 5,
"FMT_MSA.1": 7,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 6,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 1,
"FMT_MTD.1": 10,
"FMT_MTD.1.1": 3,
"FMT_SMF": 2,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 12,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM": 3,
"FPT_STM.1": 7,
"FPT_STM.1.1": 1,
"FPT_TST": 2,
"FPT_TST.1": 4,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_SSL": 6,
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 5,
"FTA_SSL.4.1": 1
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC.1": 7,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP": 3,
"FTP_TRP.1": 6,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 7
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKEv1": 1
},
"IPsec": {
"IPsec": 14
},
"SSH": {
"SSH": 15
},
"VPN": {
"VPN": 5
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-256": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 6,
"FIPS 180-3": 3,
"FIPS 186-4": 4,
"FIPS 197": 2,
"FIPS 198-1": 2,
"FIPS PUB 180-3": 1,
"FIPS PUB 186-4": 1,
"FIPS PUB 197": 1,
"FIPS PUB 198-1": 1
},
"NIST": {
"NIST SP 800-90": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 21
}
},
"constructions": {
"MAC": {
"HMAC": 5
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "idsafairis",
"/CreationDate": "D:20160426144901+08\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20160426144901+08\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "Microsoft Word - HP HSR-MSR Routers EAL3 ST v1.0.docx",
"pdf_file_size_bytes": 467190,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 51
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C070-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HP%20HSR-MSR%20Routers%20EAL3%20ST%20v1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "af0e51b48c52f6329c4d773b62ab6123c7151c42f5f8d1ee66fa93620e1d0752",
"txt_hash": "568dfed1c77e6c4a56ee51de19b6c6efb917784a311a18d4f77e6568004084af"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "aaa826e4236afa347d0a8faf70f9146005c03528febb445c5883b377b352974f",
"txt_hash": "a9b0b4c14910182d9a6633a7521b93fb6902aec7524c6467626084a0dc25dc10"
}
},
"status": "archived"
}