This page was not yet optimized for use on mobile devices.
Cisco Nexus 9000 Switch Series with ACI mode, APIC 6.1(2g) and NX-OS software-ACI 16.1(2g)
This certificate has known related CVEs, which means that
the certified
product might be vulnerable.
CSV information
Status | active |
---|---|
Valid from | 16.05.2025 |
Valid until | 16.05.2030 |
Scheme | 🇳🇱 NL |
Manufacturer | Cisco Systems, Inc. |
Category | Network and Network-Related Devices and Systems |
Security level | EAL2+, ALC_FLR.2 |
Heuristics summary
Certificate ID: NSCIB-CC-2400067-01-CR
Certificate
Extracted keywords
Vendor
Cisco Systems, Inc, CiscoSecurity level
EAL2, EAL4, EAL2 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2, ALC_FLR.3, ALC_FLRCertificates
NSCIB-CC-2400067-01, NSCIB-2400067-01Evaluation facilities
SGS, SGS Brightsight, BrightsightStandards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008File metadata
Title | NSCIB Certificate |
---|---|
Author | Valerie |
Creation date | D:20250611214234+01'00' |
Modification date | D:20250611214234+01'00' |
Pages | 1 |
Creator | Microsoft® Word 2021 |
Producer | Microsoft® Word 2021 |
Certification report
Extracted keywords
Protocols
SSHv2, SSH, TLSv1.2, TLSv1.3Vendor
Cisco, Cisco Systems, IncSecurity level
EAL4, EAL2, EAL2+, EAL 2, EAL2 augmented, EAL 2 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2Certificates
NSCIB-CC-2400067-01-CR, NSCIB-2400067-01Evaluation facilities
SGS, SGS Brightsight, BrightsightSide-channel analysis
JILCertification process
out of scope, following proprietary or non-standard algorithms, protocols and implementations: <none>, which are out of scope as there are no security claims relating to these. Page: 13/17 of report numberFile metadata
Title | Certification Report |
---|---|
Author | sjon |
Creation date | D:20250611213129+01'00' |
Modification date | D:20250611213129+01'00' |
Pages | 17 |
Creator | Microsoft® Word 2021 |
Producer | Microsoft® Word 2021 |
Frontpage
Certificate ID | NSCIB-CC-2400067-01-CR |
---|---|
Certified item | Cisco Nexus 9000 Switch Series with ACI mode, APIC 6.1(2g) and NX-OS software-ACI 16.1(2g |
Certification lab | SGS Brightsight B.V. |
Developer | Cisco Systems, Inc |
Security target
Extracted keywords
Symmetric Algorithms
AESSchemes
MACProtocols
SSH, SSHv2, TLS, TLSv1.2, TLSv1.3Vendor
Cisco, Cisco Systems, IncSecurity level
EAL2, EAL2+, EAL2 augmentedClaims
O.OBJECTIVE, O.ACCESS_CONTROL, O.ADMIN, O.AUDIT_GEN, O.AUDIT_REVIEW, O.DATA_FLOW_CONTROL, O.DISPLAY_BANNER, O.IDAUTH, O.RESIDUAL_INFORMATION_CLEARING, O.SELF_PROTECT, O.TIME, O.TSF_SELF_TEST, O.RESUDUAL_INFORMATION_CLEARING, O.ACCESS_CONTROLL, O.RESIDUAL_INFORMATION_CLE, T.THREAT, T.ACCOUNTABILITY, T.NET_TRAFFIC, T.TSF_FAILURE, T.UNAUTHORIZED_ACCESS, T.USER_DATA_REUSE, A.ASSUMPTION, A.FIREWALL, A.LOCATE, A.TRUSTED_ADMIN, OE.OBJECTIVE, OE.ADMIN, OE.CONNECTION, OE.FIREWALL, OE.LOCATESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_STG, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_SAR.1, FAU_STG.1, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FDP_IFF.1, FDP_IFC, FDP_IFF, FDP_RIP, FDP_IFC.1, FDP_RIP.2, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.2.1, FDP_ACC.1, FDP_RIP.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU, FIA_UID.2, FIA_UAU.7, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.7.1, FIA_UID.2.1, FIA_UID.1, FIA_UAU.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM, FPT_TST, FPT_STM.1, FPT_TST.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TAB.1, FTA_SSL, FTA_TAB, FTA_SSL.4, FTA_TAB.1, FTA_TAB.1.1, FTA_SSL.4.1, FTP_TRP, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3File metadata
Author | Cisco GCT TME |
---|---|
Creation date | D:20250422105101+02'00' |
Modification date | D:20250422105101+02'00' |
Pages | 58 |
Creator | Microsoft® Word LTSC |
Producer | Microsoft® Word LTSC |
Heuristics
Certificate ID: NSCIB-CC-2400067-01-CR
Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2012-4135 | MEDIUM | 4.6 | 6.9 | 21.12.2013 14:22 | ||
CVE-2013-6975 | MEDIUM | 4.6 | 6.9 | 20.05.2014 11:13 | ||
CVE-2013-6982 | MEDIUM | 4.3 | 2.9 | 08.01.2014 21:55 | ||
CVE-2014-3295 | MEDIUM | 4.8 | 4.9 | 14.06.2014 04:26 | ||
CVE-2016-1351 | HIGH | 7.5 | 3.6 | 26.03.2016 01:59 | ||
CVE-2016-1409 | HIGH | 7.5 | 3.6 | 29.05.2016 22:59 | ||
CVE-2016-1453 | CRITICAL | 9.8 | 5.9 | 06.10.2016 10:59 | ||
CVE-2017-6770 | MEDIUM | 4.2 | 2.5 | 07.08.2017 06:29 |
Showing 5 out of 8.
Similar certificates
Scheme data ?
Cert Id | NSCIB-CC-2400067-01-CR | |
---|---|---|
Certification Date | 16.05.2025 | |
Status | Issued | |
Product | Cisco Nexus 9000 Switch Series with ACI mode, APIC 6.1(2g) and NX-OS software-ACI 16.1(2g) | |
Developer | Cisco Systems, Inc. | |
Evaluation Facility | Brightsight | |
Level | EAL2 + ALC_FLR.2 | |
Cert Link | https://trustcb.com/download/?wpdmdl=5234 | |
Report Link | https://trustcb.com/download/?wpdmdl=5235 | |
Target Link | https://trustcb.com/download/?wpdmdl=5236 |
References
No references are available for this certificate.
Updates
-
07.07.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Cisco Nexus 9000 Switch Series with ACI mode, APIC 6.1(2g) and NX-OS software-ACI 16.1(2g) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400067-01-Cert.pdf",
"dgst": "be4aef63b4508966",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-2400067-01-CR",
"cert_lab": [
""
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:cisco:nx-os:6.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.1\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.1\\(4\\):*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"16.1",
"6.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2016-1409",
"CVE-2016-1453",
"CVE-2016-1351",
"CVE-2013-6975",
"CVE-2014-3295",
"CVE-2012-4135",
"CVE-2017-6770",
"CVE-2013-6982"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "NSCIB-CC-2400067-01-CR",
"cert_link": "https://trustcb.com/download/?wpdmdl=5234",
"certification_date": "2025-05-16",
"developer": "Cisco Systems, Inc.",
"evaluation_facility": "Brightsight",
"level": "EAL2 + ALC_FLR.2",
"product": "Cisco Nexus 9000 Switch Series with ACI mode, APIC 6.1(2g) and NX-OS software-ACI 16.1(2g)",
"report_link": "https://trustcb.com/download/?wpdmdl=5235",
"status": "Issued",
"target_link": "https://trustcb.com/download/?wpdmdl=5236"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Cisco Systems, Inc.",
"manufacturer_web": "https://www.cisco.com",
"name": "Cisco Nexus 9000 Switch Series with ACI mode, APIC 6.1(2g) and NX-OS software-ACI 16.1(2g)",
"not_valid_after": "2030-05-16",
"not_valid_before": "2025-05-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "NSCIB-CC-2400067-01-Cert.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"NSCIB-2400067-01": 1,
"NSCIB-CC-2400067-01": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2,
"EAL2 augmented": 1,
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
},
"SGS": {
"SGS": 1,
"SGS Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-1": 2,
"ISO/IEC 18045": 4,
"ISO/IEC 18045:2008": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 1,
"Cisco Systems, Inc": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Valerie",
"/CreationDate": "D:20250611214234+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20250611214234+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "NSCIB Certificate",
"pdf_file_size_bytes": 171004,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "NSCIB-CC-2400067-01_CR.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-2400067-01-CR",
"cert_item": "Cisco Nexus 9000 Switch Series with ACI mode, APIC 6.1(2g) and NX-OS software-ACI 16.1(2g",
"cert_lab": " SGS Brightsight B.V.",
"developer": "Cisco Systems, Inc"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"NSCIB-2400067-01": 1,
"NSCIB-CC-2400067-01-CR": 17
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 2 augmented": 1,
"EAL2": 1,
"EAL2 augmented": 1,
"EAL2+": 2,
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"following proprietary or non-standard algorithms, protocols and implementations: \u003cnone\u003e, which are out of scope as there are no security claims relating to these. Page: 13/17 of report number": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 2,
"SSHv2": 3
},
"TLS": {
"TLS": {
"TLSv1.2": 2,
"TLSv1.3": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
},
"SGS": {
"SGS": 2,
"SGS Brightsight": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JIL": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 33,
"Cisco Systems, Inc": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "sjon",
"/CreationDate": "D:20250611213129+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20250611213129+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "Certification Report",
"pdf_file_size_bytes": 622813,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://nscib.nl/",
"http://www.commoncriteriaportal.org/",
"mailto:[email protected]",
"https://www.sogis.eu/",
"https://trustcb.com/common-criteria/nscib/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "NSCIB-CC-2400067-01-ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ASSUMPTION": 1,
"A.FIREWALL": 3,
"A.LOCATE": 2,
"A.TRUSTED_ADMIN": 3
},
"O": {
"O.ACCESS_CONTROL": 4,
"O.ACCESS_CONTROLL": 2,
"O.ADMIN": 6,
"O.AUDIT_GEN": 6,
"O.AUDIT_REVIEW": 4,
"O.DATA_FLOW_CONTROL": 7,
"O.DISPLAY_BANNER": 4,
"O.IDAUTH": 8,
"O.OBJECTIVE": 1,
"O.RESIDUAL_INFORMATION_CLE": 1,
"O.RESIDUAL_INFORMATION_CLEARING": 2,
"O.RESUDUAL_INFORMATION_CLEARING": 1,
"O.SELF_PROTECT": 7,
"O.TIME": 4,
"O.TSF_SELF_TEST": 5
},
"OE": {
"OE.ADMIN": 3,
"OE.CONNECTION": 3,
"OE.FIREWALL": 4,
"OE.LOCATE": 3,
"OE.OBJECTIVE": 1
},
"T": {
"T.ACCOUNTABILITY": 3,
"T.NET_TRAFFIC": 2,
"T.THREAT": 1,
"T.TSF_FAILURE": 3,
"T.UNAUTHORIZED_ACCESS": 2,
"T.USER_DATA_REUSE": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.2": 2,
"ADV_TDS.1": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.2": 2,
"ALC_CMS.2": 2,
"ALC_DEL.1": 1,
"ALC_FLR.2": 4
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_FUN.1": 2,
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2,
"EAL2 augmented": 1,
"EAL2+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 14,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 10,
"FAU_GEN.2.1": 1,
"FAU_SAR": 1,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG": 2,
"FAU_STG.1": 6,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 12,
"FDP_IFC.1.1": 1,
"FDP_IFF": 1,
"FDP_IFF.1": 9,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_RIP": 1,
"FDP_RIP.1": 1,
"FDP_RIP.2": 5,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_ATD.1": 9,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 1,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 1,
"FIA_UAU.7": 4,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 2,
"FIA_UID.2": 12,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.1": 9,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 11,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 1,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 13,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM": 1,
"FPT_STM.1": 10,
"FPT_STM.1.1": 1,
"FPT_TAB.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 7,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_SSL": 2,
"FTA_SSL.4": 5,
"FTA_SSL.4.1": 1,
"FTA_TAB": 2,
"FTA_TAB.1": 4,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_TRP": 1,
"FTP_TRP.1": 7,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 5,
"SSHv2": 11
},
"TLS": {
"TLS": {
"TLS": 1,
"TLSv1.2": 4,
"TLSv1.3": 4
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 70,
"Cisco Systems, Inc": 3
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Cisco GCT TME",
"/CreationDate": "D:20250422105101+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word LTSC",
"/ModDate": "D:20250422105101+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word LTSC",
"pdf_file_size_bytes": 1418998,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://software.cisco.com/",
"https://www.cisco.com/c/en/us/buy.html",
"https://www.cisco.com/c/en/us/support/switches/nexus-9000-series-switches/products-installation-guides-list.html",
"https://www.cisco.com/c/en/us/products/switches/nexus-9000-series-switches/sales-resources-listing.html",
"https://www.cisco.com/c/en/us/products/collateral/switches/nexus-9000-series-switches/datasheet-c78-736677.html#Productoverview",
"https://www.cisco.com/c/en/us/support/switches/nexus-9000-series-switches/products-installation-and-configuration-guides-list.html",
"https://www.cisco.com/",
"https://www.cisco.com/c/en/us/support/cloud-systems-management/application-policy-infrastructure-controller-apic/tsd-products-support-series-home.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 58
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400067-01_CR.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400067-01-ST.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "624696655fd6093d6fefa7dfed01418a0dd3ba485ce02b565b84449c8009dd3a",
"txt_hash": "c7298a1e3fcc52840533d8818cf6b23dfac019729cdbf2264869c424de11d2c1"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7e9872bb102e2e3b8cd0735b50308d14343327b824aab977e663ca6808f69d61",
"txt_hash": "11714d627df2ec3fda9524bf4b842df53a2f6c6cdb8d2f3845f54928315b56fa"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6dace84134d2fdcfb714fb870077478525242b50459eab7bd362dbc0ef3e5742",
"txt_hash": "5f1f184ff838e625cad441879267b5f2f5939a9092a530517aabe149e2aff714"
}
},
"status": "active"
}