This page was not yet optimized for use on mobile devices.
Extreme Networks ExtremeXOS Network Operating System v12.3.6.2
CSV information ?
Status | archived |
---|---|
Valid from | 20.03.2012 |
Valid until | 15.05.2017 |
Scheme | 🇨🇦 CA |
Manufacturer | Extreme Networks, Inc. |
Category | Operating Systems |
Security level | ALC_FLR.2, EAL3+ |
Maintenance updates | Extreme Networks, Inc. ExtremeXOS Network Operating System v15.1.2 (08.08.2012) Certification report |
Heuristics summary ?
Certificate ID: 383-4-146
Certificate ?
Certification report ?
Extracted keywords
Security level
EAL 3+, EAL 3, EAL3+, EAL 3 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2Certificates
383-4-146-CRStandards
ISO/IEC 17025:2005File metadata
Title | Microsoft Word - 383-4-146 CR v1.0.doc |
---|---|
Author | rbharland |
Creation date | D:20120329141644-04'00' |
Modification date | D:20120329141644-04'00' |
Pages | 13 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 9.0.0 (Windows) |
Frontpage
Certificate ID | 383-4-146-CR |
---|---|
Certification lab | CANADA |
Security target ?
Extracted keywords
Schemes
MACProtocols
SSH, SSL, TLSSecurity level
EAL3+, EAL 3Claims
O.ACCESS, O.ACCOUNT, O.ADMIN, O.AUDIT, O.IDAUTH, O.MEDIATE, O.PROTECT, T.MEDIATE, T.NOAUDIT, T.NOMGMT, T.PRIV, A.AUDREV, A.FLOW, A.GENPUR, A.LOCATE, A.NOEVIL, A.EXCLUSIVE, OE.IDAUTH, OE.PROTECT, OE.TIME, OE.SYSLOG, OE.AUDREV, OE.FLOW, OE.GENPUR, OE.MANAGE, OE.PHYS, OE.ADMINSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FDP_IFC.1, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ACC.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_STM.1.1, FPT_STM, FTA_TAB.1, FTA_TAB.1.1File metadata
Title | Extreme Networks EXOS v12.3.6.2 EAL3+ ST |
---|---|
Author | Corsec Security, Inc. |
Creation date | D:20120312222944-04'00' |
Modification date | D:20120312222944-04'00' |
Pages | 46 |
Creator | PDFCreator Version 1.2.0 |
Producer | GPL Ghostscript 9.0 |
Heuristics ?
Certificate ID: 383-4-146
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ATE_DPT.1, ALC_CMS.3, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_ARC.1, ALC_CMC.3, ASE_SPD.1, ASE_REQ.2, ATE_COV.2, AGD_OPE.1, ALC_DVS.1, ALC_FLR.2, ADV_TDS.2, ASE_ECD.1, AVA_VAN.2, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2, ADV_FSP.3References ?
No references are available for this certificate.
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6e0eb85842d4d68ac8547a83db28de0af3df88eecca1a6802046d92b22737e26', 'txt_hash': '0ad50a4ca34f5efd36a54577d7cbb40b664e49ecf24eb17d3e2d623d06148608'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0692a7ce485383cd2a9c6547b30b5a08f7a1d1149a3b172a6d9b00942be898bb', 'txt_hash': 'a242ff1ee6ed6b7c23298a9378c0e7f04b5b9f5d7312a9ebc18b9f2a27c1017b'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 45921, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 13, '/Author': 'rbharland', '/CreationDate': "D:20120329141644-04'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20120329141644-04'00'", '/Producer': 'Acrobat Distiller 9.0.0 (Windows)', '/Title': 'Microsoft Word - 383-4-146 CR v1.0.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 3457366, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 46, '/Producer': 'GPL Ghostscript 9.0', '/CreationDate': "D:20120312222944-04'00'", '/ModDate': "D:20120312222944-04'00'", '/Title': 'Extreme Networks EXOS v12.3.6.2 EAL3+ ST', '/Creator': 'PDFCreator Version 1.2.0', '/Author': 'Corsec Security, Inc.', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'CA': {'cert_id': '383-4-146-CR', 'cert_lab': 'CANADA'}}
. - The report_keywords property was set to
{'cc_cert_id': {'CA': {'383-4-146-CR': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3+': 2, 'EAL 3': 4, 'EAL3+': 1, 'EAL 3 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025:2005': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3+': 4, 'EAL 3': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 12, 'FAU_SAR.1': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FDP': {'FDP_IFC.1': 10, 'FDP_IFF.1': 8, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ACC.1': 2}, 'FIA': {'FIA_AFL.1': 9, 'FIA_ATD.1': 9, 'FIA_SOS.1': 9, 'FIA_UAU.1': 13, 'FIA_UID.1': 15, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MSA.1': 11, 'FMT_MSA.3': 9, 'FMT_MTD.1': 10, 'FMT_SMF.1': 9, 'FMT_SMR.1': 15, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 9, 'FPT_STM.1.1': 1, 'FPT_STM': 2}, 'FTA': {'FTA_TAB.1': 7, 'FTA_TAB.1.1': 1}}, 'cc_claims': {'O': {'O.ACCESS': 4, 'O.ACCOUNT': 4, 'O.ADMIN': 4, 'O.AUDIT': 4, 'O.IDAUTH': 4, 'O.MEDIATE': 4, 'O.PROTECT': 4}, 'T': {'T.MEDIATE': 2, 'T.NOAUDIT': 2, 'T.NOMGMT': 2, 'T.PRIV': 2}, 'A': {'A.AUDREV': 2, 'A.FLOW': 2, 'A.GENPUR': 2, 'A.LOCATE': 2, 'A.NOEVIL': 2, 'A.EXCLUSIVE': 2}, 'OE': {'OE.IDAUTH': 3, 'OE.PROTECT': 3, 'OE.TIME': 3, 'OE.SYSLOG': 2, 'OE.AUDREV': 5, 'OE.FLOW': 3, 'OE.GENPUR': 3, 'OE.MANAGE': 3, 'OE.PHYS': 3, 'OE.ADMIN': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 5}}, 'crypto_protocol': {'SSH': {'SSH': 3}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
383-4-146 CR v1.0e.pdf
. - The st_filename property was set to
383-4-146 ST v0.9.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['CANADA']
. - The cert_id property was set to
383-4-146
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-146%20CR%20v1.0e.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-146%20ST%20v0.9.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Extreme Networks ExtremeXOS Network Operating System v12.3.6.2 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": null,
"dgst": "be9b80b67d6b6a88",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "383-4-146",
"cert_lab": [
"CANADA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"12.3.6.2"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2012-08-08",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-7-78%20MR%20v0.1e.pdf",
"maintenance_st_link": null,
"maintenance_title": "Extreme Networks, Inc. ExtremeXOS Network Operating System v15.1.2"
}
]
},
"manufacturer": "Extreme Networks, Inc.",
"manufacturer_web": "https://www.extremenetworks.com/",
"name": "Extreme Networks ExtremeXOS Network Operating System v12.3.6.2",
"not_valid_after": "2017-05-15",
"not_valid_before": "2012-03-20",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "383-4-146 CR v1.0e.pdf",
"report_frontpage": {
"CA": {
"cert_id": "383-4-146-CR",
"cert_lab": "CANADA"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"383-4-146-CR": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 4,
"EAL 3 augmented": 2,
"EAL 3+": 2,
"EAL3+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 17025:2005": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "rbharland",
"/CreationDate": "D:20120329141644-04\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20120329141644-04\u002700\u0027",
"/Producer": "Acrobat Distiller 9.0.0 (Windows)",
"/Title": "Microsoft Word - 383-4-146 CR v1.0.doc",
"pdf_file_size_bytes": 45921,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "383-4-146 ST v0.9.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AUDREV": 2,
"A.EXCLUSIVE": 2,
"A.FLOW": 2,
"A.GENPUR": 2,
"A.LOCATE": 2,
"A.NOEVIL": 2
},
"O": {
"O.ACCESS": 4,
"O.ACCOUNT": 4,
"O.ADMIN": 4,
"O.AUDIT": 4,
"O.IDAUTH": 4,
"O.MEDIATE": 4,
"O.PROTECT": 4
},
"OE": {
"OE.ADMIN": 3,
"OE.AUDREV": 5,
"OE.FLOW": 3,
"OE.GENPUR": 3,
"OE.IDAUTH": 3,
"OE.MANAGE": 3,
"OE.PHYS": 3,
"OE.PROTECT": 3,
"OE.SYSLOG": 2,
"OE.TIME": 3
},
"T": {
"T.MEDIATE": 2,
"T.NOAUDIT": 2,
"T.NOMGMT": 2,
"T.PRIV": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.2": 4,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 1,
"EAL3+": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 12,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1
},
"FDP": {
"FDP_ACC.1": 2,
"FDP_IFC.1": 10,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 8,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1
},
"FIA": {
"FIA_AFL.1": 9,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 9,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 9,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 13,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 15,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MSA.1": 11,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 9,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 10,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 15,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM": 2,
"FPT_STM.1": 9,
"FPT_STM.1.1": 1
},
"FTA": {
"FTA_TAB.1": 7,
"FTA_TAB.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 3
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 5
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Corsec Security, Inc.",
"/CreationDate": "D:20120312222944-04\u002700\u0027",
"/Creator": "PDFCreator Version 1.2.0",
"/Keywords": "",
"/ModDate": "D:20120312222944-04\u002700\u0027",
"/Producer": "GPL Ghostscript 9.0",
"/Subject": "",
"/Title": "Extreme Networks EXOS v12.3.6.2 EAL3+ ST",
"pdf_file_size_bytes": 3457366,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-146%20CR%20v1.0e.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-146%20ST%20v0.9.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6e0eb85842d4d68ac8547a83db28de0af3df88eecca1a6802046d92b22737e26",
"txt_hash": "0ad50a4ca34f5efd36a54577d7cbb40b664e49ecf24eb17d3e2d623d06148608"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0692a7ce485383cd2a9c6547b30b5a08f7a1d1149a3b172a6d9b00942be898bb",
"txt_hash": "a242ff1ee6ed6b7c23298a9378c0e7f04b5b9f5d7312a9ebc18b9f2a27c1017b"
}
},
"status": "archived"
}