name |
Brocade Communications Systems, Inc. FabricOS Version: 7.3.0a3 |
Huawei FusionSphere 6.5.RC1.T7 |
category |
Network and Network-Related Devices and Systems |
Operating Systems |
scheme |
DE |
ES |
status |
archived |
active |
not_valid_after |
08.12.2020 |
03.02.2026 |
not_valid_before |
08.12.2015 |
04.02.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-58%20CCRA.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0969a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-58%20INF-3355.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0969b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-58%20ST.pdf |
manufacturer |
Brocade Communications Systems, Inc. |
Huawei Technologies Co. Ltd. |
manufacturer_web |
https://www.brocade.com |
https://www.huawei.com |
security_level |
EAL2+, ALC_FLR.2 |
EAL2+, ALC_FLR.2 |
dgst |
0828342fbab6ea1c |
1978c3be06f0e1a7 |
heuristics/cert_id |
BSI-DSZ-CC-0969-2015 |
2018-58-INF-3355 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_LCD.2, ASE_INT.1, ALC_DVS.2, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, APE_ECD.1, ASE_SPD.1, ALC_DEL.1, ALC_TAT.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, APE_REQ.2, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, APE_CCL.1, ALC_FLR.2, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_DPT.4, APE_SPD.1, APE_INT.1, ALC_CMC.2, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
ASE_TSS.1, ADV_TDS.1, ASE_INT.1, ALC_DEL.1, ALC_CMC.2, ATE_IND.2, ATE_COV.1, AGD_OPE.1, ADV_ARC.1, AVA_VAN.2, ASE_CCL.1, ALC_FLR.2, ASE_REQ.2 |
heuristics/extracted_versions |
7.3.0 |
6.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Operating systems
- certification_date: 04.02.2021
- enhanced:
- category: Operating systems
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1084
- certification_date: 04.02.2021
- description: The Target of Evaluation (TOE) Huawei FusionSphere 6.5.RC1.T7 is a cloud operating system (OS) solution. The TOE provides the following key security features: VM Network Separation: The TOE supports virtual switches and virtual networks. VMs can be separated by creating different networks. Administrators can configure network isolation policies. VM isolation: The hypervisor isolates VMs running on the same physical server to prevent data theft and malicious attacks. VM users can only access resources (hardware and software resources and data) that belong to their own VMs. User and Privilege Management: The TOE supports role-based access control, used for the system maintenance personnel to access the virtualization platform and VMs. The table below shows list of roles defined in the TOE and the description of each role. TOE Access: The TOE offers functionality for terminating active sessions automatically after an inactivity period of time. Communications security: The TOE can be remotely accessed using a SSH connection, creating a trusted path between the TOE and the authorized users. Security audit: Operation logs record the security-relevant events performed by users on the system and the result of the operation and is used for tracing and auditing. Access control: Huawei FusionSphere software implements rolebased access control, limiting access to different management functions to different roles as defined in administrator-defined access control associations. Authentication: Operators who access the TOE locally or remotely in order to execute device management functions are identified by individual user names and authenticated by passwords.
- evaluation_facility: DEKRA Testing and Certification S.A.U.
- level: EAL2 + (ALC_FLR.2)
- manufacturer: Huawei Technologies Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1083
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1082
- type: Product
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei FusionSphere 6.5.RC1.T7
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/399-huawei-fusionsphere-6-5-rc1-t7
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
2018-58 CCRA.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
pdf_data/cert_keywords/eval_facility |
|
- DEKRA:
- DEKRA Testing and Certification: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 738373
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
0969a_pdf.pdf |
2018-58 INF-3355.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 extended EAL 2 augmented by ALC_FLR.2 SOGIS Recognition Agreement
- cc_version: Product specific Security Target Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0969-2015
- cert_item: Brocade Communications Systems, Inc. FabricOS Version: 7.3.0a3
- cert_lab: BSI
- developer: Brocade Communications Systems, Inc
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 7
- EAL 2: 8
- EAL 2 augmented: 3
- EAL 3: 4
- EAL 4: 6
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 9
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 5
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 2
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 4
- ALC_FLR.2: 6
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.2: 1
- FCS_CKM.4: 1
- FCS_COP.1: 3
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 5
- FIA_SOS.1: 1
- FIA_UAU.2: 1
- FIA_UAU.5: 2
- FIA_UID.2: 2
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 3
- FTA:
- FTA_MCS.1: 2
- FTA_TSE.1: 1
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_IFC: 2
- FDP_IFF: 2
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_UAU.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_SMR.1: 1
- FTA:
- FTP:
|
pdf_data/report_keywords/cc_claims |
- OE:
- OE.AUDIT: 2
- OE.AUTH_SVR: 2
- OE.CONFIG: 2
- OE.HARDWARE: 2
- OE.MGMT_NET: 3
- OE.NETWORK: 2
- OE.PHYCAL: 2
|
|
pdf_data/report_keywords/vendor |
|
- Huawei:
- Huawei: 21
- Huawei Technologies Co: 3
|
pdf_data/report_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 3
|
- DEKRA:
- DEKRA Testing and Certification: 5
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 3
- SHA-384: 1
- SHA-512: 1
- SHA256: 1
- SHA512: 5
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 11
- TLS v1.2: 6
- TLSv1.2: 1
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 20: 2
- AIS 31: 2
- AIS 32: 1
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- PKCS:
- RFC:
- RFC 2865: 1
- RFC 4511: 1
- RFC2104: 4
- RFC3526: 1
- RFC4252: 2
- RFC4253: 4
- RFC4432: 1
- RFC5246: 6
- RFC6668: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 19, 2015, Evaluation Technical Report (ETR) Summary, SRC Security Research & Consulting GmbH (confidential document) [8] Configuration list for the TOE, 16, October 21, 2015, Brocade Configuration Management Plan: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20151210094518+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Brocade Communications Systems, Inc. FabricOS Version 7.3.0a3"
- /ModDate: D:20151210095324+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Brocade Communications Systems, Inc. FabricOS Version 7.3.0a3
- /Title: Certification Report BSI-DSZ-CC-0969-2015
- pdf_file_size_bytes: 1433185
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, http://www.brocade.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
|
pdf_data/st_filename |
0969b_pdf.pdf |
2018-58 ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 4
- EAL 2 augmented: 4
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 14
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 19
- ADV_TDS: 1
- ADV_TDS.1: 18
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 16
- AGD_PRE: 1
- AGD_PRE.1: 12
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 10
- ALC_CMS: 1
- ALC_CMS.2: 7
- ALC_DEL: 1
- ALC_DEL.1: 7
- ALC_FLR: 1
- ALC_FLR.2: 21
- ATE:
- ATE_COV: 1
- ATE_COV.1: 9
- ATE_FUN: 1
- ATE_FUN.1: 14
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 7
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM: 6
- FCS_CKM.1: 28
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP.1: 35
- FCS_RNG: 5
- FCS_RNG.1: 10
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 3
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 16
- FIA_ATD.1.1: 1
- FIA_SOS: 3
- FIA_SOS.1: 4
- FIA_SOS.1.1: 1
- FIA_UAU: 6
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 3
- FIA_UID.1: 2
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 6
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 24
- FMT_SMF: 3
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_MCS: 3
- FTA_MCS.1: 4
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_TSE: 3
- FTA_TSE.1: 4
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 3
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_SAR.1: 6
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_STG.1: 6
- FAU_STG.1.2: 1
- FAU_STG.3: 4
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 8
- FDP_ACF.1: 6
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 12
- FDP_IFC.1: 3
- FDP_IFC.1.1: 2
- FDP_IFF: 10
- FDP_IFF.1: 2
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_RIP.1: 5
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_SOS.1: 4
- FIA_UAU.2: 5
- FIA_UID.1: 2
- FIA_UID.2: 6
- FMT:
- FMT_MOF.1: 5
- FMT_MSA.1: 7
- FMT_MSA.3: 14
- FMT_MSA.3.2: 1
- FMT_SMF.1: 9
- FMT_SMR.1: 9
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTP:
- FTP_TRP.1: 5
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUDIT: 3
- A.AUTH_SVR: 2
- A.HARDWARE: 4
- A.LOCATE: 3
- A.MGMT_NET: 3
- A.NETWORK: 2
- A.NO_EVIL: 2
- O:
- O.ACCESS: 6
- O.ADMIN_ROLE: 4
- O.AUDIT_GENERATION: 6
- O.MANAGE: 4
- O.PROTECTED_COMM: 6
- O.TOE_PROTECTION: 4
- O.USER_AUTHENTICATION: 6
- O.USER_IDENTIFICATION: 4
- OE:
- OE.AUDIT: 2
- OE.AUTH_SVR: 3
- OE.CONFIG: 2
- OE.HARDWARE: 3
- OE.MGMT_NET: 2
- OE.NETWORK: 2
- OE.PHYCAL: 2
- T:
- T.ACCOUNTABILITY: 3
- T.ADMIN_ERROR: 2
- T.MASQUERADE: 3
- T.TSF_COMPROMISE: 2
- T.UNAUTH_ACCESS: 3
|
- A:
- A.ADMIN_NOEVIL: 1
- A.ADMIN_NO_EVIL: 2
- A.OS_TRUSTED: 2
- A.PHY_PROPECT: 1
- A.PHY_PROTECT: 2
- A.SEP_PHY_NETWORK: 2
- A.TIME_SRC: 2
- O:
- OE:
- OE.OS_TRUSTED: 2
- OE.PHY_PROTECTION: 2
- OE.SEP_PHY_NETWORK: 2
- OE.TIME_SRC: 2
- OE.TRUST_WORTHY_USER: 2
- T:
- T.HOST_BYPASS: 3
- T.NOAUTH: 3
- T.NOIDENTIFY: 2
- T.VM_BYPASS: 2
- T.VNETWORK_BYPASS: 2
|
pdf_data/st_keywords/vendor |
|
- Huawei:
- Huawei: 16
- Huawei Technologies Co: 51
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 9
- HMAC-SHA-256: 3
- HMAC-SHA-512: 5
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 3
- SHA-384: 1
- SHA-512: 1
- SHA256: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 52
- TLS 1.2: 1
- TLS v1.2: 6
- TLSv1.2: 14
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-2: 3
- FIPS 180-4: 1
- FIPS 186-3: 1
- FIPS 197: 3
- FIPS 198-1: 3
- FIPS PUB 186-3: 2
- FIPS180-4: 5
- NIST:
- PKCS:
- RFC:
- RFC 4253: 1
- RFC 5246: 1
- RFC2104: 4
- RFC3526: 1
- RFC4252: 2
- RFC4253: 8
- RFC4432: 1
- RFC5246: 6
- RFC6668: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Gossamer Laboratories
- /CreationDate: D:20151022183611+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20151027090226+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target
- /Title: Brocade Communications Systems, Inc. FabricOS Version 7.3.0a3 running on Brocade Directors and Switches Security Target
- pdf_file_size_bytes: 1591163
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |