name |
Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230 |
Fortress Mesh Point ES210, ES520, ES820, ES2440 version 5.4.5 |
category |
Other Devices and Systems |
Access Control Devices and Systems |
scheme |
ES |
US |
status |
active |
archived |
not_valid_after |
21.09.2028 |
31.05.2018 |
not_valid_before |
21.06.2023 |
31.05.2016 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_Certificado.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10711-ci.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07-INF-4068.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10711-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10711-st.pdf |
manufacturer |
Huawei Technologies Co., Ltd. |
General Dynamics C4 Systems |
manufacturer_web |
https://www.huawei.com |
https://www.gdc4s.com |
security_level |
EAL4+, ALC_FLR.1 |
{} |
dgst |
0e8a25a9fbdc32c5 |
16028117e9ab40d9 |
heuristics/cert_id |
2019-7-INF-4068 |
CCEVS-VR-VID-10777-2016 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_INT.1, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, AGD_OPE.1, ADV_ARC.1, ADV_IMP.1, ASE_CCL.1, AVA_VAN.3, ASE_REQ.2 |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
heuristics/extracted_versions |
- |
5.4.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Others
- certification_date: 21.06.2023
- enhanced:
- category: Others
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1852
- certification_date: 21.06.2023
- description: The TOE is server service software that is deployed on CloudOS, which serves as a united network controller (UNC). UNC authenticates mobile subscribers onto the network system and tracks active and idle subscribers on the network system. UNC pages mobile subscribers when it is triggered by new data arriving for an idle subscriber at the assigned Serving GW (gateway). When a subscriber attaches to an eNodeB, the eNodeB select a UNC. UNC in turn selects the Serving GW and the PDN GW that will handle bearer packets of the subscriber. There are procedures to relocate a subscriber to a new UNC (and potentially a new Serving GW), when an active or idle subscriber moves to a new area outside of the current UNC control.
- evaluation_facility: DEKRA Testing and Certification S.A.U.
- level: EAL4 + ALC_FLR.1
- manufacturer: Huawei Technologies Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1853
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1851
- type: Product
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/995-huawei-unc-v001r001c20spc200-with-patch-v100r001c20sph230
|
- category: Wireless LAN
- certification_date: 31.05.2016
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date: 31.05.2018
- id: CCEVS-VR-VID10711
- product: Fortress Mesh Point ES210, ES520, ES820, ES2440 version 5.4.5
- scheme: US
- url: https://www.niap-ccevs.org/product/10711
- vendor: General Dynamics C4 Systems
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
85bd097f74f5a51e |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_WLAN_AS_V1.0.pdf |
pdf_data/cert_filename |
2019-07_Certificado.pdf |
st_vid10711-ci.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10711-2016: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL4: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 934591
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20160601135511-04'00'
- /ModDate: D:20160601135511-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 177479
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
2019-07-INF-4068.pdf |
st_vid10711-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10777-2016
- cert_item: General Dynamics Mission Systems Fortress Mesh Point ES210, ES520, ES820, ES2440 Security Target (Wireless LAN Capabilities
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10777-2016: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL4: 8
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR: 3
- ALC_FLR.1: 9
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FDP:
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.4: 1
- FIA_UID.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FTA:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.NO_TOE_BYPASS: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.RESOURCE_EXHAUSTION: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 20
- Huawei Technologies Co: 3
- Microsoft:
|
|
pdf_data/report_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 2
- RFC:
- RFC 2246: 1
- RFC 2818: 1
- RFC 2865: 1
- RFC 3164: 1
- RFC 5905: 1
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
2019-07_ST.pdf |
st_vid10711-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 4
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 4
- FAU_STG.3.1: 1
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SAE.1: 3
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 2
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_MCS: 10
- FTA_MCS.1.1: 2
- FTA_MCS.1.2: 2
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 7
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_SEL.1: 6
- FAU_SEL.1.1: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT.1: 7
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.3: 5
- FAU_STG_EXT.3.1: 1
- FAU_STG_EXT.4: 4
- FAU_STG_EXT.4.1: 1
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 2
- FCS_CKM.2: 12
- FCS_CKM.2.1: 2
- FCS_CKM_EXT.4: 9
- FCS_CKM_EXT.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 39
- FCS_COP.1.1: 5
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 11
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSH_EXT.1: 9
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 2
- FCS_SSH_EXT.1.8: 1
- FCS_SSH_EXT.1.9: 1
- FCS_TLS_EXT.1: 12
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT: 1
- FIA_PSK_EXT.1: 3
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 3
- FIA_PSK_EXT.1.3: 3
- FIA_PSK_EXT.1.4: 2
- FIA_UAU.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.5: 2
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.5: 5
- FIA_UAU_EXT.5.1: 1
- FIA_UAU_EXT.5.2: 1
- FIA_UIA.1: 1
- FIA_UIA_EXT.1: 11
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MTD: 2
- FMT_MTD.1: 11
- FMT_MTD.1.1: 3
- FMT_REV: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 2
- FMT_SMR.1.3: 2
- FPT:
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_RPL.1: 7
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 2
- FPT_TST_EXT.1.2: 1
- FPT_TUD.1: 1
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FRU:
- FRU_RSA.1: 5
- FRU_RSA.1.1: 1
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 5
- FTA_SSL.3.1: 2
- FTA_SSL.4: 7
- FTA_SSL.4.1: 2
- FTA_SSL_EXT.1: 6
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTA_TSE.1: 6
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 11
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECU: 1
- A.ADMIN_CREDENTIALS_SECURE: 2
- A.COMPONENTS_RUNNING: 3
- A.ENVIRONMENT_ACL: 3
- A.LIMITED_FUNCTIONALITY: 3
- A.NETWORK_SEGREGATION: 3
- A.PHYSICAL_PROTECTION: 3
- A.RESIDUAL_INFORMATION: 3
- A.TIME: 3
- A.TRUSTED_ADMINISTRATOR: 3
- O:
- O.AUDIT: 5
- O.COMMUNICA: 1
- O.COMMUNICATI: 1
- O.COMMUNICATION: 5
- O.IDAUTH: 8
- OE:
- OE.ADMIN_CRE: 1
- OE.ADMIN_CREDENTI: 2
- OE.ADMIN_CREDENTIALS_SEC: 2
- OE.COMPONEN: 1
- OE.COMPONENTS_RU: 1
- OE.COMPONENTS_RUNNING: 1
- OE.ENVIRONM: 1
- OE.ENVIRONMENT_AC: 1
- OE.ENVIRONMENT_ACL: 1
- OE.LIMITED_FU: 1
- OE.LIMITED_FUNCTIO: 1
- OE.LIMITED_FUNCTIONALITY: 1
- OE.NETWORK_: 1
- OE.NETWORK_SEGRE: 1
- OE.NETWORK_SEGREGATION: 1
- OE.NETWOR_SEGREG: 1
- OE.NETWOR_SEGREGATION: 1
- OE.PHYSICAL: 4
- OE.RESIDUAL_I: 1
- OE.RESIDUAL_INFOR: 3
- OE.RESIDUAL_INFORMATION: 3
- OE.TIME: 7
- OE.TRUSTED_A: 1
- OE.TRUSTED_ADMIN: 4
- OSP:
- T:
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ADMINISTR: 1
- T.UNTRUSTED_COMMUNICATI: 2
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.WEAK_AUTHENTICATION_E: 2
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 3
|
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.NO_TOE_BYPASS: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.AUTH_COMM: 2
- O.CRYPTOGRAPHIC_FUNCTIONS: 2
- O.DISPLAY_BANNER: 2
- O.FAIL_SECURE: 2
- O.PROTECTED_COMMUNICATION: 1
- O.PROTECTED_COMMUNICATIONS: 1
- O.PROTOCOLS: 2
- O.REPLAY_DETECTION: 2
- O.RESIDUAL_INFORMATION_CLE: 1
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.RESOURCE_AVAILABILITY: 2
- O.ROBUST_TOE_ACCESS: 2
- O.SESSION_LOCK: 2
- O.SYSTEM_MONITORING: 2
- O.TIME_STAMPS: 2
- O.TOE_ADMINISTRATION: 2
- O.TSF_SELF_TEST: 2
- O.VERIFIABLE_UPDATES: 2
- O.WIRELESS_CLIENT_ACCESS: 2
- OE:
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_TOE_BYPASS: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.RESOURCE_EXHAUSTION: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 23
- Huawei Technologies Co: 3
- Microsoft:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- AES:
- AES: 29
- AES-128: 1
- AES128: 1
- AES256: 1
- DES:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 11
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 13
- SHA-384: 9
- SHA-512: 3
- SHA160: 2
|
pdf_data/st_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 9
- Key exchange: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 37
- IKEv1: 27
- IKEv2: 21
- IPsec:
- SSH:
- SSH: 57
- SSHv1: 2
- SSHv2: 2
- TLS:
- SSL:
- TLS:
- TLS: 41
- TLS 1.0: 3
- TLS 1.2: 1
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 8
- P-384: 7
- curve P-384: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 186-3: 2
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 1
- FIPS PUB 186-3: 3
- FIPS PUB 197: 4
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38C: 2
- NIST SP 800-90: 1
- SP 800-90B: 1
- RFC:
- RFC 2246: 2
- RFC 224633: 1
- RFC 2406: 1
- RFC 2408: 2
- RFC 2409: 4
- RFC 2818: 3
- RFC 2865: 2
- RFC 3164: 3
- RFC 3394: 4
- RFC 3579: 1
- RFC 3602: 2
- RFC 4109: 6
- RFC 4251: 1
- RFC 4252: 2
- RFC 4253: 5
- RFC 4254: 1
- RFC 4301: 1
- RFC 4303: 2
- RFC 4306: 4
- RFC 4307: 4
- RFC 4868: 2
- RFC 4945: 5
- RFC 5080: 1
- RFC 5126: 1
- RFC 5216: 2
- RFC 5246: 1
- RFC 5280: 6
- RFC 5430: 2
- RFC 5905: 1
- RFC 5996: 1
- RFC2407: 1
- RFC2408: 1
- RFC2409: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: ST Author
- /Category: Proprietary and Confidential
- /Company: General Dynamics C4 Systems
- /CreationDate: D:20160527150512-07'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Keywords: Network Device, IPsec, WLAN Access System
- /ModDate: D:20160527150533-07'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20160527220445
- /Subject: Fortress Mesh Point ES210, ES520, ES820, ES2440
- /Title: FORTRESS Mesh Point ES210, ES520, ES820, ES2440 Security Target
- /Version: 1.4
- pdf_file_size_bytes: 930951
- pdf_hyperlinks: http://en.wikipedia.org/wiki/Media_Independent_Interface, http://en.wikipedia.org/wiki/PHY_%28chip%29#Ethernet_physical_transceiver, http://en.wikipedia.org/wiki/IEEE_802.3, http://en.wikipedia.org/wiki/Media_Access_Control, http://en.wikipedia.org/wiki/Ethernet, http://en.wikipedia.org/wiki/Fast_Ethernet, http://en.wikipedia.org/wiki/Bus_%28computer%29, http://en.wikipedia.org/wiki/100BASE-TX, http://en.wikipedia.org/wiki/Ethernet_physical_layer
- pdf_is_encrypted: False
- pdf_number_of_pages: 100
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |