Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Nokia 7-Series Service Router Operating System (SR OS) Family consisting of the:a. Nokia 7x50 Service Router Operating System (SR OS), v21.10.R1.b. Nokia Service Aggregation Router Operating System (SAR OS), v21.10.R1.c. Nokia Service Access Switch Operating System (SAS OS), v21.9.R1
CSEC2020023
Belkin Secure KM models F1DN102K-3, F1DN104K-3, and F1DN108K-3
CCEVS-VR-VID-10638-2016
name Nokia 7-Series Service Router Operating System (SR OS) Family consisting of the:a. Nokia 7x50 Service Router Operating System (SR OS), v21.10.R1.b. Nokia Service Aggregation Router Operating System (SAR OS), v21.10.R1.c. Nokia Service Access Switch Operating System (SAS OS), v21.9.R1 Belkin Secure KM models F1DN102K-3, F1DN104K-3, and F1DN108K-3
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme SE US
status active archived
not_valid_after 03.06.2027 24.03.2019
not_valid_before 03.06.2022 24.03.2016
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20CCRA%20Certifikat%20Nokia%207-series.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10638-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification-Report-Nokia_7_SROS-korr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10638-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SR%20OS_Security_Target_v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10638-st.pdf
manufacturer Nokia Canada Inc. Belkin International, Inc.
manufacturer_web https://www.nokia.com/ https://www.belkin.com
security_level EAL3+, ALC_FLR.1 {}
dgst 665ed016cd2fda37 b1d1ca9b5b0e3114
heuristics/cert_id CSEC2020023 CCEVS-VR-VID-10638-2016
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ADV_FSP.1, ALC_CMC.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1
heuristics/extracted_versions 21.10, 21.9 3
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 24.03.2016
  • evaluation_facility: DXC.technology
  • expiration_date: 24.03.2019
  • id: CCEVS-VR-VID10638
  • product: Belkin Secure KM models F1DN102K-3, F1DN104K-3, and F1DN108K-3
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10638
  • vendor: Belkin International, Inc.
heuristics/protection_profiles {} da2e45c9b3fbb700
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_pss_v3.0.pdf
pdf_data/cert_filename Signed CCRA Certifikat Nokia 7-series.pdf st_vid10638-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10638-2016: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL3: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
pdf_data/cert_keywords/eval_facility
  • Combitech:
    • Combitech AB: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 17065: 2
pdf_data/cert_metadata
  • /CreationDate: D:20220628090019+02'00'
  • /Creator: RICOH MP C4504ex
  • /ModDate: D:20220628092827+02'00'
  • /Producer: RICOH MP C4504ex
  • pdf_file_size_bytes: 560279
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20160325130231-04'00'
  • /ModDate: D:20160325130255-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 178105
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename Certification-Report-Nokia_7_SROS-korr.pdf st_vid10638-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10638-2016
    • cert_item: Belkin Secure KM Switches with Audio (Models F1DN10{2,4,8}K-3 Version 30303-00C4
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • SE:
    • CSEC2020023: 19
  • US:
    • CCEVS-VR-VID10638-2016: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL 3+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMINISTRATOR: 1
    • A.CONNECTIVITY: 1
    • A.EXT_AUTHORIZATION: 1
    • A.GENPURPOSE: 1
    • A.INTEROPERABILITY: 1
    • A.LOCATION: 1
    • A.PHYSICAL: 1
    • A.TIMESTAMP: 1
    • A.TRUSTED_COMM: 1
  • T:
    • T.AUDIT: 1
    • T.MEDIATE: 1
    • T.TSF_DATA: 1
    • T.UNATTENDED_SESSION: 1
    • T.UNAUTH_MGT_ACCESS: 1
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • A.NO_TEMPEST: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
  • O:
    • O.ANTI_TAMPERING: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_: 1
    • O.ANTI_TAMPERING_BACKUP_POWER: 1
    • O.ANTI_TAMPERING_INDICATION: 1
    • O.ANTI_TAMPERING_PERMANENTLY_: 1
    • O.AUTHORIZED_SWITCHING: 1
    • O.COMPUTER_INTERFACE_ISOLATION: 1
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_TO_AUDIO_ISOLATION: 1
    • O.CONTINUOUS_INDICATION: 1
    • O.DISABLE_UNAUTHORIZED_: 2
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 1
    • O.KEYBOARD_MOUSE_: 1
    • O.KEYBOARD_MOUSE_EMULATED: 1
    • O.NO_AMBIGUOUS_CONTROL: 1
    • O.NO_ANALOG_AUDIO_INPUT: 1
    • O.NO_CONNECTED_COMPUTER_: 1
    • O.NO_DOCKING_PROTOCOLS: 1
    • O.NO_OTHER_EXTERNAL_INTERFACES: 1
    • O.NO_TOE_ACCESS: 1
    • O.NO_USER_DATA_RETENTION: 1
    • O.PERIPHERAL_PORTS_ISOLATION: 1
    • O.PURGE_TOE_KB_DATA_WHILE_: 1
    • O.SELF_TEST: 1
    • O.SELF_TEST_FAIL_INDICATION: 1
    • O.SELF_TEST_FAIL_TOE_DISABLE: 1
    • O.TAMPER_EVIDENT_LABEL: 1
    • O.UNIDIRECTIONAL_AUDIO_OUT: 1
    • O.UNIDIRECTIONAL_VIDEO: 1
    • O.UNIDIRERCTIONAL_EDID: 1
    • O.USER_DATA_ISOLATION: 1
  • OE:
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_: 1
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_SWITCHING: 1
pdf_data/report_keywords/eval_facility
  • Combitech:
    • Combitech AB: 6
  • EWA:
    • EWA-Canada: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
    • SSHv1: 2
    • SSHv2: 2
  • VPN:
    • VPN: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_metadata
  • /Author: Ulf Noring
  • /CreationDate: D:20230117073426+01'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20230117073426+01'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: 20FMV7358-45:1
  • /Title: Certification Report - Nokia 7-Series Service Router Operating System (SR OS) Family
  • pdf_file_size_bytes: 486835
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename SR OS_Security_Target_v1.1.pdf st_vid10638-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL 3+: 7
    • EAL3: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 26
    • FDP_IFC.1.1: 3
    • FDP_IFF.1: 30
    • FDP_IFF.1.1: 6
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 7
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 9
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
    • FTA_TAB.1: 6
    • FTA_TAB.1.1: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 59
    • FDP_IFC.1.1: 2
    • FDP_IFF: 2
    • FDP_IFF.1: 61
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 9
    • FDP_RIP: 1
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 4
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 1
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA: 1
    • FMT_MSA.3: 12
    • FMT_SMF.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 14
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_CIN_EXT: 4
    • FTA_CIN_EXT.1: 11
    • FTA_CIN_EXT.1.1: 2
    • FTA_TAB.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMINISTRATOR: 3
    • A.CONNECTIVITY: 3
    • A.EXT_AUTHORIZATION: 3
    • A.GENPURPOSE: 3
    • A.INTEROPERABILITY: 3
    • A.LOCATION: 3
    • A.PHYSICAL: 3
    • A.TIMESTAMP: 3
    • A.TRUSTED_COMM: 2
  • O:
    • O.AUDIT: 10
    • O.MANAGE: 7
    • O.MEDIATE: 5
    • O.TOE_ACCESS: 7
  • OE:
    • OE.ADMINISTRATOR: 6
    • OE.CONNECTIVITY: 1
    • OE.CONSOLE: 2
    • OE.DEPLOYED_CONFIG: 2
    • OE.EXT_AUTHORIZATION: 3
    • OE.GENPURPOSE: 1
    • OE.INTEROPERABILITY: 3
    • OE.LOCATION: 1
    • OE.PHYSICAL: 3
    • OE.TIME: 2
    • OE.TRUSTED_COMM: 3
    • OE.USERS: 1
  • T:
    • T.AUDIT: 5
    • T.MEDIATE: 5
    • T.TSF_DATA: 5
    • T.UNATTENDED_SESSION: 5
    • T.UNAUTH_MGT_ACCESS: 5
  • A:
    • A.NO_SPECIAL_ANALOG_CAPABILITIE: 1
    • A.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • A.NO_TEMPEST: 3
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ANTI_TAMPERING: 8
    • O.ANTI_TAMPERING_BACKUP_FAIL_T: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TR: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGG: 2
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGE: 1
    • O.ANTI_TAMPERING_BACKUP_FAIL_TRIGGER: 2
    • O.ANTI_TAMPERING_BACKUP_POWER: 7
    • O.ANTI_TAMPERING_INDICATION: 7
    • O.ANTI_TAMPERING_PERMANENTLY_: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISA: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISAB: 1
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 3
    • O.AUTHORIZED_SWITCHING: 7
    • O.COMPUTER_INTERFACE_ISOLATION: 10
    • O.COMPUTER_INTERFACE_ISOLATION_: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TO: 1
    • O.COMPUTER_INTERFACE_ISOLATION_TOE: 2
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 2
    • O.COMPUTER_TO_AUDIO_ISOLATION: 7
    • O.CONTINUOUS_INDICATION: 7
    • O.DISABLE_UNAUTHORIZED_ENDPOIN: 2
    • O.DISABLE_UNAUTHORIZED_ENDPOINTS: 5
    • O.DISABLE_UNAUTHORIZED_PERIPHER: 2
    • O.DISABLE_UNAUTHORIZED_PERIPHERAL: 5
    • O.DISPLAYPORT_AUX_FILTERING: 1
    • O.KEYBOARD_AND_MOUSE_TIED: 7
    • O.KEYBOARD_MOUSE_EMULATED: 7
    • O.KEYBOARD_MOUSE_UNIDIRECTION: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONA: 1
    • O.KEYBOARD_MOUSE_UNIDIRECTIONAL: 5
    • O.NO_AMBIGUOUS_CONTROL: 7
    • O.NO_ANALOG_AUDIO_INPUT: 8
    • O.NO_CONNECTED_COMPUTER_CONT: 2
    • O.NO_CONNECTED_COMPUTER_CONTRO: 1
    • O.NO_CONNECTED_COMPUTER_CONTROL: 4
    • O.NO_DOCKING_PROTOCOLS: 7
    • O.NO_OTHER_EXTERNAL_INTERFACES: 10
    • O.NO_TOE_ACCESS: 8
    • O.NO_USER_DATA_RETENTION: 8
    • O.PERIPHERAL_PORTS_ISOLATION: 10
    • O.PURGE_TOE: 3
    • O.PURGE_TOE_KB_DATA_WHILE_SWI: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWIT: 1
    • O.PURGE_TOE_KB_DATA_WHILE_SWITCHI: 2
    • O.SELF_TEST: 8
    • O.SELF_TEST_FAIL_INDICATION: 7
    • O.SELF_TEST_FAIL_TOE_DISABLE: 8
    • O.TAMPER_EVIDENT_LABEL: 9
    • O.UNIDIRECTIONAL_AUDIO_OUT: 7
    • O.UNIDIRECTIONAL_VIDEO: 2
    • O.UNIDIRERCTIONAL_EDID: 2
    • O.USER_AUTHENTICATION_ADMIN: 2
    • O.USER_AUTHENTICATION_ISOLATION: 1
    • O.USER_AUTHENTICATION_RESET: 1
    • O.USER_DATA_ISOLATION: 7
  • OE:
    • OE.PHYSICAL: 4
    • OE.TRUSTED_ADMIN: 6
  • T:
    • T.AUDIO_REVERSED: 1
    • T.AUTHORIZED_BUT_UNT: 1
    • T.AUTHORIZED_BUT_UNTRUSTED_DEVICES: 1
    • T.DATA_LEAK: 3
    • T.FAILED: 2
    • T.LOGICAL_TAMPER: 3
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 2
    • T.REPLACEMENT: 3
    • T.RESIDUAL_LEAK: 3
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED_DEVIC: 1
    • T.UNAUTHORIZED_DEVICES: 2
    • T.UNINTENDED_SWITCHI: 1
    • T.UNINTENDED_SWITCHING: 1
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 2
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 31
    • SSHv1: 2
    • SSHv2: 1
  • VPN:
    • VPN: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 14
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • RFC:
    • RFC 1305: 3
    • RFC 1492: 3
    • RFC 2138: 2
    • RFC 2865: 3
    • RFC 2866: 3
    • RFC 3411: 2
    • RFC 3412: 2
    • RFC 3413: 2
    • RFC 3414: 2
    • RFC 3415: 2
    • RFC 3416: 2
    • RFC 3417: 2
    • RFC 3418: 3
    • RFC 4250: 2
    • RFC 4251: 2
    • RFC 4252: 2
    • RFC 4253: 2
    • RFC 4254: 2
    • RFC 5424: 4
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/st_metadata
  • /Author: EWA-Canada
  • /CreationDate: D:20220602004025+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220603100557+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: Alcate-Lucent Service Router (SR), Service Aggregation Router (SAR) and Service Access Switch (SAS) Family Software Security Target
  • pdf_file_size_bytes: 2208456
  • pdf_hyperlinks: mailto:~!@#$%^&*()_+|{}:
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 76
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different