Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Avaya VoIP PBX System based on the Communication Manager 5.1
BSI-DSZ-CC-0540-2009
Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running JUNOS 11.2S4
CCEVS-VR-VID-10402-2013
name Avaya VoIP PBX System based on the Communication Manager 5.1 Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running JUNOS 11.2S4
category Other Devices and Systems Detection Devices and Systems
scheme DE US
not_valid_after 01.09.2019 22.04.2015
not_valid_before 27.03.2009 22.04.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0540a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10402-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0540b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10402-st.pdf
manufacturer Avaya GmbH & Co. KG Juniper Networks, Inc.
manufacturer_web https://www.avaya.com/de/ https://www.juniper.net/
security_level ASE_SPD.1, ADV_FSP.2, ASE_OBJ.2, ASE_REQ.2, EAL1+ EAL4+, ALC_FLR.2
dgst 7ffe542d7171483d 32c0f398615e577f
heuristics/cert_id BSI-DSZ-CC-0540-2009 CCEVS-VR-VID-10402-2013
heuristics/cert_lab BSI US
heuristics/cpe_matches {} cpe:2.3:h:juniper:ln1000:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*
heuristics/extracted_sars ALC_LCD.2, ALC_CMC.1, ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ASE_ECD.1, APE_ECD.1, ASE_TSS.1, ASE_SPD.1, AVA_VAN.1, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, ATE_FUN.2, AGD_OPE.1, AGD_PRE.1, APE_REQ.2, ATE_IND.1, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, APE_INT.1, APE_SPD.1, ALC_CMS.1, APE_OBJ.2, ASE_CCL.1, ADV_TDS.6, ATE_COV.3, ADV_SPM.1 AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ALC_CMS.4, AVA_VAN.3, ATE_FUN.1, ALC_DEL.1, ATE_IND.2, ADV_FSP.4, ALC_LCD.1, AGD_OPE.1, ADV_ARC.1, ADV_TDS.3, ATE_DPT.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1
heuristics/extracted_versions 5.1 11.2
heuristics/scheme_data
  • category: Firewall, Router, Wireless Monitoring
  • certification_date: 22.04.2013
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 22.04.2015
  • id: CCEVS-VR-VID10402
  • product: Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running JUNOS 11.2S4
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10402
  • vendor: Juniper Networks, Inc.
pdf_data/report_filename 0540a.pdf st_vid10402-vr.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0540-2009
    • cert_item: Avaya VoIP PBX System based on the Communication Manager 5.1
    • cert_lab: BSI
    • developer: Avaya GmbH & Co. KG sponsored by Avaya Inc
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10402-2013
    • cert_item: Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running Junos 11.2 R2S4
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0540: 1
    • BSI-DSZ-CC-0540-2009: 16
  • US:
    • CCEVS-VR-VID10402-2013: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
    • EAL 1 augmented: 3
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 6
    • EAL1+: 2
    • EAL2: 3
    • EAL3: 4
    • EAL4: 4
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 5
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 2
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 5
    • ASE_REQ.1: 1
    • ASE_REQ.2: 5
    • ASE_SPD: 1
    • ASE_SPD.1: 5
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 2
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 2
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 5
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.NO_TOE_BYPASS: 1
    • A.PHYSICAL: 1
  • T:
    • T.ADDRESS_MASQUERADE: 1
    • T.ADMIN_ROGUE: 1
    • T.AUDIT_COMPROMISE: 1
    • T.CRYPTO_COMPROMISE: 1
    • T.EAVESDROP: 1
    • T.MALICIOUS_TSF_COMPROMISE: 1
    • T.MASQUERADE: 1
    • T.REPLAY: 1
    • T.RESIDUAL_DATA: 1
    • T.RESOURCE_EXHAUSTION: 1
    • T.SPOOFING: 1
    • T.UNATTENDED_SESSION: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_PEER: 1
    • T.UNIDENTIFIED_ACTIONS: 1
    • T.UNIDENTIFIED_INTRUSIONS: 1
    • T.UNKNOWN_STATE: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • IPsec:
    • IPsec: 2
  • SSH:
    • SSH: 6
  • TLS:
    • SSL:
      • SSL: 1
  • VPN:
    • VPN: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1.0, 2009-03-10, Evaluation Technical Report BSI-DSZ-CC-0540, CSC Deutschland Solutions GmbH, (confidential document) [8] Configuration list for the TOE, Version 1.0, 2009-03-09, Avaya VoIP PBX System Configuration: 1
    • Avaya GmbH & Co KG (confidential document) [9] Guidance CD “Communication Manager 5.0”, Publication Date: January 2008 [10] Guidance CD: 1
  • OutOfScope:
    • TOE but relevant for the operation. Also here, the network devices like switches and routers are out of scope. This holds also valid for the connection to the internet (the SIP trunk) and the required network: 1
    • may implement some security features like IEEE 802.1X network device authentication. They are out of scope. Their existence and their security features can be assumed. The protection zone “Server” contains: 1
    • out of scope: 2
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20090421135047+02'00'
  • /Creator: Writer
  • /Keywords: "Avaya VoIP PBX Systembased on the Communication Manager 5.1, Avaya GmbH & Co. KG, Avaya Inc., BSI-DSZ-CC-0540-2009"
  • /ModDate: D:20090504155601+02'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0540-2009
  • pdf_file_size_bytes: 856495
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /Author: SAIC
  • /CreationDate: D:20130502131855
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130502131855
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Validation Report
  • /Title: Juniper Networks
  • pdf_file_size_bytes: 338979
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename 0540b.pdf st_vid10402-st.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0540: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 1 augmented: 1
    • EAL1: 1
    • EAL2: 1
  • EAL:
    • EAL4: 2
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 4
    • ADV_FSP.2: 7
  • AGD:
    • AGD_OPE.1: 5
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 4
    • ASE_REQ.1: 2
    • ASE_REQ.2: 5
    • ASE_SPD.1: 3
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 13
    • ADV_FSP.1: 2
    • ADV_FSP.2: 2
    • ADV_FSP.4: 13
    • ADV_IMP.1: 10
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 18
  • AGD:
    • AGD_OPE.1: 13
    • AGD_PRE.1: 8
  • ALC:
    • ALC_CMC.4: 16
    • ALC_CMS.1: 1
    • ALC_CMS.4: 7
    • ALC_DEL.1: 6
    • ALC_DVS.1: 7
    • ALC_FLR.2: 16
    • ALC_LCD.1: 8
    • ALC_TAT.1: 9
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 6
    • ATE_DPT.1: 7
    • ATE_FUN.1: 12
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FDP:
    • FDP_ACC.1: 17
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.1: 6
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 6
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 47
    • FDP_IFC.1.1: 3
    • FDP_IFF.1: 27
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_ITC.2: 6
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_ITT.1: 1
    • FDP_ITT.2: 6
    • FDP_ITT.2.1: 1
    • FDP_ITT.2.2: 1
    • FDP_RIP.1: 1
    • FDP_RIP.2: 6
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 10
    • FIA_UAU.2.1: 2
    • FIA_UAU.3: 6
    • FIA_UAU.3.1: 1
    • FIA_UAU.3.2: 1
    • FIA_UID.1: 21
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 14
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 35
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 50
    • FMT_SMF.1.1: 6
    • FMT_SMR.1: 44
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_STM.1: 2
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FTP:
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 1
  • FAU:
    • FAU_ARP: 5
    • FAU_ARP.1: 13
    • FAU_ARP.1.1: 1
    • FAU_GEN: 14
    • FAU_GEN.1: 4
    • FAU_GEN.2: 1
    • FAU_SAA: 10
    • FAU_SAA.1: 2
    • FAU_SAR.1: 16
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 15
    • FAU_SAR.2.1: 2
    • FAU_SAR.3: 16
    • FAU_SAR.3.1: 2
    • FAU_SEL: 15
    • FAU_SEL.1: 2
    • FAU_STG: 30
    • FAU_STG.1: 2
    • FAU_STG.2: 1
    • FAU_STG.3: 6
    • FAU_STG.3.1: 1
    • FAU_UAU.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 6
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 28
    • FCS_COP.1.1: 4
  • FDP:
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 12
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 3
    • FDP_RIP.2: 6
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 6
    • FIA_AFL.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 15
    • FIA_ATD.1.1: 2
    • FIA_UAU: 5
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 1
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 76
    • FMT_MOF.1.1: 11
    • FMT_MSA: 14
    • FMT_MSA.1: 1
    • FMT_MSA.2: 5
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 29
    • FMT_MTD.1.1: 6
    • FMT_MTD.2: 21
    • FMT_MTD.2.1: 3
    • FMT_MTD.2.2: 3
    • FMT_REV: 5
    • FMT_REV.1: 9
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 5
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_RCV.2: 6
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 6
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TRP.1: 2
    • FPT_TST: 1
    • FPT_TST.1: 16
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
    • FPT_TST_EXP.1: 1
    • FPT_TST_EXP.1.1: 1
    • FPT_TST_EXP.1.2: 1
  • FRU:
    • FRU_RSA.1: 10
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_SSL: 11
    • FTA_SSL.1: 2
    • FTA_SSL.2: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL.3: 11
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE.1: 5
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 16
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 3
    • FTP_TRP.1: 14
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 3
    • FTP_TRP.1.3: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 4
    • A.AVAILABLE: 3
    • A.DEVICES: 3
    • A.ERRMONITORING: 3
    • A.LOCATION: 3
    • A.PHYSICAL: 4
    • A.SECDEV: 3
    • A.SECNET: 3
    • A.USER: 3
    • A.VPN: 3
  • O:
    • O.AUTHENTICATE: 1
    • O.CONFCLIENT: 1
    • O.DISCLOSE: 1
    • O.LOGEXPORT: 1
    • O.MEDIATION: 1
    • O.RESTRICTION: 1
    • O.SELFPROTECT: 1
  • OE:
    • OE.ADMIN: 14
    • OE.AVAILABLE: 2
    • OE.DEVICES: 3
    • OE.ERRMONITORING: 5
    • OE.LOCATION: 5
    • OE.LOGOUT: 3
    • OE.NETMONITOR: 7
    • OE.OS: 3
    • OE.PHYSICAL: 9
    • OE.SECDEV: 2
    • OE.SECNET: 4
    • OE.USER: 2
    • OE.VPN: 4
  • OSP:
    • OSP.NETMONITOR: 3
    • OSP.OS: 4
  • A:
    • A.NO_GENERAL_PURPOSE: 2
    • A.NO_TOE: 1
    • A.NO_TOE_BYPASS: 1
    • A.PHYSICAL: 2
  • O:
    • O.ADMIN_ROLE: 6
    • O.AUDIT_GENERATION: 5
    • O.AUDIT_PROTECTION: 3
    • O.AUDIT_REVIEW: 4
    • O.CORRECT_: 2
    • O.CORRECT_TSF_OPERATION: 2
    • O.CRYPTOGRAPHIC_FUNCTIONS: 4
    • O.CRYPTOGRAPHY_: 1
    • O.CRYPTOGRAPHY_VALIDATED: 3
    • O.DISPLAY_BANNER: 6
    • O.IDS_AUDIT_GENERATION: 3
    • O.IDS_AUDIT_REVIEW: 4
    • O.MAINT_MODE: 4
    • O.MANAGE: 4
    • O.MEDIATE_INFORMATION_FLOW: 6
    • O.PEER_AUTHENTICATION: 5
    • O.PROTECT_IN_TRANSIT: 4
    • O.PROTOCOL: 1
    • O.PROTOCOLS: 5
    • O.REPLAY_DETECTION: 5
    • O.RESIDUAL_INFORMATION: 11
    • O.RESOURCE_SHARING: 4
    • O.ROBUST_TOE_ACCESS: 9
    • O.TIME_STAMPS: 4
    • O.TRUSTED_PATH: 8
  • OE:
    • OE.CRYPTANALYTIC: 2
    • OE.MANAGEMENT: 1
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 2
  • T:
    • T.ADDRESS_MASQUERADE: 2
    • T.ADMIN_ERROR: 1
    • T.ADMIN_ROGUE: 3
    • T.AUDIT_COMPROMISE: 2
    • T.CRYPTO_COMPROMISE: 2
    • T.EAVESDROP: 2
    • T.MALICIOUS_TSF_COMPROMISE: 2
    • T.MASQUERADE: 2
    • T.REPLAY: 2
    • T.RESIDUAL_DATA: 2
    • T.RESOURCE_EXHAUSTION: 2
    • T.SPOOFING: 2
    • T.UNATTENDED_SESSION: 2
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_PEER: 2
    • T.UNIDENTIFIED_ACTIONS: 2
    • T.UNIDENTIFIED_INTRUSIONS: 2
    • T.UNKNOWN_STATE: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDEA: 3
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 13
    • DSA:
      • DSA: 7
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 11
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 14
  • IKE:
    • IKE: 28
    • IKEv1: 1
  • IPsec:
    • IPsec: 20
  • SSH:
    • SSH: 27
    • SSHv2: 6
  • TLS:
    • SSL:
      • SSL: 2
  • VPN:
    • VPN: 9
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 2
  • RNG:
    • RNG: 11
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CCM:
    • CCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-256: 1
    • P-256: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
  • FIPS:
    • FIPS 140-2: 15
    • FIPS 186-2: 1
    • FIPS PUB 140-2: 4
    • FIPS PUB 171: 1
    • FIPS PUB 180-2: 1
    • FIPS PUB 186-3: 1
  • NIST:
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 4
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 1
    • RFC 2409: 10
    • RFC 2451: 1
    • RFC 4251: 1
    • RFC 4252: 1
    • RFC 4253: 1
    • RFC 4271: 3
    • RFC 4301: 1
    • RFC 4302: 1
    • RFC 4303: 1
    • RFC 4305: 1
    • RFC2409: 1
  • X509:
    • X.509: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • TOE but relevant for the operation. Also here, the network devices like switches and routers are out of scope. This holds also valid for the connection to the internet (the SIP trunk) and the required network: 1
    • are held by us. In order to define the logical scope in detail, the following functions are out of scope of the TOE: Boarder protection of all external connections like SIP trunks or remote management: 1
    • may implement some security features like IEEE 802.1X network device authentication. They are out of scope. Their existence and their security features can be assumed. The protection zone “Server” contains: 1
    • out of scope: 3
  • OutOfScope:
    • SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Authentication services can be handled either internally (user selected passwords: 1
    • including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Authentication services can be handled either internally (user selected passwords) or through a: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Avaya GmbH & Co KG
  • /CreationDate: D:20090309164738Z
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: VoIP, CM 5.1, Communication Manager
  • /ModDate: D:20090407130547+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Common Criteria Evaluation
  • /Title: Avaya VoIP PBX System Security Target
  • pdf_file_size_bytes: 773349
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
  • /Author: Seth Ross, Jane Medefesser
  • /CreationDate: D:20130502131822
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130502131822
  • /Producer: Microsoft® Office Word 2007
  • /Subject: LN1000-V Mobile Secure Router and SRX650 Services Gateway
  • /Title: Security Target
  • pdf_file_size_bytes: 2108087
  • pdf_hyperlinks: http://www.juniper.net/, http://tools.ietf.org/html/rfc2409
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 156
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different