name |
Avaya VoIP PBX System based on the Communication Manager 5.1 |
Logiciel Mistral IPversion 2.0.84 |
category |
Other Devices and Systems |
Boundary Protection Devices and Systems |
scheme |
DE |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
22.12.2019 |
not_valid_before |
27.03.2009 |
22.12.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0540a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_91.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0540b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC-2014-91_Cible-Lite.pdf |
manufacturer |
Avaya GmbH & Co. KG |
Thales Communications & Security |
manufacturer_web |
https://www.avaya.com/de/ |
https://www.thalescommuninc.com |
security_level |
ASE_SPD.1, ADV_FSP.2, ASE_OBJ.2, ASE_REQ.2, EAL1+ |
EAL3+, AVA_VAN.3, ALC_FLR.3 |
dgst |
7ffe542d7171483d |
b2414d8a803f52fb |
heuristics/cert_id |
BSI-DSZ-CC-0540-2009 |
ANSSI-CC-2014/91 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_LCD.2, ALC_CMC.1, ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ASE_ECD.1, APE_ECD.1, ASE_TSS.1, ASE_SPD.1, AVA_VAN.1, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, ATE_FUN.2, AGD_OPE.1, AGD_PRE.1, APE_REQ.2, ATE_IND.1, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, APE_INT.1, APE_SPD.1, ALC_CMS.1, APE_OBJ.2, ASE_CCL.1, ADV_TDS.6, ATE_COV.3, ADV_SPM.1 |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ASE_CCL.1 |
heuristics/extracted_versions |
5.1 |
2.0.84 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0540a.pdf |
ANSSI-CC-2014_91.pdf |
pdf_data/report_frontpage |
- FR:
- DE:
- cert_id: BSI-DSZ-CC-0540-2009
- cert_item: Avaya VoIP PBX System based on the Communication Manager 5.1
- cert_lab: BSI
- developer: Avaya GmbH & Co. KG sponsored by Avaya Inc
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0540: 1
- BSI-DSZ-CC-0540-2009: 16
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 5
- EAL 1 augmented: 3
- EAL 4: 1
- EAL 7: 1
- EAL1: 6
- EAL1+: 2
- EAL2: 3
- EAL3: 4
- EAL4: 4
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 1: 1
- EAL 3: 3
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 5
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 2
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 5
- ASE_REQ.1: 1
- ASE_REQ.2: 5
- ASE_SPD: 1
- ASE_SPD.1: 5
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 2
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 2
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 1.0, 2009-03-10, Evaluation Technical Report BSI-DSZ-CC-0540, CSC Deutschland Solutions GmbH, (confidential document) [8] Configuration list for the TOE, Version 1.0, 2009-03-09, Avaya VoIP PBX System Configuration: 1
- Avaya GmbH & Co KG (confidential document) [9] Guidance CD “Communication Manager 5.0”, Publication Date: January 2008 [10] Guidance CD: 1
- OutOfScope:
- TOE but relevant for the operation. Also here, the network devices like switches and routers are out of scope. This holds also valid for the connection to the internet (the SIP trunk) and the required network: 1
- may implement some security features like IEEE 802.1X network device authentication. They are out of scope. Their existence and their security features can be assumed. The protection zone “Server” contains: 1
- out of scope: 2
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20090421135047+02'00'
- /Creator: Writer
- /Keywords: "Avaya VoIP PBX Systembased on the Communication Manager 5.1, Avaya GmbH & Co. KG, Avaya Inc., BSI-DSZ-CC-0540-2009"
- /ModDate: D:20090504155601+02'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0540-2009
- pdf_file_size_bytes: 856495
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2014_91
- pdf_file_size_bytes: 790624
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
0540b.pdf |
CC-2014-91_Cible-Lite.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 1 augmented: 1
- EAL1: 1
- EAL2: 1
|
- EAL:
- EAL3: 4
- EAL3 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_FSP.1: 4
- ADV_FSP.2: 7
- AGD:
- AGD_OPE.1: 5
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 4
- ASE_REQ.1: 2
- ASE_REQ.2: 5
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.3: 8
- ADV_FSP.4: 3
- ADV_IMP.1: 3
- ADV_TDS.1: 2
- ADV_TDS.2: 2
- ADV_TDS.3: 3
- AGD:
- AGD_OPE.1: 5
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.1: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_FLR.3: 7
- ALC_LCD.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 4
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 1
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 5
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FDP:
- FDP_ACC.1: 17
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC.1: 6
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 6
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 47
- FDP_IFC.1.1: 3
- FDP_IFF.1: 27
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_ITC.2: 6
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_ITT.1: 1
- FDP_ITT.2: 6
- FDP_ITT.2.1: 1
- FDP_ITT.2.2: 1
- FDP_RIP.1: 1
- FDP_RIP.2: 6
- FDP_RIP.2.1: 1
- FIA:
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 10
- FIA_UAU.2.1: 2
- FIA_UAU.3: 6
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UID.1: 21
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 14
- FIA_UID.2.1: 2
- FMT:
- FMT_MSA.1: 28
- FMT_MSA.1.1: 3
- FMT_MSA.3: 35
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 4
- FMT_MTD.1: 15
- FMT_MTD.1.1: 3
- FMT_SMF.1: 50
- FMT_SMF.1.1: 6
- FMT_SMR.1: 44
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_STM.1: 2
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FTP:
- FTP_ITC.1: 14
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 2
- FTP_TRP.1: 1
|
- FAU:
- FAU_GEN: 9
- FAU_GEN.1: 15
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_GEN_EXT.3: 12
- FAU_GEN_EXT.3.1: 2
- FAU_SEG.1: 2
- FAU_STG.1: 1
- FAU_STG.3: 1
- FAU_STG_EXT.1: 15
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.3: 12
- FAU_STG_EXT.3.1: 2
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 26
- FCS_CKM.3: 1
- FCS_CKM.4: 16
- FCS_CKM_EXT: 31
- FCS_CKM_EXT.4: 13
- FCS_CKM_EXT.4.1: 1
- FCS_CKM_EXT.5: 17
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.5.3: 1
- FCS_COP: 86
- FCS_COP.1: 17
- FCS_IPS_EXT: 4
- FCS_IPS_EXT.1: 20
- FCS_IPS_EXT.1.1: 2
- FCS_IPS_EXT.1.2: 2
- FCS_IPS_EXT.1.3: 2
- FCS_IPS_EXT.1.4: 2
- FCS_IPS_EXT.1.5: 2
- FCS_IPS_EXT.1.6: 2
- FCS_IPS_EXT.1.7: 2
- FCS_IPS_EXT.1.8: 3
- FCS_RBG_EXT: 5
- FCS_RBG_EXT.1: 16
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FDP:
- FDP_ACC.1: 7
- FDP_ETC: 7
- FDP_ETC.2: 4
- FDP_IFC: 31
- FDP_IFC.1: 13
- FDP_IFF: 29
- FDP_IFF.1: 21
- FDP_ITC: 21
- FDP_ITC.1: 28
- FDP_ITC.2: 36
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FDP_UCT: 12
- FDP_UCT.1: 2
- FDP_UIT: 16
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 7
- FIA_AFL.1: 2
- FIA_AFL.1.1: 1
- FIA_PMG_EXT: 9
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_UAU: 13
- FIA_UAU.1: 4
- FIA_UAU.6: 1
- FIA_UAU.7: 1
- FIA_UAU_EXT: 5
- FIA_UAU_EXT.2: 9
- FIA_UAU_EXT.2.1: 1
- FIA_UIA: 1
- FIA_UIA_EXT: 15
- FIA_UIA_EXT.1: 7
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID: 8
- FIA_UID.1: 4
- FIA_UID.2: 1
- FMT:
- FMT_MDT: 1
- FMT_MOF: 4
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 20
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 43
- FMT_MTD.1: 10
- FMT_SKP_EXT.1: 1
- FMT_SMF.1: 29
- FMT_SMF.1.1: 1
- FMT_SMR: 21
- FMT_SMR.1: 16
- FPT:
- FPT_APW_EXT: 4
- FPT_APW_EXT.1: 9
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_SDP_EXT: 3
- FPT_SDP_EXT.1: 5
- FPT_SDP_EXT.1.1: 1
- FPT_SDP_EXT.2: 9
- FPT_SDP_EXT.2.1: 2
- FPT_SDP_EXT.2.2: 2
- FPT_SIE_EXT: 8
- FPT_SIE_EXT.1: 6
- FPT_SIE_EXT.1.1: 1
- FPT_SIE_EXT.2: 4
- FPT_SIE_EXT.2.1: 1
- FPT_SKP_EXT: 4
- FPT_SKP_EXT.1: 8
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 14
- FPT_STM.1.1: 1
- FPT_TDC: 6
- FPT_TDC.1: 4
- FPT_TST.1: 4
- FPT_TST.1.1: 1
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FPT_TUD_EXT: 19
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 5
- FTA_SSL.1: 2
- FTA_SSL.4: 1
- FTA_SSL_EXT: 5
- FTA_SSL_EXT.1: 9
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 6
- FTA_TAB.1: 5
- FTP:
- FTP_ITC: 12
- FTP_ITC.1: 11
- FTP_TRP.1: 6
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 4
- A.AVAILABLE: 3
- A.DEVICES: 3
- A.ERRMONITORING: 3
- A.LOCATION: 3
- A.PHYSICAL: 4
- A.SECDEV: 3
- A.SECNET: 3
- A.USER: 3
- A.VPN: 3
- O:
- O.AUTHENTICATE: 1
- O.CONFCLIENT: 1
- O.DISCLOSE: 1
- O.LOGEXPORT: 1
- O.MEDIATION: 1
- O.RESTRICTION: 1
- O.SELFPROTECT: 1
- OE:
- OE.ADMIN: 14
- OE.AVAILABLE: 2
- OE.DEVICES: 3
- OE.ERRMONITORING: 5
- OE.LOCATION: 5
- OE.LOGOUT: 3
- OE.NETMONITOR: 7
- OE.OS: 3
- OE.PHYSICAL: 9
- OE.SECDEV: 2
- OE.SECNET: 4
- OE.USER: 2
- OE.VPN: 4
- OSP:
- OSP.NETMONITOR: 3
- OSP.OS: 4
|
- A:
- A.ACCESS_CONTROL_MANAGEMENT_DEVICES: 3
- A.ALARM: 3
- A.AUDIT: 3
- A.CEC_CRYPTO_REGULATION: 3
- A.CONFIGURATION_CONTROL: 3
- A.KEY_TRANSPORTATION: 3
- A.NO_GENERAL_PURPOSE: 3
- A.PHYSICAL_ENVIRONMENT_MANAGEMENT_DEVICES: 3
- A.PHYSICAL_ENVIRONMENT_TOE: 3
- A.POLICIES_CONTINUITY: 3
- A.SECURED_MANAGEMENT_DEVICES: 3
- A.SGC_TO_FRONT-END: 3
- A.STAND_ALONE_CEC: 3
- A.SW_PROTECTION: 3
- A.TRUSTED_ADMIN: 3
- A.TRUSTED_NETWORK: 2
- A.TRUSTED_NETWORKS: 1
- D:
- D.APPLICATIVE_DATA: 6
- D.AUDIT: 3
- D.AUTHENTICATION_DATA: 11
- D.CONFIG_PARAM: 22
- D.CRYPTO_KEY: 4
- D.CRYPTO_KEYS: 18
- D.CRYPTO_KEYS_PROTECTION_PWD: 3
- D.SECURITY_POLICIES: 23
- D.SOFTWARE: 4
- D.SOFTWARES: 3
- D.SUPERVISION_DATA: 3
- D.SWUPDATE_PUBLICKEYS: 5
- D.TIME_BASE: 8
- D.TOPOLOGIC_INFO: 5
- O:
- O.AUDIT: 12
- O.AUDIT_PROTECTION: 6
- O.AUTHENTICATION_FAILURE: 4
- O.CRYPTOPERIOD: 4
- O.CRYPTO_REGULATION: 7
- O.DATA_ERASURE: 6
- O.DISPLAY_BANNER: 5
- O.FLOW_PARTITIONING: 5
- O.KEYS_INJECTION: 5
- O.LED: 1
- O.LOCAL_DATA_PROTECTION: 11
- O.MANAGEMENT: 6
- O.POL_ENFORCEMENT: 6
- O.POL_VIEW: 7
- O.PROTECTED_COMMUNICATIONS: 10
- O.RESIDUAL_INFORMATION_CLEAR: 5
- O.ROLES: 4
- O.SELF_TEST: 7
- O.SESSION_LOCK: 5
- O.SOFTWARE_UPDATES: 5
- O.SUPERVISION: 5
- O.SUPERVISION_IMPACT: 4
- O.TIME_BASE: 5
- O.VIEW: 5
- O.VISUAL: 1
- O.VISUAL_ALARMS: 5
- OE:
- OE.ACCESS_CONTROL_CEC: 3
- OE.ACCESS_CONTROL_NTP_SERVER: 3
- OE.ACCESS_CONTROL_SF: 2
- OE.ACCESS_CONTROL_SGC: 3
- OE.ACCESS_CONTROL_SGL: 2
- OE.ALARM: 3
- OE.AUDIT_ANALYSIS: 2
- OE.AUDIT_MNGT: 3
- OE.AUDIT_RECORD_SGC: 5
- OE.CEC_CRYPTO_REGULATION: 6
- OE.DISPLAY_BANNER_SGC: 3
- OE.KEYS_TRANSPORTATION: 1
- OE.KEY_TRANSPORTATION: 2
- OE.LINUX_GUIDANCE: 3
- OE.NTP_SERVER_LOCATION: 2
- OE.PHYSICAL_ENVIRONMENT_CEC: 3
- OE.PHYSICAL_ENVIRONMENT_NTP_SERVER: 3
- OE.PHYSICAL_ENVIRONMENT_SF: 2
- OE.PHYSICAL_ENVIRONMENT_SGC: 3
- OE.PHYSICAL_ENVIRONMENT_SGL: 2
- OE.PHYSICAL_ENVIRONMENT_TOE: 3
- OE.POLICIES_CONTINUITY: 3
- OE.SECURED_CEC: 3
- OE.SECURED_NTP_SERVER: 2
- OE.SECURED_SGC: 3
- OE.SECURED_SGL: 2
- OE.SGC_TO_FRONT-END: 3
- OE.SGL_CONNECTION: 4
- OE.STAND_ALONE_CEC: 3
- OE.SW_PROTECTION: 3
- OE.SW_UPDATE_KEY: 3
- OE.TOE_INTEGRITY: 8
- OE.TOE_TRANSPORTATION: 3
- OE.TRUSTED_ADMIN: 5
- OE.TRUSTED_NETWORK: 2
- OE.TRUSTED_NETWORKS: 1
- R:
- R.ADMINISTRATOR: 13
- R.OPERATOR: 6
- R.SGC: 8
- R.SGL: 1
- T:
- T.ADMIN_ERROR: 3
- T.RESIDUAL_DATA: 3
- T.TIME_BASE: 3
- T.TSF_FAILURE: 3
- T.UNAUTHORISED_ACCESS: 3
- T.UNAUTHORISED_UPDATE: 3
- T.UNDETECTED_ACTIONS: 3
- T.USER_DATA_REUSE: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 2
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 1
- SHA-384: 2
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 1
- Key exchange: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 65
- IKEv1: 6
- IKEv2: 24
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
|
- FIPS:
- FIPS 180-3: 4
- FIPS 186-4: 1
- FIPS 197: 4
- FIPS 198-1: 2
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- SP 800-107: 1
- RFC:
- RFC 1042: 1
- RFC 1213: 1
- RFC 2408: 1
- RFC 2409: 1
- RFC 3566: 3
- RFC 3602: 3
- RFC 4106: 2
- RFC 4109: 1
- RFC 4303: 2
- RFC 4868: 3
- RFC 5639: 1
- RFC 5903: 1
- RFC 5996: 3
- RFC 894: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- TOE but relevant for the operation. Also here, the network devices like switches and routers are out of scope. This holds also valid for the connection to the internet (the SIP trunk) and the required network: 1
- are held by us. In order to define the logical scope in detail, the following functions are out of scope of the TOE: Boarder protection of all external connections like SIP trunks or remote management: 1
- may implement some security features like IEEE 802.1X network device authentication. They are out of scope. Their existence and their security features can be assumed. The protection zone “Server” contains: 1
- out of scope: 3
|
- OutOfScope:
- Mistral IP system are considered as part of the operational environment. Thus, those equipments are out of scope of the Target of Evaluation described in this Security Target. In particular, the Mistral: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Avaya GmbH & Co KG
- /CreationDate: D:20090309164738Z
- /Creator: Microsoft® Office Word 2007
- /Keywords: VoIP, CM 5.1, Communication Manager
- /ModDate: D:20090407130547+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Common Criteria Evaluation
- /Title: Avaya VoIP PBX System Security Target
- pdf_file_size_bytes: 773349
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 63
|
- /Author: T0065286
- /CreationDate: D:20150320191108+01'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20150320191108+01'00'
- /Producer: Microsoft® Word 2010
- /Title: SECURITY TARGET OF MISTRAL IP ENCRYPTION DEVICE
- pdf_file_size_bytes: 1430690
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 115
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |