Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Avaya VoIP PBX System based on the Communication Manager 5.1
BSI-DSZ-CC-0540-2009
SUSE Linux Enterprise Server Version 9 with Service Pack 2, ProPack 4 for Service Pack 2 and certification-sles-sgi-eal3 package
BSI-DSZ-CC-0292-2005
name Avaya VoIP PBX System based on the Communication Manager 5.1 SUSE Linux Enterprise Server Version 9 with Service Pack 2, ProPack 4 for Service Pack 2 and certification-sles-sgi-eal3 package
category Other Devices and Systems Operating Systems
not_valid_before 27.03.2009 13.10.2005
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0540a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0292a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0540b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0292b.pdf
manufacturer Avaya GmbH & Co. KG SUSE Linux Products Gmbh
manufacturer_web https://www.avaya.com/de/ https://www.suse.com/
security_level ASE_SPD.1, ADV_FSP.2, ASE_OBJ.2, ASE_REQ.2, EAL1+ EAL3+, ALC_FLR.3
dgst 7ffe542d7171483d b8bea9a6818066d3
heuristics/cert_id BSI-DSZ-CC-0540-2009 BSI-DSZ-CC-0292-2005
heuristics/cpe_matches {} cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:9.3:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2004-0587, CVE-2005-3147, CVE-2010-4342, CVE-2005-3146, CVE-2005-0207, CVE-2004-1092, CVE-2004-0746, CVE-2009-2903, CVE-2004-0688, CVE-2004-1176, CVE-2004-1142, CVE-2004-0867, CVE-1999-0405, CVE-2009-2408, CVE-2004-1072, CVE-2004-1174, CVE-2004-1071, CVE-2004-0064, CVE-2004-1070, CVE-2004-1154, CVE-2006-2752, CVE-2007-5000, CVE-2005-0398, CVE-2005-0085, CVE-2005-4790, CVE-2009-2625, CVE-2004-0886, CVE-2009-3231, CVE-2010-4158, CVE-2004-0936, CVE-2004-0687, CVE-2010-3848, CVE-2004-0803, CVE-2004-0991, CVE-2004-1074, CVE-2010-4258, CVE-2005-0005, CVE-2005-0156, CVE-2004-0940, CVE-2004-0903, CVE-1999-0234, CVE-2005-0639, CVE-2011-0762, CVE-2004-0802, CVE-2004-1090, CVE-2004-0866, CVE-2000-0438, CVE-2004-0957, CVE-2004-0914, CVE-2005-4772, CVE-2010-1205, CVE-2004-1491, CVE-2010-3442, CVE-2004-1175, CVE-2010-3849, CVE-2004-0461, CVE-2010-3702, CVE-2010-2941, CVE-2010-2249, CVE-2005-0750, CVE-2004-1184, CVE-2009-0115, CVE-2010-0205, CVE-2006-2703, CVE-2004-0827, CVE-2004-0933, CVE-2009-0040, CVE-2004-1895, CVE-2005-0638, CVE-2004-0817, CVE-2008-3949, CVE-2004-0554, CVE-2008-5021, CVE-2004-0902, CVE-2010-4081, CVE-2005-4788, CVE-2010-4180, CVE-2009-2910, CVE-2004-0535, CVE-2010-3850, CVE-2010-3067, CVE-2004-2097, CVE-2004-1237, CVE-2004-0888, CVE-2004-2658, CVE-2010-4072, CVE-2004-1096, CVE-2004-0947, CVE-2010-4164, CVE-2010-4073, CVE-2005-3321, CVE-2009-2698, CVE-2007-4074, CVE-2004-1139, CVE-2004-1191, CVE-2011-4862, CVE-2010-3876, CVE-2010-4083, CVE-2000-0218, CVE-2005-1043, CVE-2004-1091, CVE-2004-0956, CVE-2004-0935, CVE-2007-6427, CVE-2009-3095, CVE-2005-0373, CVE-2009-2848, CVE-2007-4393, CVE-2004-1145, CVE-2005-0206, CVE-2004-0949, CVE-2005-1767, CVE-2008-1375, CVE-2004-0883, CVE-2004-0889, CVE-2004-0807, CVE-2010-3873, CVE-2004-0460, CVE-2004-1190, CVE-2004-1235, CVE-2004-1170, CVE-2009-0949, CVE-2004-0981, CVE-2000-0361, CVE-2004-1005, CVE-2005-0337, CVE-2005-3297, CVE-2005-3298, CVE-2005-0605, CVE-2004-1093, CVE-2005-3148, CVE-2013-4002, CVE-2006-0803, CVE-2005-4789, CVE-2005-0470, CVE-2004-0934, CVE-2004-1073, CVE-2007-0460, CVE-2007-6167, CVE-2003-1295, CVE-2005-3322, CVE-2005-0384, CVE-2004-0937, CVE-2009-1955, CVE-2004-0497, CVE-1999-0746, CVE-2004-0905, CVE-2010-3437, CVE-2004-0932, CVE-2004-1009, CVE-2005-1761, CVE-2010-4160, CVE-2004-0990, CVE-2007-2654, CVE-2004-0495, CVE-2010-4157, CVE-2004-1098, CVE-2004-0626, CVE-2005-2023, CVE-2004-0929, CVE-2004-1004, CVE-2009-2416
heuristics/extracted_sars ALC_LCD.2, ALC_CMC.1, ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ASE_ECD.1, APE_ECD.1, ASE_TSS.1, ASE_SPD.1, AVA_VAN.1, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, ATE_FUN.2, AGD_OPE.1, AGD_PRE.1, APE_REQ.2, ATE_IND.1, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, APE_INT.1, APE_SPD.1, ALC_CMS.1, APE_OBJ.2, ASE_CCL.1, ADV_TDS.6, ATE_COV.3, ADV_SPM.1 ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, AVA_MSU.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ALC_FLR.3, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ADV_FSP.1, ASE_SRE.1, ASE_OBJ.1, AVA_VLA.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1
heuristics/extracted_versions 5.1 4, 9, 2
pdf_data/report_filename 0540a.pdf 0292a.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0540-2009
    • cert_item: Avaya VoIP PBX System based on the Communication Manager 5.1
    • cert_lab: BSI
    • developer: Avaya GmbH & Co. KG sponsored by Avaya Inc
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
    • cert_id: BSI-DSZ-CC-0292-2005
    • cert_item: SUSE Linux Enterprise Server Version 9 with Service Pack 2, ProPack 4 for Service Pack 2 and certification-sles-sgi-eal3 package
    • cert_lab: BSI
    • developer: Novell – SUSE LINUX Products GmbH sponsored by Silicon Graphics, Inc
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0540: 1
    • BSI-DSZ-CC-0540-2009: 16
  • DE:
    • BSI-DSZ-CC-0256-2004: 3
    • BSI-DSZ-CC-0292-2005: 25
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
    • EAL 1 augmented: 3
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 6
    • EAL1+: 2
    • EAL2: 3
    • EAL3: 4
    • EAL4: 4
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 7
    • EAL3 augmented: 3
    • EAL3+: 4
    • EAL4: 4
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 5
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 2
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 5
    • ASE_REQ.1: 1
    • ASE_REQ.2: 5
    • ASE_SPD: 1
    • ASE_SPD.1: 5
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 2
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 2
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.1: 1
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_FLR.3: 6
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.2: 1
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 1
    • AVA_VLA.3: 2
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SAR.1: 1
    • FAU_SAR.2: 1
    • FAU_SAR.3: 1
    • FAU_SEL.1: 1
    • FAU_STG.1: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_RIP.2: 1
    • FDP_UCT.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_SOS.1: 1
    • FIA_UAU.2: 1
    • FIA_UAU.7: 1
    • FIA_UID.2: 1
    • FIA_USB.1: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_REV.1: 1
    • FMT_SMF: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_STM.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.CONNECT: 2
    • A.COOP: 2
    • A.LOCATE: 2
    • A.MANAGE: 2
    • A.NET_COMP: 2
    • A.NO_EVIL_ADMIN: 2
    • A.PEER: 2
    • A.PROTECT: 2
    • A.UTRAIN: 2
    • A.UTRUST: 2
  • OE:
    • OE.ADMIN: 1
    • OE.CREDEN: 1
    • OE.HW_SEP: 1
    • OE.INFO_PROTECT: 1
    • OE.INSTALL: 1
    • OE.MAINTENANCE: 1
    • OE.PHYSICAL: 1
    • OE.RECOVER: 1
    • OE.SERIAL_LOGIN: 1
    • OE.SOFTWARE_IN: 1
  • T:
    • T.COMPROT: 1
    • T.UAACCESS: 1
    • T.UAUSER: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • SSH:
    • SSH: 8
  • TLS:
    • SSL:
      • SSL: 9
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 33: 1
    • AIS32: 1
    • AIS33: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1.0, 2009-03-10, Evaluation Technical Report BSI-DSZ-CC-0540, CSC Deutschland Solutions GmbH, (confidential document) [8] Configuration list for the TOE, Version 1.0, 2009-03-09, Avaya VoIP PBX System Configuration: 1
    • Avaya GmbH & Co KG (confidential document) [9] Guidance CD “Communication Manager 5.0”, Publication Date: January 2008 [10] Guidance CD: 1
  • OutOfScope:
    • TOE but relevant for the operation. Also here, the network devices like switches and routers are out of scope. This holds also valid for the connection to the internet (the SIP trunk) and the required network: 1
    • may implement some security features like IEEE 802.1X network device authentication. They are out of scope. Their existence and their security features can be assumed. The protection zone “Server” contains: 1
    • out of scope: 2
  • ConfidentialDocument:
    • 1.4, 07.09.2005, SUSE Linux Enterprise Server V 9 Security Target for CAPP Compliance, SGI, atsec (confidential document) [8] Evaluation Technical Report, Version 3, 16.09.2005, SUSE Linux Enterprise Server 9 SP 2 with: 1
    • 4 SP 2 (confidential document) [9] Controlled Access Protection Profile (CAPP), Version 1.d, National Security Agency, 08.10.1999: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20090421135047+02'00'
  • /Creator: Writer
  • /Keywords: "Avaya VoIP PBX Systembased on the Communication Manager 5.1, Avaya GmbH & Co. KG, Avaya Inc., BSI-DSZ-CC-0540-2009"
  • /ModDate: D:20090504155601+02'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0540-2009
  • pdf_file_size_bytes: 856495
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Company: BSI
  • /CreationDate: D:20051102223423+01'00'
  • /Creator: Acrobat PDFMaker 7.0.5 für Word
  • /Keywords: CC, Common Criteria, Linux, SLES9, SGI
  • /ModDate: D:20051103061037+01'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20051102144942
  • /Subject: Certification Report BSI-DSZ-CC-292 SLES9/SGI
  • /Title: Certification Report
  • pdf_file_size_bytes: 530480
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 50
pdf_data/st_filename 0540b.pdf 0292b.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0540: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 1 augmented: 1
    • EAL1: 1
    • EAL2: 1
  • EAL:
    • EAL3: 9
    • EAL3 augmented: 4
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 4
    • ADV_FSP.2: 7
  • AGD:
    • AGD_OPE.1: 5
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 4
    • ASE_REQ.1: 2
    • ASE_REQ.2: 5
    • ASE_SPD.1: 3
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ACM:
    • ACM_CAP.3: 1
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.2: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_FLR.3: 8
  • ASE:
    • ASE_REQ.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.1: 1
    • AVA_SOF.1: 2
    • AVA_VLA.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FDP:
    • FDP_ACC.1: 17
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.1: 6
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 6
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 47
    • FDP_IFC.1.1: 3
    • FDP_IFF.1: 27
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_ITC.2: 6
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_ITT.1: 1
    • FDP_ITT.2: 6
    • FDP_ITT.2.1: 1
    • FDP_ITT.2.2: 1
    • FDP_RIP.1: 1
    • FDP_RIP.2: 6
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 10
    • FIA_UAU.2.1: 2
    • FIA_UAU.3: 6
    • FIA_UAU.3.1: 1
    • FIA_UAU.3.2: 1
    • FIA_UID.1: 21
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 14
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 35
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 50
    • FMT_SMF.1.1: 6
    • FMT_SMR.1: 44
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_STM.1: 2
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FTP:
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 10
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 13
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 12
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 14
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 12
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 12
    • FAU_STG.3.1: 1
    • FAU_STG.4: 11
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 23
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 24
    • FCS_CKM.2.1: 4
    • FCS_CKM.4: 4
    • FCS_COP.1: 22
    • FCS_COP.1.1: 3
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 3
    • FDP_ACF.2: 1
    • FDP_IFC.1: 4
    • FDP_ITC.1: 2
    • FDP_MSA.3: 1
    • FDP_RIP.2: 14
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 13
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 13
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 14
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 15
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 12
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 15
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 15
    • FIA_USB.1.1: 2
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 23
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 16
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 54
    • FMT_MTD.1.1: 5
    • FMT_REV.1: 25
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 11
    • FPT_AMT.1.1: 1
    • FPT_RVM.1: 12
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 17
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 4
    • A.AVAILABLE: 3
    • A.DEVICES: 3
    • A.ERRMONITORING: 3
    • A.LOCATION: 3
    • A.PHYSICAL: 4
    • A.SECDEV: 3
    • A.SECNET: 3
    • A.USER: 3
    • A.VPN: 3
  • O:
    • O.AUTHENTICATE: 1
    • O.CONFCLIENT: 1
    • O.DISCLOSE: 1
    • O.LOGEXPORT: 1
    • O.MEDIATION: 1
    • O.RESTRICTION: 1
    • O.SELFPROTECT: 1
  • OE:
    • OE.ADMIN: 14
    • OE.AVAILABLE: 2
    • OE.DEVICES: 3
    • OE.ERRMONITORING: 5
    • OE.LOCATION: 5
    • OE.LOGOUT: 3
    • OE.NETMONITOR: 7
    • OE.OS: 3
    • OE.PHYSICAL: 9
    • OE.SECDEV: 2
    • OE.SECNET: 4
    • OE.USER: 2
    • OE.VPN: 4
  • OSP:
    • OSP.NETMONITOR: 3
    • OSP.OS: 4
  • A:
    • A.CONNECT: 7
    • A.COOP: 3
    • A.LOCATE: 3
    • A.MANAGE: 5
    • A.NET_COMP: 5
    • A.NO_EVIL_ADMIN: 4
    • A.PEER: 3
    • A.PROTECT: 6
    • A.UTRAIN: 3
    • A.UTRUST: 3
  • O:
    • O.AUDITING: 31
    • O.AUTHORIZATION: 22
    • O.COMPROT: 24
    • O.DISCRETIONARY_ACCESS: 22
    • O.ENFORCEMENT: 13
    • O.MANAGE: 31
    • O.RESIDUAL_INFO: 9
    • O.RESIDUAL_INFORMATION: 3
  • OE:
    • OE.ADMIN: 7
    • OE.CREDEN: 4
    • OE.HW_SEP: 8
    • OE.INFO_PROTECT: 10
    • OE.INSTALL: 12
    • OE.MAINTENANCE: 5
    • OE.PHYSICAL: 8
    • OE.PROTECT: 10
    • OE.RECOVER: 8
    • OE.SERIAL_LOGIN: 4
    • OE.SOFTWARE_IN: 5
  • T:
    • T.COMPROT: 3
    • T.UAACCESS: 4
    • T.UAUSER: 4
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 192
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 6
    • RC:
      • RC4: 4
  • DES:
    • 3DES:
      • TDES: 6
    • DES:
      • DES: 2
  • miscellaneous:
    • SM4:
      • SM4: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • MD:
    • MD5:
      • MD5: 5
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 14
  • PGP:
    • PGP: 1
  • SSH:
    • SSH: 36
    • SSHv2: 1
  • TLS:
    • SSL:
      • SSL: 45
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 8
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
  • CC:
    • CCIMB-2004-01-003: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 3268: 1
    • RFC2104: 1
    • RFC3268: 1
  • X509:
    • X.509: 3
pdf_data/st_keywords/javacard_api_const
  • curves:
    • SM2: 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • TOE but relevant for the operation. Also here, the network devices like switches and routers are out of scope. This holds also valid for the connection to the internet (the SIP trunk) and the required network: 1
    • are held by us. In order to define the logical scope in detail, the following functions are out of scope of the TOE: Boarder protection of all external connections like SIP trunks or remote management: 1
    • may implement some security features like IEEE 802.1X network device authentication. They are out of scope. Their existence and their security features can be assumed. The protection zone “Server” contains: 1
    • out of scope: 3
pdf_data/st_metadata
  • /Author: Avaya GmbH & Co KG
  • /CreationDate: D:20090309164738Z
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: VoIP, CM 5.1, Communication Manager
  • /ModDate: D:20090407130547+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Common Criteria Evaluation
  • /Title: Avaya VoIP PBX System Security Target
  • pdf_file_size_bytes: 773349
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
  • /Author: smueller
  • /CreationDate: D:20050908090716-07'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20050908090716-07'00'
  • /Producer: Acrobat Distiller 5.0 (Windows)
  • /Title: Microsoft Word - SGI-SLES9_security_target_eal3-1.4.doc
  • pdf_file_size_bytes: 709347
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 88
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different