name |
Cisco Nexus 5000 Series Switch w/2000 Series Fabric Extenders running s/w NX-OS v5.0(3)N1(1c), and Cisco Secure Access Control Server (ACS) running s/w v5.2 patch 3
|
Cisco UCS 5100 Series Blade Server Chassis, B-Series Blade Servers, C-Series Rack-Mount Servers, S-Series Storage Servers, 2200/2300 Series Fabric Extenders, and 6200/6300/6400 Series, Fabric Interconnects with UCSM 4.0(4b)
|
category |
Network and Network-Related Devices and Systems
|
Network and Network-Related Devices and Systems
|
not_valid_before |
2011-09-08
|
2019-11-08
|
not_valid_after |
2015-06-05
|
2024-11-08
|
scheme |
US
|
NL
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10384-st.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cisco_UCS_4.0_ST_v2.1_02202020.pdf
|
status |
archived
|
active
|
manufacturer |
Cisco Systems, Inc.
|
Cisco Systems, Inc.
|
manufacturer_web |
https://www.cisco.com
|
https://www.cisco.com
|
security_level |
ALC_FLR.2, EAL4+ |
EAL2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10384-vr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-228723-CR.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-19-228723.pdf
|
protection_profiles |
|
|
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2014, 3, 31), 'maintenance_title': 'Cisco Nexus 5000 with v5.2(1)N1(2a)', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10384-add2.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10384-st.pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2012, 7, 6), 'maintenance_title': 'Cisco Nexus 5000 with v5.0(3)N1(1c)', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ACMR%20VID-10384%20Cisco%20Nexus%205000.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10384-st.pdf'}) |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2020, 2, 25), 'maintenance_title': 'addition one new UC Fabric Extender hardware model to the TOE', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-228723-MA-1.0.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cisco_UCS_4.0_ST_v2.1_02202020.pdf'}) |
state/cert/convert_garbage |
False
|
True
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
9a34e3d696e1208b6197fe35e965fbca240ff2ff5a31fff685ec4bc8eea5d2fd
|
state/cert/txt_hash |
None
|
7ea7eae36658dfbfe2154c3e7bd40a13c6b291780815e42e9b7acda700430dd2
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
f236f9d201366977ed3b42c4bb8eceb917eff91f378852ae1d4643419bb156f6
|
9fff3314e32f21485f46d3dbb2cce45287ee799047349dc72d195f2bb7fdb0b3
|
state/report/txt_hash |
01c726914d1393597a662376b2781d052e64bd9c16a11ba9142ccdf21d6934b5
|
bb06e0996c1a8912b59d8222105a5d7545645baf29089095766d91f161740eb5
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
f6cd105652ce68488060c6b6e4897d5fef8e46dade0bded06e47e88c2af585b1
|
edb29ca786b6312cc9b8d96fb923a038eb7780dcfe47d8d96d8ead608f312b12
|
state/st/txt_hash |
12883cedd21faf9e42526628d926caf988acfe5065154e40015c745e89356ef8
|
98312ce33779ed6f073fd268df8c642bf54a1b84542fd7d5db056c89206f0e8a
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
CCEVS-VR-10384-2011
|
NSCIB-CC-228723-CR
|
heuristics/cert_lab |
US
|
|
heuristics/cpe_matches |
cpe:2.3:o:cisco:nx-os:5.0\(3\)u2\(2\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.2\(1\):-:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.2\(1\)n1\(5\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.2\(5\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0\(2\)n1\(1\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0\(3\)n1\(1\):*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_access_control_server:5.2:*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0\(3\)a1\(2\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0\(3\)u5\(1c\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0\(3\)u3\(2\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.2\(4\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.2\(9\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0\(3\)n1\(1a\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.2\(7\):*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_access_control_server:5.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0\(3\)n1\(1c\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.2\(1\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.2\(1\)n1\(1\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0\(2\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0\(3\)u1\(1c\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0\(3\)n2\(2\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.2\(1\)n1\(2\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0\(3\)n1\(1b\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0\(5\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.2\(1\)n1\(3\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0\(3\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.2\(3\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:5.0\(3\)u1\(2\):*:*:*:*:*:*:* |
cpe:2.3:h:cisco:ucs_6400:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:ucs_6300:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:ucs_6200:-:*:*:*:*:*:*:* |
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
5.0, 5.2 |
4.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
CVE-2011-2569, CVE-2011-4667, CVE-2014-3295, CVE-2016-1453, CVE-2016-1351, CVE-2012-5424, CVE-2013-6975, CVE-2017-6770, CVE-2012-4135, CVE-2013-6982, CVE-2016-1409 |
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- product:
Cisco Nexus 5000 Series Switch w/2000 Series Fabric Extenders running s/w NX-OS v5.0(3)N1(1c), and Cisco Secure Access Control Server (ACS) running s/w v5.2 patch 3
- id: CCEVS-VR-VID10384
- url: https://www.niap-ccevs.org/product/10384
- certification_date: 2011-09-08T00:00:00Z
- expiration_date: 2015-06-05T00:00:00Z
- category: Network Switch, Sensitive Data Protection, Virtual Private Network
- vendor: Cisco Systems, Inc.
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- scheme:
US
|
- manufacturer: Cisco Systems Inc.
- product:
Cisco UCS 5100 Series Blade Server Chassis, B-Series Blade Servers, C- Series Rack-Mount Servers, S-Series Storage Servers, 2200/2300 Series Fabric Extenders, and 6200/6300/6400 Series, Fabric Interconnects with UCSM 4.0(4b)
- scheme:
NSCIB
- cert_id: CC-19-228723
- manufacturer_link: https://www.cisco.com/
- level: EAL2
- cert_link: https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/03/signed-certificate-cc-19-228723.pdf
- report_link: https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/03/cr-nscib-cc-228723-cr.pdf
- target_link: https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/03/cisco_ucs_4.0_st_v2.1_02202020.pdf
- maintenance_link: https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/03/nscib-cc-228723-ma-1.0.pdf
|
heuristics/scheme_data/product |
Cisco Nexus 5000 Series Switch w/2000 Series Fabric Extenders running s/w NX-OS v5.0(3)N1(1c), and Cisco Secure Access Control Server (ACS) running s/w v5.2 patch 3
|
Cisco UCS 5100 Series Blade Server Chassis, B-Series Blade Servers, C- Series Rack-Mount Servers, S-Series Storage Servers, 2200/2300 Series Fabric Extenders, and 6200/6300/6400 Series, Fabric Interconnects with UCSM 4.0(4b)
|
heuristics/scheme_data/scheme |
US
|
NSCIB
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
Signed certificate CC-19-228723.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- Cisco:
- Cisco Systems:
1
- Cisco:
1
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
186223
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Title:
C458-M&S19110813510
- /Creator:
C458-M&S
- /Producer:
KONICA MINOLTA bizhub C458
- /CreationDate:
D:20191108135115+01'00'
- /ModDate:
D:20191108135115+01'00'
- pdf_hyperlinks:
|
pdf_data/report_filename |
st_vid10384-vr.pdf
|
[CR] NSCIB-CC-228723-CR.pdf
|
pdf_data/report_frontpage |
- US:
- cert_id:
CCEVS-VR-10384-2011
- cert_item:
Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Cisco Nexus 5000 Series Switch
- cert_lab:
US NIAP
|
- NL:
- cert_id:
NSCIB-CC-228723-CR
- cert_item:
Cisco UCS 5100 Series Blade Server Chassis, B-Series Blade Servers, C- Series Rack-Mount Servers, S-Series Storage Servers, 2200/2300 Series Fabric Extenders, and 6200/6300/6400 Series, Fabric Interconnects with UCSM 4.0(4b
- developer:
Cisco Systems Inc
- cert_lab:
Brightsight
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 4: 9
- EAL4:
2
- EAL 4 augmented: 2
- EAL4 augmented: 1
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL4 |
2
|
1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_protocol/TLS/TLS |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Microsoft:
- Cisco:
- Cisco Systems, Inc:
2
- Cisco:
106
- Cisco Systems:
2
|
- Cisco:
- Cisco:
37
- Cisco Systems:
3
|
pdf_data/report_keywords/vendor/Cisco |
- Cisco Systems, Inc: 2
- Cisco:
106
- Cisco Systems:
2
|
- Cisco:
37
- Cisco Systems:
3
|
pdf_data/report_keywords/vendor/Cisco/Cisco |
106
|
37
|
pdf_data/report_keywords/vendor/Cisco/Cisco Systems |
2
|
3
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
279006
- pdf_is_encrypted:
False
- pdf_number_of_pages:
23
- /Title:
Validation Report for N7K
- /Author:
Tammy Compton
- /Creator:
Microsoft® Office Word 2007
- /CreationDate:
D:20110919143541
- /ModDate:
D:20110919143541
- /Producer:
Microsoft® Office Word 2007
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
790707
- pdf_is_encrypted:
False
- pdf_number_of_pages:
14
- /Producer:
GPL Ghostscript 9.0
- /CreationDate:
- /ModDate:
- /Title:
[CR] NSCIB-CC-228723-CR
- /Creator:
PDFCreator Version 1.2.0
- /Author:
- /Keywords:
- /Subject:
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
Tammy Compton
|
|
pdf_data/report_metadata//CreationDate |
D:20110919143541
|
|
pdf_data/report_metadata//Creator |
Microsoft® Office Word 2007
|
PDFCreator Version 1.2.0
|
pdf_data/report_metadata//ModDate |
D:20110919143541
|
|
pdf_data/report_metadata//Producer |
Microsoft® Office Word 2007
|
GPL Ghostscript 9.0
|
pdf_data/report_metadata//Title |
Validation Report for N7K
|
[CR] NSCIB-CC-228723-CR
|
pdf_data/report_metadata/pdf_file_size_bytes |
279006
|
790707
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
23
|
14
|
pdf_data/st_filename |
st_vid10384-st.pdf
|
Cisco_UCS_4.0_ST_v2.1_02202020.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- T:
- T.AVAIL:
3
- T.NETTRAFFIC:
3
- T.IMPCONF:
3
- T.ADMINAUTHOR:
3
- T.ADMINAUDIT:
3
- T.AUDITCOMP:
3
- T.VRFCOMP:
3
- A:
- A.PROTCT:
3
- A.LOCATE:
3
- A.MANAGE:
3
- A.NOEVIL:
3
- A.NOTRST:
3
- OE:
- OE.PERSON:
4
- OE.INSTALL:
3
- OE.TIME:
3
|
- O:
- O.IDAUTH:
12
- O.ENCRYP:
4
- O.AUDREC:
9
- O.ACCOUN:
6
- O.SECFUN:
24
- O.VLANSEC:
5
- O.VSANSEC:
7
- O.ADMIN:
5
- T:
- T.NORMAL_USE:
4
- T.NOAUTH:
4
- T.SNIFF:
4
- T.ACCOUNTABILITY:
4
- T.CONFIGURE_NO:
3
- T.ATTACK_ANOTHER:
3
- A:
- A.ADMIN:
3
- A.VSAN:
3
- A.BOUNDARY:
3
- A.PHYSICAL:
3
- A.POWER:
3
- A.REDUNDANT_NET:
3
- A.REMOTE_SERVERS:
2
- OE:
- OE:
2
- OE.ADMIN:
3
- OE.VSAN:
2
- OE.BOUNDARY:
3
- OE.PHYSICAL:
2
- OE.POWER:
3
- OE.REDUNDANT_NET:
2
- OE.REMOTE_SERVERS:
3
|
pdf_data/st_keywords/cc_claims/A |
- A.PROTCT:
3
- A.LOCATE:
3
- A.MANAGE:
3
- A.NOEVIL:
3
- A.NOTRST:
3
|
- A.ADMIN:
3
- A.VSAN:
3
- A.BOUNDARY:
3
- A.PHYSICAL:
3
- A.POWER:
3
- A.REDUNDANT_NET:
3
- A.REMOTE_SERVERS:
2
|
pdf_data/st_keywords/cc_claims/OE |
- OE.PERSON:
4
- OE.INSTALL:
3
- OE.TIME:
3
|
- OE:
2
- OE.ADMIN:
3
- OE.VSAN:
2
- OE.BOUNDARY:
3
- OE.PHYSICAL:
2
- OE.POWER:
3
- OE.REDUNDANT_NET:
2
- OE.REMOTE_SERVERS:
3
|
pdf_data/st_keywords/cc_claims/T |
- T.AVAIL:
3
- T.NETTRAFFIC:
3
- T.IMPCONF:
3
- T.ADMINAUTHOR:
3
- T.ADMINAUDIT:
3
- T.AUDITCOMP:
3
- T.VRFCOMP:
3
|
- T.NORMAL_USE:
4
- T.NOAUTH:
4
- T.SNIFF:
4
- T.ACCOUNTABILITY:
4
- T.CONFIGURE_NO:
3
- T.ATTACK_ANOTHER:
3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_TDS.3:
1
- ADV_FSP.4:
1
- ADV_IMP.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.2:
5
- ALC_CMC.4:
1
- ALC_LCD.1:
1
- ALC_TAT.1:
1
- ALC_CMS.4:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_IND.2:
1
- ATE_DPT.2:
1
- ATE_FUN.1:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_REQ.2:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_ARC.1:
2
- ADV_FSP.2:
2
- ADV_TDS.1:
2
- AGD:
- AGD_OPE.1:
4
- AGD_PRE.1:
2
- ALC:
- ALC_CMC.2:
2
- ALC_CMS.2:
2
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
2
- ATE_FUN.1:
2
- ATE_IND.2:
1
- AVA:
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_TDS.3: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
|
- ADV_ARC.1:
2
- ADV_FSP.2: 2
- ADV_TDS.1: 2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
2
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
1
|
4
|
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 |
1
|
2
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.2: 5
- ALC_CMC.4: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 1
|
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2: 1
- ATE_IND.2:
1
- ATE_DPT.2: 1
- ATE_FUN.1:
1
|
- ATE_COV.1: 2
- ATE_FUN.1:
2
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
2
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL4:
3
- EAL 4:
2
- EAL4 augmented:
1
- EAL 4 augmented:
1
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
15
- FAU_SAR.1:
11
- FAU_STG.1:
5
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_SAR.1.1:
2
- FAU_SAR.1.2:
2
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FCS:
- FCS_CKM.1:
36
- FCS_CKM.4:
29
- FCS_COP.1:
53
- FCS_CKM.1.1:
2
- FCS_CKM.2:
4
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
7
- FDP:
- FDP_IFC.1:
27
- FDP_IFF.1:
21
- FDP_ITC.1:
16
- FDP_ITC.2:
16
- FDP_IFC.1.1:
2
- FDP_IFF.1.1:
2
- FDP_IFF.1.2:
2
- FDP_IFF.1.3:
2
- FDP_IFF.1.4:
2
- FDP_IFF.1.5:
2
- FDP_ACC.1:
4
- FIA:
- FIA_UAU.1:
12
- FIA_UAU.5:
7
- FIA_UID.1:
21
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FMT:
- FMT_MSA.1:
20
- FMT_MSA.3:
17
- FMT_MTD.1:
12
- FMT_SMF.1:
16
- FMT_SMR.1:
25
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_STM.1:
9
- FPT_STM.1.1:
1
|
- FAU:
- FAU_GEN.1:
9
- FAU_SAR.1:
8
- FAU_SAR.3:
5
- FAU_STG.1:
7
- FAU_STG.4:
5
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.3.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.4.1:
1
- FDP:
- FDP_IFF.1:
21
- FDP_ACC.2:
7
- FDP_ACF.1:
9
- FDP_IFC.1:
21
- FDP_ACC.2.1:
1
- FDP_ACC.2.2:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1.1:
2
- FDP_IFF.1.1:
2
- FDP_IFF.1.3:
2
- FDP_IFF.1.4:
2
- FDP_IFF.1.5:
2
- FDP_ACC.1:
5
- FIA:
- FIA_ATD.1:
6
- FIA_SOS.1:
6
- FIA_UAU.2:
6
- FIA_UAU.5:
6
- FIA_UID.2:
8
- FIA_ATD.1.1:
4
- FIA_SOS.1.1:
1
- FIA_UAU.2.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UID.2.1:
1
- FIA_UID.1:
1
- FMT:
- FMT_MOF.1:
6
- FMT_MSA.1:
22
- FMT_MSA.3:
23
- FMT_MTD.1:
11
- FMT_SAE.1:
5
- FMT_SMF.1:
14
- FMT_SMR.1:
26
- FMT_MOF.1.1:
1
- FMT_MSA.1.1:
11
- FMT_MSA.3.1:
3
- FMT_MSA.3.2:
11
- FMT_MTD.1.1:
8
- FMT_SAE.1.1:
3
- FMT_SAE.2.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMF:
2
- FMT_STM.1:
1
- FPT:
- FPT_FLS.1:
6
- FPT_ITT.2:
6
- FPT_RCV.2:
6
- FPT_STM.1:
9
- FPT_STM.1.1:
3
- FPT_FLS.1.1:
1
- FPT_ITT.2.1:
1
- FPT_ITT.2.2:
1
- FPT_RCV.2.1:
1
- FPT_RCV.2.2:
1
- FTP:
- FTP_TRP.1:
7
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
1
- FTP_TRP.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
15
- FAU_SAR.1:
11
- FAU_STG.1:
5
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_SAR.1.1:
2
- FAU_SAR.1.2:
2
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
|
- FAU_GEN.1:
9
- FAU_SAR.1:
8
- FAU_SAR.3: 5
- FAU_STG.1:
7
- FAU_STG.4: 5
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.3.1: 1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.4.1: 1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
15
|
9
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 |
11
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 |
5
|
7
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_IFC.1:
27
- FDP_IFF.1:
21
- FDP_ITC.1: 16
- FDP_ITC.2: 16
- FDP_IFC.1.1:
2
- FDP_IFF.1.1:
2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3:
2
- FDP_IFF.1.4:
2
- FDP_IFF.1.5:
2
- FDP_ACC.1:
4
|
- FDP_IFF.1:
21
- FDP_ACC.2: 7
- FDP_ACF.1: 9
- FDP_IFC.1:
21
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1.1:
2
- FDP_IFF.1.1:
2
- FDP_IFF.1.3:
2
- FDP_IFF.1.4:
2
- FDP_IFF.1.5:
2
- FDP_ACC.1:
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
4
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
27
|
21
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1 |
21
|
21
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1.3 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1.4 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1.5 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_UAU.1: 12
- FIA_UAU.5:
7
- FIA_UID.1:
21
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
|
- FIA_ATD.1: 6
- FIA_SOS.1: 6
- FIA_UAU.2: 6
- FIA_UAU.5:
6
- FIA_UID.2: 8
- FIA_ATD.1.1: 4
- FIA_SOS.1.1: 1
- FIA_UAU.2.1: 1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UID.2.1: 1
- FIA_UID.1:
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 |
7
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
21
|
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.1:
20
- FMT_MSA.3:
17
- FMT_MTD.1:
12
- FMT_SMF.1:
16
- FMT_SMR.1:
25
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_MOF.1: 6
- FMT_MSA.1:
22
- FMT_MSA.3:
23
- FMT_MTD.1:
11
- FMT_SAE.1: 5
- FMT_SMF.1:
14
- FMT_SMR.1:
26
- FMT_MOF.1.1: 1
- FMT_MSA.1.1:
11
- FMT_MSA.3.1:
3
- FMT_MSA.3.2:
11
- FMT_MTD.1.1:
8
- FMT_SAE.1.1: 3
- FMT_SAE.2.1: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMF: 2
- FMT_STM.1: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
20
|
22
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
2
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
17
|
23
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
2
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
12
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
2
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
16
|
14
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
25
|
26
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_STM.1:
9
- FPT_STM.1.1:
1
|
- FPT_FLS.1: 6
- FPT_ITT.2: 6
- FPT_RCV.2: 6
- FPT_STM.1:
9
- FPT_STM.1.1:
3
- FPT_FLS.1.1: 1
- FPT_ITT.2.1: 1
- FPT_ITT.2.2: 1
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
3
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol/SSH/SSH |
32
|
20
|
pdf_data/st_keywords/crypto_protocol/TLS |
|
|
pdf_data/st_keywords/crypto_protocol/TLS/TLS |
|
|
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS |
36
|
5
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
28
|
1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2:
2
- FIPS 186-3:
1
- FIPS 186-2:
4
- FIPS 197:
2
- FIPS 46-3:
2
- FIPS 180-2:
2
- RFC:
- RFC 3414:
4
- RFC 1321:
2
- RFC 2631:
2
- RFC 2246:
1
- CC:
- CCMB-2006-09-001:
1
- CCMB-2007-09-003:
1
- CCMB-2007-09-004:
1
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor/Cisco |
- Cisco:
97
- Cisco Systems, Inc:
4
- Cisco Systems: 3
|
- Cisco Systems, Inc:
10
- Cisco:
141
|
pdf_data/st_keywords/vendor/Cisco/Cisco |
97
|
141
|
pdf_data/st_keywords/vendor/Cisco/Cisco Systems, Inc |
4
|
10
|
pdf_data/st_keywords/vendor/Microsoft/Microsoft |
2
|
1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Cisco Systems, Inc.
|
GCT
|
pdf_data/st_metadata//CreationDate |
D:20140331112214-04'00'
|
D:20200812153542+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/st_metadata//ModDate |
D:20140402080134-04'00'
|
D:20200812153542+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/st_metadata/pdf_file_size_bytes |
734086
|
2086089
|
pdf_data/st_metadata/pdf_hyperlinks |
http://en.wikipedia.org/wiki/Bit |
https://software.cisco.com/, https://apps.cisco.com/ccw/cpc/guest/home, https://ucshcltool.cloudapps.cisco.com/public/ |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
65
|
65
|
dgst |
8e89dbc88735916f
|
991c7e1236609ed0
|