name |
Cisco AnyConnect Secure Mobility Client v4.9 for iOS 13 |
ZTE ZXCTN 6000 Series Access Router Running ZXROSng Operating System |
category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
US |
NO |
status |
archived |
archived |
not_valid_after |
16.09.2023 |
08.11.2022 |
not_valid_before |
16.09.2021 |
08.11.2017 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11205-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Sertit-094%20C.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11205-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-094%20ZTE%20ZXCTN%206000%20series%20CR%20v1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11205-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/170912%20[ZTE]%20[ASE%20ST]%20ZTE%206000%20Routers%20v3.3.pdf |
manufacturer |
Cisco Systems, Inc. |
ZTE Corporation |
manufacturer_web |
https://www.cisco.com |
https://wwwen.zte.com.cn/global/index.html |
security_level |
{} |
EAL2+, ALC_FLR.2 |
dgst |
9086182b14c24b60 |
1343035847110331 |
heuristics/cert_id |
CCEVS-VR-11205-2021 |
SERTIT-094 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
4.9 |
6000 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Application Software, Virtual Private Network
- certification_date: 16.09.2021
- evaluation_facility: Gossamer Security Solutions
- expiration_date: 16.09.2023
- id: CCEVS-VR-VID11205
- product: Cisco AnyConnect Secure Mobility Client v4.9 for iOS 13
- scheme: US
- url: https://www.niap-ccevs.org/product/11205
- vendor: Cisco Systems, Inc.
|
- category: Network and Network-Related Devices and Systems
- certification_date: 08.11.2017
- developer: ZTE Corporation
- enhanced:
- category: Network and Network-Related Devices and Systems
- cert_id: SERTIT-094
- certification_date: 08.11.2017
- description: The TOE is a ZXCTN 6000 Series Access Router running the operating system ZXROSng v4.00.30R3. The ZXCTN 6000 products include ZXCTN 608-GF,608-GE,608-GK,608P,6120E,6120S,6120H,6150,6180 and 6180H. The TOE is a Carrier Multiservice Provisioning Platform promoted by ZTE to follow the IP telecom service development trend. Taking packets as the kernel to implement multiservice bearing, it provides the customers with mobile backhaul network and FMC E2E solution. The supported protocols are layer2/layer 3 encapsulation and Internet Protocol (IP), and Ethernet. TOE also support IP/MPLS and MPLS-TP protocols.
- developer: ZTE Corporation
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135199-1607953305/SERTIT/Sertifikater/2017/94/Sertit-094%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135205-1607953310/SERTIT/Sertifikater/2017/94/170912%20%5BZTE%5D%20%5BASE%20ST%5D%20ZTE%206000%20Routers%20v3.3.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135202-1607953307/SERTIT/Sertifikater/2017/94/SERTIT-094%20ZTE%20ZXCTN%206000%20series%20CR%20v1.0.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 2, ALC_FLR.2
- mutual_recognition: CCRA, SOG-IS
- product: ZXCTN 6000 Series Access Router- ZXCTN 608-GF, V3.10.10, Build version 12- ZXCTN 608-GE, V3.10.10, Build version 12- ZXCTN 608-GK, V3.10.10, Build version 12- ZXCTN 6120E-XK, V3.10.10, Build version 12- ZXCTN 6120E-XF, V3.10.10, Build version 12- ZXCTN 6120S,V3.10.10, Build version 12- ZXCTN 6150,V3.10.10, Build version 12- ZXCTN 6180, V3.10.10, Build version 12; Software: TOE/Product Software/ZXROSng Operating system/ ZTE Carrier Grade Embedded Linux/Linux Kernel608-GF/GE/GK/ V3.10.10B12/v4.00.30R3/CGEL_V5.0.1.30 3.10.55;6120S/V3.10.10B12/v4.00.30R3/CGEL_V_3.04.10.P6.F5/2.6.21;6150/V3.10.10B12/v4.00.30R 3/CGEL_V_3.04.10.P6.F5/2.6.21;6180/V3.10.10B12/v4.00.30R3/CGEL_V_3.04.10.P6.F5/2.6.21;6120E-XF/XK/V3.10.10B12/v4.00.30R3/CGEL_V4.03.20_P6B3 2.6.32
- product: ZTE ZXCTN 6000 Series Access Router Running ZXROSng Operating System
- url: https://sertit.no/certified-products/product-archive/zte-zxctn-6000-series-access-router-running-zxrosng-operating-system
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
a1cc4a4e079f4d1f, ce49f1523f0885d6 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpnc_v2.2.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf |
{} |
pdf_data/cert_filename |
st_vid11205-ci.pdf |
Sertit-094 C.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11205-2021: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
- EAL 4: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Cisco:
- Cisco: 1
- Cisco Systems, Inc: 1
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210923151001-04'00'
- /ModDate: D:20210923151001-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181410
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20171108135039Z00'00'
- /ModDate: D:20171108135039Z00'00'
- /Producer: Mac OS X 10.12.6 Quartz PDFContext
- pdf_file_size_bytes: 725600
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid11205-vr.pdf |
SERTIT-094 ZTE ZXCTN 6000 series CR v1.0.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-11205-2021
- cert_item: Cisco AnyConnect Secure Mobility Client v4.9 for iOS 13
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 15
- EAL 2+: 13
- EAL1: 1
- EAL2+: 1
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FAU_STG.4: 1
- FDP:
- FDP_IFC.1: 2
- FDP_IFF.1: 2
- FDP_UIT.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_SOS.1: 1
- FIA_UAU.2: 1
- FIA_UAU.5: 1
- FIA_UID.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 4
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FTA:
- FTA_SSL.3: 1
- FTA_TSE.1: 1
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.CONNECTIVITY: 1
- A.PHYSICAL: 1
- A.REMOTE_AUTH: 1
- A.TIMES: 1
- O:
- O.AUDIT_REVIEW: 1
- O.IDAUTH: 1
- O.MANAGE: 1
- O.MEDIATE: 1
- O.ROUTE: 1
- O.TOE_ACCESS: 1
- OE:
- OE.CONNECTIVITY: 1
- OE.PHYSICAL: 1
- OE.TIMES: 1
- OE.USERS: 1
- T:
- T.AUDIT_REVIEW: 1
- T.MEDIATE: 1
- T.NO_AUTH: 1
- T.NO_AUTH_ACCESS: 1
- T.NO_PRIVILEGE: 1
|
pdf_data/report_keywords/vendor |
- Cisco:
- Cisco: 19
- Cisco Systems, Inc: 3
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /AAPL:Keywords: ['ugradert']
- /Author: Bill Yang
- /CreationDate: D:20171108134957Z00'00'
- /Creator: Microsoft Word
- /Keywords: ugradert
- /ModDate: D:20171108134957Z00'00'
- /Producer: Mac OS X 10.12.6 Quartz PDFContext
- /Title: tittel
- pdf_file_size_bytes: 903974
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
pdf_data/st_filename |
st_vid11205-st.pdf |
170912 [ZTE] [ASE ST] ZTE 6000 Routers v3.3.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 7
- EAL 2 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 2
- ASE_OBJ.1: 2
- ASE_REQ.1: 2
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 6
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 5
- FCS_CKM.1.1: 3
- FCS_CKM.2: 4
- FCS_CKM.2.1: 2
- FCS_CKM_EXT.1: 3
- FCS_CKM_EXT.1.1: 2
- FCS_CKM_EXT.2: 4
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.4: 4
- FCS_CKM_EXT.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 20
- FCS_COP.1.1: 4
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 1
- FCS_STO: 1
- FCS_STO_EXT.1: 5
- FCS_STO_EXT.1.1: 1
- FDP:
- FDP_DAR_EXT.1: 4
- FDP_DAR_EXT.1.1: 1
- FDP_DEC_EXT.1: 4
- FDP_DEC_EXT.1.1: 1
- FDP_DEC_EXT.1.2: 1
- FDP_NET_EXT.1: 4
- FDP_NET_EXT.1.1: 1
- FDP_RIP.2: 4
- FDP_RIP.2.1: 1
- FMT:
- FMT_CFG_EXT.1: 5
- FMT_CFG_EXT.1.1: 1
- FMT_CFG_EXT.1.2: 1
- FMT_MEC_EXT.1: 5
- FMT_MEC_EXT.1.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FPR:
- FPR_ANO_EXT.1: 4
- FPR_ANO_EXT.1.1: 1
- FPT:
- FPT_AEX_EXT.1: 4
- FPT_AEX_EXT.1.1: 2
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.1.3: 2
- FPT_AEX_EXT.1.4: 1
- FPT_AEX_EXT.1.5: 1
- FPT_API_EXT.1: 4
- FPT_API_EXT.1.1: 1
- FPT_IDV_EXT.1: 4
- FPT_IDV_EXT.1.1: 1
- FPT_LIB_EXT.1: 4
- FPT_LIB_EXT.1.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 3
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.1.4: 1
- FPT_TUD_EXT.1.5: 1
- FPT_TUD_EXT.2: 3
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FTP:
- FTP_DIT_EXT.1: 4
- FTP_DIT_EXT.1.1: 2
|
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC: 1
- FDP_IFC.1: 15
- FDP_IFC.1.1: 2
- FDP_IFF.1: 14
- FDP_IFF.1.1: 4
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 3
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 19
- FMT_MTD.1.1: 8
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_TSE.1: 6
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 17
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 3
- FTP_ITC.1.3: 3
- FTP_ITC.2: 1
- FTP_TRP.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_TOE_BYPASS: 1
- A.PHYSICAL: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- A.TRUSTED_CONFIG: 1
- O:
- O.AUTHENTICATION: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.INTEGRITY: 1
- O.KNOWN_STATE: 1
- O.MANAGEMENT: 1
- O.NONDISCLOSURE: 1
- O.PROTECTED_COMMS: 1
- O.PROTECTED_STORAGE: 1
- O.QUALITY: 1
- OE:
- OE.NO_TOE_BYPASS: 1
- OE.PHYSICAL: 1
- OE.PLATFORM: 1
- OE.PROPER_ADMIN: 1
- OE.PROPER_USER: 1
- OE.TRUSTED_CONFIG: 1
- T:
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PHYSICAL_ACCESS: 1
- T.TSF_CONFIGURATION: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.USER_DATA_REUSE: 1
|
- A:
- A.ASSUMPTION: 1
- A.CONNECTIVITY: 2
- A.PHYSICAL: 2
- A.REMOTE_AUTH: 1
- A.TIMES: 2
- O:
- O.AUDIT_REVIEW: 4
- O.IDAUTH: 4
- O.MANAGE: 2
- O.MEDIATE: 2
- O.ROUTE: 2
- O.TOE_ACCESS: 4
- OE:
- OE.CONNECTIVITY: 2
- OE.PHYSICAL: 1
- OE.TIMES: 2
- OE.USERS: 1
- T:
- T.AUDIT_REVIEW: 2
- T.MEDIATE: 2
- T.NO_AUTH: 2
- T.NO_AUTH_ACCESS: 2
- T.NO_PRIVILEGE: 2
- T.THREAT: 1
|
pdf_data/st_keywords/vendor |
- Cisco:
- Cisco: 62
- Cisco Systems, Inc: 5
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 8
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA2:
- SHA-2: 1
- SHA-256: 2
- SHA-384: 3
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 27
- IKEv1: 2
- IKEv2: 14
- IPsec:
- TLS:
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- RFC:
- RFC 3602: 1
- RFC 4106: 1
- RFC 4301: 2
- RFC 4303: 1
- RFC 4868: 1
- RFC 4945: 1
- RFC 5280: 2
- RFC 5282: 1
- RFC 6379: 1
- RFC 6960: 1
- RFC 8247: 1
- RFC 8784: 1
- X509:
|
- RFC:
- RFC 1305: 1
- RFC 2865: 1
- RFC 2866: 1
- RFC 3164: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: YB
- /CreationDate: D:20170914163536+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20170914163536+02'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 961830
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |