name |
Red Hat Enterprise Linux (RHEL) Advanced Server (AS) Version 3 Update 5 Running on Unisys ES7000 Hardware models 405, 410, 420, 430, and 440 |
Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches running JUNOS 11.4R2 |
category |
Operating Systems |
Network and Network-Related Devices and Systems |
scheme |
US |
CA |
status |
archived |
archived |
not_valid_after |
06.09.2012 |
19.04.2018 |
not_valid_before |
29.01.2007 |
22.10.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10062-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-227%20CR%20v1.0e.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10062-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/11.4_ST_1.0.pdf |
manufacturer |
Unisys Corporation |
Juniper Networks, Inc. |
manufacturer_web |
https://www.unisys.com/unisys/ |
https://www.juniper.net/ |
security_level |
EAL3+, ALC_FLR.2 |
EAL3+, ALC_FLR.3 |
dgst |
ac9bd8fbd81973af |
86a9c759d0c212a7 |
heuristics/cert_id |
CCEVS-VR-0006-2007 |
383-4-227 |
heuristics/cert_lab |
US |
CANADA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1, ALC_FLR.2 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
405, 440, 410, 430, 3, 420, 5 |
11.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Operating System
- certification_date: 29.01.2007
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10062
- product: Red Hat Enterprise Linux (RHEL) Advanced Server (AS) Version 3 Update 5 Running on Unisys ES7000 Hardware models 405, 410, 420, 430, and 440
- scheme: US
- url: https://www.niap-ccevs.org/product/10062
- vendor: Unisys
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10062-vr.pdf |
383-4-227 CR v1.0e.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-07-0006
- cert_item: Unisys Corporation, Unisys Way, Blue Bell, PA 19424 Red Hat Enterprise Linux (RHEL) Advanced Server (AS), Version 3 Update 5 Running on ES7000 Hardware
- cert_lab: US NIAP
- CA:
|
- US:
- CA:
- cert_id: 383-4-227-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 3: 3
- EAL 3 augmented: 3
- EAL3: 14
- EAL3 augmented: 1
|
- EAL:
- EAL 3: 4
- EAL 3 augmented: 2
- EAL 3+: 2
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: mt21130
- /CreationDate: D:20070216114434-05'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070216114541-05'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070216164226
- /Title: Validation Report for Unisys RHEL3
- /_AdHocReviewCycleID: -846940914
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Franklin Haskell
- /_EmailSubject: Validation Report Template (MS Word)
- pdf_file_size_bytes: 149474
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /Author: rbharland
- /CreationDate: D:20121023105315-04'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20121023105315-04'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title: Microsoft Word - 383-4-227 CR v1.0e.doc
- pdf_file_size_bytes: 46866
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
pdf_data/st_filename |
st_vid10062-st.pdf |
11.4_ST_1.0.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 14
- EAL 3 augmented: 14
- EAL3: 4
- EAL3 augmented: 3
|
- EAL:
- EAL3: 5
- EAL3 augmented: 4
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP: 1
- ACM_CAP.3: 19
- ACM_SCP: 1
- ACM_SCP.1: 6
- ADO:
- ADO_DEL: 1
- ADO_DEL.1: 7
- ADO_IGS: 1
- ADO_IGS.1: 9
- ADV:
- ADV_FSP: 1
- ADV_FSP.1: 22
- ADV_HLD: 1
- ADV_HLD.1: 3
- ADV_HLD.2: 17
- ADV_RCR: 1
- ADV_RCR.1: 8
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 20
- AGD_USR: 1
- AGD_USR.1: 17
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 9
- ALC_FLR: 1
- ALC_FLR.2: 32
- ATE:
- ATE_COV: 1
- ATE_COV.2: 7
- ATE_DPT: 1
- ATE_DPT.1: 5
- ATE_FUN: 1
- ATE_FUN.1: 16
- ATE_IND: 1
- ATE_IND.2: 9
- AVA:
- AVA_MSU: 1
- AVA_MSU.1: 11
- AVA_SOF: 1
- AVA_SOF.1: 8
- AVA_VLA: 1
- AVA_VLA.1: 10
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 7
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_SAR: 6
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 2
- FAU_SAR.2.1: 1
- FAU_SAR.3: 3
- FAU_SAR.3.1: 1
- FAU_SEL: 2
- FAU_SEL.1: 2
- FAU_SEL.1.1: 1
- FAU_STG: 6
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 2
- FAU_STG.3.1: 1
- FAU_STG.4: 3
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 3
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_RIP: 12
- FIA:
- FIA_ATD: 2
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_SOS: 2
- FIA_SOS.1: 4
- FIA_SOS.1.1: 1
- FIA_UAU: 4
- FIA_UAU.1: 5
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UAU.7: 2
- FIA_UAU.7.1: 1
- FIA_UID: 2
- FIA_UID.1: 7
- FIA_UID.2: 12
- FIA_UID.2.1: 1
- FIA_USB: 2
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 4
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 25
- FMT_MTD.1: 2
- FMT_REV: 14
- FMT_SMF: 2
- FMT_SMF.1: 11
- FMT_SMR: 2
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT: 2
- FPT_AMT.1: 3
- FPT_AMT.1.1: 1
- FPT_RVM: 2
- FPT_RVM.1: 3
- FPT_RVM.1.1: 1
- FPT_SEP: 2
- FPT_SEP.1: 3
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM: 2
- FPT_STM.1: 4
- FPT_STM.1.1: 1
|
- FAU:
- FAU_ARP.1: 6
- FAU_ARP.1.1: 1
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAA.1: 5
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_IFC.1: 5
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ROL.1: 5
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FIA:
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 1
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 10
- FMT_MOF.1: 2
- FMT_MSA.1: 3
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 32
- FMT_MTD.1: 7
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 5
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FTA:
- FTA_TSE.1: 5
- FTA_TSE.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECT: 1
- A.COOP: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NO_EVIL_ADM: 1
- A.PEER: 1
- A.PROTECT: 1
- O:
- O.AUDITING: 1
- O.AUTHORIZATION: 1
- O.CREDEN: 1
- O.DISCRETIONARY_ACCESS: 1
- O.ENFORCEMENT: 1
- O.INSTALL: 1
- O.MANAGE: 1
- O.PHYSICAL: 1
- O.RESIDUAL_INFORMATION: 1
|
- A:
- A.CRYPTO: 4
- A.EAUTH: 2
- A.LOCATE: 4
- A.NOEVIL: 3
- A.NWCOMP: 2
- A.TIME: 4
- O:
- O.ACCESS: 14
- O.AUDIT: 13
- O.CONN: 6
- O.EADMIN: 8
- O.FLOW: 11
- O.PROTECT: 15
- O.ROLBAK: 6
- OE:
- OE.ADMIN: 3
- OE.CRYPTO: 3
- OE.EAUTH: 3
- OE.NWCOMP: 3
- OE.PHYSICAL: 3
- OE.TIME: 3
- T:
- T.CONFLOSS: 5
- T.MANDAT: 3
- T.NOAUDIT: 2
- T.OPS: 8
- T.PRIVIL: 7
- T.ROUTE: 9
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be: 1
- accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: All: 1
- out of scope: 3
- perspective. 4 The lower layers of the PFE which simply deal with physical interfaces mechanics are out of scope. Security Target for Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal: 1
- which are out of scope), and SSH (which is provided by the operational environment: 1
|
pdf_data/st_metadata |
- /Author: SAIC CCTL
- /Company: Unisys Corporation
- /CreationDate: D:20070216115637-05'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070216115834-05'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070208154200
- /Subject: RHEL4 EAL4 Security Target
- /Title: Red Hat Enterprise Linux (RHEL) Advanced Server (AS) Version 4 Running on Unisys ES7000 Hardware Security Target
- pdf_file_size_bytes: 367758
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 37
|
- /Author: Juniper
- /CreationDate: D:20121001140620+01'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20121001140620+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: EAL3 Security Target
- /Title: JUNOS 11.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches
- pdf_file_size_bytes: 797777
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |