Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2
CCEVS-VR-VID-10392-2013
Avaya VoIP PBX System based on the Communication Manager 5.1
BSI-DSZ-CC-0540-2009
name Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2 Avaya VoIP PBX System based on the Communication Manager 5.1
category Boundary Protection Devices and Systems Other Devices and Systems
scheme US DE
not_valid_after 22.04.2015 01.09.2019
not_valid_before 11.04.2013 27.03.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0540a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10392-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0540b.pdf
manufacturer Palo Alto Networks, Inc. Avaya GmbH & Co. KG
manufacturer_web https://www.paloaltonetworks.com/ https://www.avaya.com/de/
security_level ATE_DPT.3, EAL4+, ALC_FLR.2 ASE_SPD.1, ADV_FSP.2, ASE_OBJ.2, ASE_REQ.2, EAL1+
dgst bdc993babbbfb13c 7ffe542d7171483d
heuristics/cert_id CCEVS-VR-VID-10392-2013 BSI-DSZ-CC-0540-2009
heuristics/cert_lab US BSI
heuristics/extracted_sars ALC_CMC.4, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ADV_TDS.4, ALC_FLR.2, ALC_DVS.1, ATE_IND.2 ALC_LCD.2, ALC_CMC.1, ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ASE_ECD.1, APE_ECD.1, ASE_TSS.1, ASE_SPD.1, AVA_VAN.1, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, ATE_FUN.2, AGD_OPE.1, AGD_PRE.1, APE_REQ.2, ATE_IND.1, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, APE_INT.1, APE_SPD.1, ALC_CMS.1, APE_OBJ.2, ASE_CCL.1, ADV_TDS.6, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 3.1.2, 4.0.12 5.1
heuristics/scheme_data
  • category: Firewall
  • certification_date: 11.04.2013
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 11.04.2015
  • id: CCEVS-VR-VID10392
  • product: Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall with PAN-OS 4.0.12-h2 and User Identification Agent v3.1.2
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10392
  • vendor: Palo Alto Networks, Inc.
maintenance_updates
pdf_data/report_filename st_vid10392-vr.pdf 0540a.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10392-2013
    • cert_item: Palo Alto Networks PA-500, PA-2000 Series, PA-4000 Series, and PA-5000 Series Next-Generation Firewall running PAN-OS 4.0.12-h2
    • cert_lab: US NIAP
  • DE:
    • cert_id: BSI-DSZ-CC-0540-2009
    • cert_item: Avaya VoIP PBX System based on the Communication Manager 5.1
    • cert_lab: BSI
    • developer: Avaya GmbH & Co. KG sponsored by Avaya Inc
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10392-2013: 1
  • DE:
    • BSI-DSZ-CC-0540: 1
    • BSI-DSZ-CC-0540-2009: 16
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 3
  • EAL:
    • EAL 1: 5
    • EAL 1 augmented: 3
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 6
    • EAL1+: 2
    • EAL2: 3
    • EAL3: 4
    • EAL4: 4
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 5
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT: 1
    • ATE_DPT.3: 4
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 5
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 2
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 5
    • ASE_REQ.1: 1
    • ASE_REQ.2: 5
    • ASE_SPD: 1
    • ASE_SPD.1: 5
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 2
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 2
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • SSH:
    • SSH: 8
    • SSHv1: 1
  • TLS:
    • SSL:
      • SSL: 12
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 8
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-2006-09-001: 1
    • CCIMB-2007-09-002: 1
    • CCIMB-2007-09-003: 1
    • CCIMB-2007-09-004: 1
  • FIPS:
    • FIPS 140-2: 1
  • NIST:
    • NIST SP 800-53: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1.0, 2009-03-10, Evaluation Technical Report BSI-DSZ-CC-0540, CSC Deutschland Solutions GmbH, (confidential document) [8] Configuration list for the TOE, Version 1.0, 2009-03-09, Avaya VoIP PBX System Configuration: 1
    • Avaya GmbH & Co KG (confidential document) [9] Guidance CD “Communication Manager 5.0”, Publication Date: January 2008 [10] Guidance CD: 1
  • OutOfScope:
    • TOE but relevant for the operation. Also here, the network devices like switches and routers are out of scope. This holds also valid for the connection to the internet (the SIP trunk) and the required network: 1
    • may implement some security features like IEEE 802.1X network device authentication. They are out of scope. Their existence and their security features can be assumed. The protection zone “Server” contains: 1
    • out of scope: 2
pdf_data/report_metadata
  • /Author: SAIC
  • /CreationDate: D:20130514115641
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130514115641
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Validation Report
  • /Title: Palo Alto Networks Inc. PA-Series Next Generation Firewall
  • pdf_file_size_bytes: 483560
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20090421135047+02'00'
  • /Creator: Writer
  • /Keywords: "Avaya VoIP PBX Systembased on the Communication Manager 5.1, Avaya GmbH & Co. KG, Avaya Inc., BSI-DSZ-CC-0540-2009"
  • /ModDate: D:20090504155601+02'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0540-2009
  • pdf_file_size_bytes: 856495
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename st_vid10392-st.pdf 0540b.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0540: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL4: 3
    • EAL4 augmented: 3
  • EAL:
    • EAL 1: 1
    • EAL 1 augmented: 1
    • EAL1: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.4: 11
    • ADV_FSP.5: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 7
    • ADV_INT.1: 1
    • ADV_TDS: 1
    • ADV_TDS.3: 15
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 15
    • ALC_CMS: 1
    • ALC_CMS.4: 6
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_DVS: 1
    • ALC_DVS.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 16
    • ALC_LCD: 1
    • ALC_LCD.1: 6
    • ALC_TAT: 1
    • ALC_TAT.1: 7
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 5
    • ATE_DPT: 1
    • ATE_DPT.3: 9
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.3: 7
  • ADV:
    • ADV_FSP.1: 4
    • ADV_FSP.2: 7
  • AGD:
    • AGD_OPE.1: 5
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 4
    • ASE_REQ.1: 2
    • ASE_REQ.2: 5
    • ASE_SPD.1: 3
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 2
    • FAU_ARP.1: 4
    • FAU_ARP.1.1: 1
    • FAU_GEN: 10
    • FAU_GEN.1: 4
    • FAU_GEN.2: 1
    • FAU_SAA: 7
    • FAU_SAA.1: 2
    • FAU_SAR: 4
    • FAU_SAR.1: 3
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 3
    • FAU_SAR.3.1: 1
    • FAU_SEL: 5
    • FAU_SEL.1: 2
    • FAU_STG: 10
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 4
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.2: 1
    • FCS_COP: 1
    • FCS_COP.1: 27
    • FCS_COP.1.1: 6
    • FCS_COP_EXT.1: 1
  • FDP:
    • FDP_IFC.1: 19
    • FDP_IFC.1.1: 3
    • FDP_IFF.1: 21
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 5
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_IFF.1.6: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP: 1
    • FDP_RIP.2: 3
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 1
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 5
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.2: 3
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 3
    • FIA_USB.1.1: 1
  • FMT:
    • FMT_MOF.1: 25
    • FMT_MOF.1.1: 7
    • FMT_MSA: 11
    • FMT_MSA.1: 5
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 24
    • FMT_MTD.1.1: 7
    • FMT_MTD.2: 10
    • FMT_MTD.2.1: 2
    • FMT_MTD.2.2: 2
    • FMT_REV: 1
    • FMT_REV.1: 3
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 1
    • FMT_SMR.2: 3
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 2
  • FPT:
    • FPT_FLS: 2
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_ITC: 3
    • FPT_ITC.1: 5
    • FPT_ITC.1.1: 1
    • FPT_ITT: 2
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_RCV: 1
    • FPT_RCV.1: 3
    • FPT_RCV.1.1: 1
    • FPT_RPL: 1
    • FPT_RPL.1: 3
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
  • FRU:
    • FRU_FLT: 2
    • FRU_FLT.1: 6
    • FRU_FLT.1.1: 1
    • FRU_RSA.1: 11
    • FRU_RSA.1.1: 2
  • FTA:
    • FTA_SSL: 4
    • FTA_SSL.1: 1
    • FTA_SSL.2: 4
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_TAB: 1
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
    • FTA_TSE: 1
    • FTA_TSE.1: 3
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FDP:
    • FDP_ACC.1: 17
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.1: 6
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 6
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 47
    • FDP_IFC.1.1: 3
    • FDP_IFF.1: 27
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_ITC.2: 6
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_ITT.1: 1
    • FDP_ITT.2: 6
    • FDP_ITT.2.1: 1
    • FDP_ITT.2.2: 1
    • FDP_RIP.1: 1
    • FDP_RIP.2: 6
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 10
    • FIA_UAU.2.1: 2
    • FIA_UAU.3: 6
    • FIA_UAU.3.1: 1
    • FIA_UAU.3.2: 1
    • FIA_UID.1: 21
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 14
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 35
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 50
    • FMT_SMF.1.1: 6
    • FMT_SMR.1: 44
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_STM.1: 2
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FTP:
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.NO_TOE_BYPASS: 1
    • A.PHYSICAL: 1
    • A.UIA_ONLY: 1
  • O:
    • O.ADMIN_ROLE: 1
    • O.AUDIT_GENERATION: 1
    • O.AUDIT_PROTECTION: 1
    • O.AUDIT_REVIEW: 1
    • O.CHANGE_MANAGEMENT: 1
    • O.CORRECT_: 1
    • O.CRYPTOGRAPHIC_: 1
    • O.CRYPTOGRAPHY_: 1
    • O.DISPLAY_BANNER: 1
    • O.DOCUMENT_KEY_LEAKAGE: 1
    • O.MAINT_MODE: 2
    • O.MANAGE: 2
    • O.MEDIATE: 4
    • O.REPLAY_DETECTION: 1
    • O.RESIDUAL_INFORMATION: 1
    • O.RESOURCE_SHARING: 1
    • O.ROBUST_ADMIN_GUIDANCE: 1
    • O.ROBUST_TOE_ACCESS: 1
    • O.SELF_PROTECTION: 2
    • O.SOUND_IMPLEMENTATION: 1
    • O.THOROUGH_FUNCTIONAL_: 1
    • O.TIME_STAMPS: 1
    • O.TRUSTED_PATH: 1
    • O.VULNERABILITY_ANALYSIS_TEST: 1
  • OE:
    • OE.CRYPTANALYTIC: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_TOE_BYPASS: 1
    • OE.PHYSICAL: 1
    • OE.UIA_ONLY: 1
  • T:
    • T.ADDRESS_MASQUERADE: 1
    • T.ADMIN_ERROR: 1
    • T.ADMIN_ROGUE: 1
    • T.AUDIT_COMPROMISE: 1
    • T.CRYPTO_COMPROMISE: 1
    • T.FLAWED_DESIGN: 1
    • T.FLAWED_IMPLEMENTATION: 1
    • T.MALICIOUS_TSF_: 1
    • T.MASQUERADE: 1
    • T.POOR_TEST: 1
    • T.REPLAY: 1
    • T.RESIDUAL_DATA: 1
    • T.RESOURCE_EXHAUSTION: 1
    • T.SPOOFING: 1
    • T.UNATTENDED_SESSION: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNIDENTIFIED_ACTIONS: 1
    • T.UNKNOWN_STATE: 1
  • A:
    • A.ADMIN: 4
    • A.AVAILABLE: 3
    • A.DEVICES: 3
    • A.ERRMONITORING: 3
    • A.LOCATION: 3
    • A.PHYSICAL: 4
    • A.SECDEV: 3
    • A.SECNET: 3
    • A.USER: 3
    • A.VPN: 3
  • O:
    • O.AUTHENTICATE: 1
    • O.CONFCLIENT: 1
    • O.DISCLOSE: 1
    • O.LOGEXPORT: 1
    • O.MEDIATION: 1
    • O.RESTRICTION: 1
    • O.SELFPROTECT: 1
  • OE:
    • OE.ADMIN: 14
    • OE.AVAILABLE: 2
    • OE.DEVICES: 3
    • OE.ERRMONITORING: 5
    • OE.LOCATION: 5
    • OE.LOGOUT: 3
    • OE.NETMONITOR: 7
    • OE.OS: 3
    • OE.PHYSICAL: 9
    • OE.SECDEV: 2
    • OE.SECNET: 4
    • OE.USER: 2
    • OE.VPN: 4
  • OSP:
    • OSP.NETMONITOR: 3
    • OSP.OS: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 5
      • HMAC-SHA-256: 1
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 6
      • Diffie-Hellman: 4
  • RSA:
    • RSA-2048: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 15
    • SHA2:
      • SHA-2: 1
      • SHA-256: 1
      • SHA-384: 2
      • SHA-512: 2
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 13
    • IKEv1: 2
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 14
    • SSHv1: 1
  • TLS:
    • SSL:
      • SSL: 22
    • TLS:
      • TLS: 3
      • TLS 1.2: 1
      • TLS v1.0: 3
      • TLSv1.0: 1
  • VPN:
    • VPN: 40
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 14
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
  • FIPS:
    • FIPS 140-2: 12
    • FIPS 180-3: 1
    • FIPS PUB 140-2: 7
    • FIPS140-2: 1
  • NIST:
    • NIST SP 800-57: 3
  • RFC:
    • RFC 792: 2
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • TOE but relevant for the operation. Also here, the network devices like switches and routers are out of scope. This holds also valid for the connection to the internet (the SIP trunk) and the required network: 1
    • are held by us. In order to define the logical scope in detail, the following functions are out of scope of the TOE: Boarder protection of all external connections like SIP trunks or remote management: 1
    • may implement some security features like IEEE 802.1X network device authentication. They are out of scope. Their existence and their security features can be assumed. The protection zone “Server” contains: 1
    • out of scope: 3
pdf_data/st_metadata
  • /Author: Avaya GmbH & Co KG
  • /CreationDate: D:20090309164738Z
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: VoIP, CM 5.1, Communication Manager
  • /ModDate: D:20090407130547+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Common Criteria Evaluation
  • /Title: Avaya VoIP PBX System Security Target
  • pdf_file_size_bytes: 773349
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different