This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Cisco Nexus 9000 Switch Series with ACI mode, APIC 6.1(2g) and NX-OS software-ACI 16.1(2g) NSCIB-CC-2400067-01-CR |
Cisco Nexus 5600 Series Switches with 2000 Series Fabric Extenders running NX-OS 7.2(1)N1(1) NSCIB-CC-15-77333-CR |
|
---|---|---|
name | Cisco Nexus 9000 Switch Series with ACI mode, APIC 6.1(2g) and NX-OS software-ACI 16.1(2g) | Cisco Nexus 5600 Series Switches with 2000 Series Fabric Extenders running NX-OS 7.2(1)N1(1) |
status | active | archived |
not_valid_after | 16.05.2030 | 13.06.2021 |
not_valid_before | 16.05.2025 | 13.06.2016 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400067-01-Cert.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400067-01_CR.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-15-77333-CR%20(revised).pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400067-01-ST.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20Nexus%202k%205k%20Switch%20ST%20v1.0_060316.pdf |
security_level | EAL2+, ALC_FLR.2 | EAL2 |
dgst | be4aef63b4508966 | 90cc9f355fabbec2 |
heuristics/cert_id | NSCIB-CC-2400067-01-CR | NSCIB-CC-15-77333-CR |
heuristics/cpe_matches | cpe:2.3:o:cisco:nx-os:6.1\(3\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:6.1\(2\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:6.1\(4\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:6.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:6.1\(1\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:6.1\(5\):*:*:*:*:*:*:* | cpe:2.3:o:cisco:nx-os:7.2\(1\)n1\(1\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:7.2:*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:7.2\(1\)d\(1\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:nx-os:7.2\(0\)n1\(1\):*:*:*:*:*:*:* |
heuristics/related_cves | CVE-2014-3295, CVE-2016-1351, CVE-2012-4135, CVE-2013-6982, CVE-2013-6975, CVE-2017-6770, CVE-2016-1453, CVE-2016-1409 | CVE-2016-1409, CVE-2017-6770, CVE-2018-0102 |
heuristics/extracted_sars | ADV_ARC.1, ALC_CMC.2, AGD_PRE.1, ASE_REQ.2, ATE_FUN.1, ASE_INT.1, AGD_OPE.1, ASE_SPD.1, ALC_CMS.2, ATE_COV.1, ASE_ECD.1, ALC_FLR.2, ATE_IND.2, ASE_OBJ.2, ASE_CCL.1, AVA_VAN.2, ADV_FSP.2, ALC_DEL.1, ASE_TSS.1, ADV_TDS.1 | ADV_ARC.1, ALC_CMS.2, AVA_VAN.2, AGD_PRE.1, ATE_COV.1, ATE_FUN.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, ATE_IND.2, ALC_CMC.2 |
heuristics/extracted_versions | 16.1, 6.1 | 7.2 |
heuristics/scheme_data |
|
|
pdf_data/cert_filename | NSCIB-CC-2400067-01-Cert.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | NSCIB-CC-2400067-01_CR.pdf | [CR] NSCIB-CC-15-77333-CR (revised).pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | NSCIB-CC-2400067-01-ST.pdf | [ST] Nexus 2k 5k Switch ST v1.0_060316.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/convert_garbage | False | True |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |