name |
Cisco cEdge Routers running IOS XE 17.12 with SD-WAN 20.12 |
Bivio 6110-NC and 6120-NC |
category |
Boundary Protection Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
CA |
US |
status |
active |
archived |
not_valid_after |
18.12.2029 |
28.08.2019 |
not_valid_before |
18.12.2024 |
28.08.2017 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/654-LSS%20CT%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10847-ci.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/654-LSS%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10847-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/654-LSS%20ST%20v1.2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10847-st.pdf |
manufacturer |
Cisco Systems, Inc. |
Bivio Networks, Inc. |
manufacturer_web |
https://www.cisco.com |
|
security_level |
EAL2+, ALC_FLR.2 |
{} |
dgst |
beb60ed58a76b232 |
876a9d8fb591e52c |
heuristics/cert_id |
654-LSS |
CCEVS-VR-VID-10847-2017 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
17.12, 20.12 |
6110, 6120 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- certification_date: 18.12.2024
- level: EAL 2+ (ALC_FLR.2)
- product: Cisco cEdge Routers running IOS XE 17.12 with SD-WAN 20.12
- vendor: Cisco Systems, Inc.
|
- category: Network Device
- certification_date: 28.08.2017
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date: 28.08.2019
- id: CCEVS-VR-VID10847
- product: Bivio 6110-NC and 6120-NC
- scheme: US
- url: https://www.niap-ccevs.org/product/10847
- vendor: Bivio Networks, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
c7cf611c6bb1e4b0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf |
pdf_data/cert_filename |
654-LSS CT v1.0.pdf |
st_vid10847-ci.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10847-2017: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Cisco:
- Cisco: 1
- Cisco Systems, Inc: 1
|
|
pdf_data/cert_keywords/eval_facility |
|
- UL:
- UL Verification Services: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Clark, Cory P.
- /CreationDate: D:20241219134340-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
- /ModDate: D:20241219134340-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 389504
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20170829154422-04'00'
- /ModDate: D:20170829154422-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 177705
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
654-LSS CR v1.0.pdf |
st_vid10847-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10847-2017
- cert_item: Bivio Networks, Inc. Bivio 6110-NC and Bivio 6120-NC
- cert_lab: US NIAP
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10847-2017: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_: 2
- T.UNAUTHORIZED_ADMINIST: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICAT: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_E: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/report_keywords/vendor |
- Cisco:
- Cisco: 11
- Cisco Systems, Inc: 2
|
|
pdf_data/report_keywords/eval_facility |
|
- UL:
- UL Verification Services: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- RFC:
- RFC 3268: 1
- RFC 5289: 1
- RFC 5424: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- Bivio 6110 device can be used to run a variety of applications for processing network data. It is out of scope for this certification to include these applications for evaluation. It is left to the customer to: 1
- and 6120-NC devices can be used to run a variety of applications for processing network data. It is out of scope for this certification process to include all those applications for evaluation, so a standard: 1
- out of scope: 2
|
pdf_data/report_metadata |
|
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20170829153647-04'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Keywords:
- /ModDate: D:20170829153650-04'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20170829193622
- /Subject:
- /Title: D
- pdf_file_size_bytes: 323443
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
654-LSS ST v1.2.pdf |
st_vid10847-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 2
- EAL2 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.2: 2
- ADV_TDS.1: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 3
- ASE:
- ASE_CCL.1: 7
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 18
- FCS_CKM.1.1: 1
- FCS_CKM.2: 7
- FCS_CKM.2.1: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 15
- FCS_RBG_EXT.1: 17
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FDP:
- FDP_ACC.1: 1
- FDP_IFC.1: 12
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_ITT.1: 12
- FDP_ITT.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 11
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 13
- FMT_MOF.1.1: 2
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.2: 12
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 3
- FPT_APW_EXT.1: 12
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_ITT: 1
- FPT_ITT.1: 7
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.1: 10
- FTA_SSL.1.1: 2
- FTA_SSL.1.2: 2
- FTA_SSL.3: 9
- FTA_SSL.4: 7
- FTA_SSL.4.1: 1
- FTA_TAB.1: 9
- FTP:
- FTP_TRP.1: 8
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 3
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 4
- FAU_STG_EXT.1.3: 12
- FAU_STG_EXT.2: 5
- FAU_STG_EXT.3: 4
- FAU_STG_EXT.3.1: 1
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.1.1: 5
- FCS_CKM.2: 6
- FCS_CKM.2.1: 3
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 2
- FCS_COP.1: 22
- FCS_COP.1.1: 12
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 3
- FCS_SSHC_EXT.1: 3
- FCS_SSHC_EXT.1.1: 2
- FCS_SSHC_EXT.1.2: 3
- FCS_SSHC_EXT.1.3: 2
- FCS_SSHC_EXT.1.4: 2
- FCS_SSHC_EXT.1.5: 5
- FCS_SSHC_EXT.1.6: 2
- FCS_SSHC_EXT.1.7: 2
- FCS_SSHC_EXT.1.8: 4
- FCS_SSHC_EXT.1.9: 3
- FCS_SSHS_EXT.1: 3
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 3
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 1
- FCS_TLSS_EXT.1: 4
- FCS_TLSS_EXT.1.1: 4
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.2.3: 1
- FIA:
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 2
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 8
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 5
- FMT_MOF.1: 26
- FMT_MOF.1.1: 13
- FMT_MTD: 4
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.2: 3
- FMT_SMR.2.1: 2
- FMT_SMR.2.2: 2
- FMT_SMR.2.3: 3
- FPT:
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 3
- FPT_TST_EXT.2: 2
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 3
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 6
- FPT_TUD_EXT.2: 2
- FPT_TUD_EXT.2.2: 2
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 9
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.CONNECTIONS: 3
- A.LOCATE: 3
- A.PHYSEC: 3
- O:
- O.ACCESS: 1
- O.ACCESS_CONTRO: 1
- O.ACCESS_CONTROL: 15
- O.ACCESS_CONTROLL: 3
- O.ACCES_CONTROL: 1
- O.ADMIN: 9
- O.AUDIT: 1
- O.AUDIT_GEN: 10
- O.AUDIT_VIEW: 4
- O.DATA: 11
- O.IDAUTH: 12
- O.MEDIATE: 7
- O.PROTECTED_COM: 1
- O.PROTECTED_COMMS: 3
- O.SELFPRO: 12
- O.SELPRO: 1
- O.TIME: 7
- O.TOE_ADMINISTRA: 1
- O.TOE_ADMINISTRATION: 2
- O.VPN: 11
- OE:
- OE: 1
- OE.ADMIN: 3
- OE.CONNECTION: 2
- OE.LOCATE: 3
- OE.PHYSEC: 2
- T:
- T.ACCOUNTABIL: 1
- T.ACCOUNTABILITY: 2
- T.ASPO: 1
- T.ASPOOF: 2
- T.MEDI: 1
- T.MEDIAT: 2
- T.NETWO: 1
- T.NETWORK_COMPROMISE: 2
- T.NOAU: 1
- T.NOAUTH: 2
- T.VP: 1
- T.VPN: 2
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY: 2
- T.UNAUTHORIZED_ADMINIST: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICA: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_E: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/st_keywords/vendor |
- Cisco:
- Cisco: 54
- Cisco Systems, Inc: 6
|
|
pdf_data/st_keywords/eval_facility |
|
- UL:
- UL Verification Services: 1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- AES:
- AES: 14
- AES-128: 2
- AES-256: 2
- AES256: 1
- CAST:
- RC:
- DES:
- constructions:
- MAC:
- HMAC: 12
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 3
- DHE: 2
- Diffie-Hellman: 7
- DSA:
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 8
- SHA-384: 6
- SHA-512: 5
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
- IPsec:
- SSH:
- TLS:
- SSL:
- SSL: 3
- SSL 2.0: 1
- SSL 3.0: 1
- SSLv3.0: 1
- TLS:
- TLS: 62
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 1
- TLS v1.0: 1
- TLSv1.2: 9
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 1
- P-256: 13
- P-384: 4
- P-521: 8
- secp256r1: 3
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
|
- TLS:
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_NULL_WITH_NULL_NULL: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 5
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
- ISO/IEC 18031:2011: 6
- ISO/IEC 18033-3: 1
- ISO/IEC 19772: 2
- NIST:
- RFC:
- RFC 6347: 2
- RFC 791: 1
- RFC 792: 1
- RFC 793: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140-2: 2
- FIPS 186-4: 4
- FIPS PUB 186-4: 5
- ISO:
- ISO/IEC 10118: 2
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-: 1
- NIST:
- NIST SP 800-131A: 2
- NIST SP 800-56B: 1
- NIST SP 800-90A: 1
- NIST SP 800-90B: 1
- SP 800-131A: 1
- SP 800-56A: 1
- SP 800-56B: 1
- PKCS:
- RFC:
- RFC 2986: 2
- RFC 3268: 3
- RFC 4251: 2
- RFC 4253: 8
- RFC 5246: 4
- RFC 5280: 5
- RFC 5289: 3
- RFC 5647: 8
- RFC 6668: 2
- RFC2104: 1
- RFC4251: 1
- RFC4868: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Defense (UTD) security features such as IPS, Cisco URL Filtering, AMP, and TLS/SSL proxy. This is out of scope for the evaluation. These services will be disabled by configuration settings. Cisco cEdge Routers: 1
- UTD) security features such as IPS, Cisco URL Filtering, AMP, and TLS/SSL proxy. This is out of scope for the evaluation: 1
- out of scope: 1
|
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. Assurance Activity TSS The evaluator shall check to: 1
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. FCS_SSHS_EXT.1.2 The TSF shall ensure that the SSH: 1
- out of scope: 3
- processing network data. There are many such applications, both commercial and open source. It is out of scope for this certification process to include all these applications for evaluation, so a standard: 1
|
pdf_data/st_metadata |
- /Author: conan
- /CreationDate: D:20241217081136-05'00'
- /ModDate: D:20241217081136-05'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - Cisco_cEdge_IOS-XE_17.12_SDWAN_20.12_EAL2_ST_v1.2 (1).docx
- pdf_file_size_bytes: 1976947
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 80
|
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |