This page was not yet optimized for use on mobile devices.
ALE Omniswitch 6250, 6350, and 6450 with the AOS 6.7.1.79.R04 firmware and ALE Omniswitch 6860, 6865, 6900, 9900, and 10K with the AOS 8.3.1.348.R01 firmware
CSV information ?
Status | archived |
---|---|
Valid from | 12.05.2017 |
Valid until | 12.05.2022 |
Scheme | 🇸🇪 SE |
Manufacturer | ALE USA Inc |
Category | Network and Network-Related Devices and Systems |
Security level | EAL2, ALC_FLR.2 |
Heuristics summary ?
Certificate ID: CSEC2016005
Certificate ?
Extracted keywords
Security level
EAL 2Security Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.2Evaluation facilities
atsecFile metadata
Creation date | D:20170512140716+02'00' |
---|---|
Pages | 1 |
Certification report ?
Extracted keywords
Hash functions
MD5Schemes
MACProtocols
SSH, TLS, TLS v1.1, IPsecLibraries
OpenSSLSecurity level
EAL 2, EAL2, EAL 2 augmentedClaims
T.UNAUTHORIZED_ADMINISTRATOR_ACCESS, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_COMMUNICATION_CHANNELS, T.WEAK_AUTHENTICATION_ENDPOINTS, T.UPDATE_COMPROMISE, T.UNDETECTED_ACTIVITY, T.SECURITY_FUNCTIONALITY_COMPROMISE, T.PASSWORD_CRACKING, T.INFORMATION_FLOW_POLICY_VIOLATION, A.LIMITED_FUNCTIONALITY, A.TRUSTED_ADMINISTRATOR, A.REGULAR_UPDATES, A.PHYSICAL_PROTECTION, A.ADMIN_CREDENTIALS_SECURE, A.SERVICES_RELIABLESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Certificates
CSEC2016005Evaluation facilities
atsecStandards
ISO/IEC 17025, X.509, CCMB-2012-09-001, CCMB-2012-09-004File metadata
Title | Microsoft Word - Certification Report Omniswitch Draft.doc |
---|---|
Author | jyjoh |
Creation date | D:20170511192155 |
Modification date | D:20170511192155 |
Pages | 22 |
Creator | PScript5.dll Version 5.2.2 |
Producer | GPL Ghostscript 8.15 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, Triple-DES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
ECDH, ECDHE, ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, MD5Schemes
MAC, Key ExchangeProtocols
SSH, SSL, SSLv1.0, SSLv2.0, SSLv3.0, TLS, TLS v1.1, TLS 1.2, TLS 1.1, TLSv1.1, TLSv1.2, TLSv1.0, TLS v1.2, IKE, IPsecRandomness
DRBG, RBGLibraries
OpenSSLElliptic Curves
P-256, P-384, P-521, secp256r1, secp384r1, secp521r1Block cipher modes
CBC, GCMTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384Trusted Execution Environments
SESecurity level
EAL2Claims
O.ADMIN_ACCESS, O.ADMIN_SESSION, O.CRYPTOGRAPHY, O.COMMUNICATION_CHANNELS, O.TRUSTED_UPDATES, O.AUDIT, O.TSF_DATA_PROTECTION, O.STRONG_PASSWORDS, O.ACCESS_BANNER, O.MEDIATE, O.SELF_TESTS, T.UNAUTHORIZED_ADMINISTRATOR_ACCESS, T.WEAK_CRYPTOGRAPHY, T.WEAK_AUTHENTICATION_ENDPOINTS, T.UPDATE_COMPROMISE, T.UNDETECTED_ACTIVITY, T.SECURITY_FUNCTIONALITY_COMPROMISE, T.PASSWORD_CRACKING, T.INFORMATION_FLOW_POLICY_VIOLATION, T.UNTRUSTED_COMMUNICATION_CHANNELS, A.SERVICES_RELIABLE, A.LIMITED_FUNCTIONALITY, A.PHYSICAL_PROTECTION, A.TRUSTED_ADMINISTRATOR, A.REGULAR_UPDATES, A.ADMIN_CREDENTIALS_SECURE, OE.SERVICES_RELIABLE, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.TRUSTED_ADMIN, OE.UPDATES, OE.ADMIN_CREDENTIALS_SECURESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_STG_EXT, FAU_STG_EXT.1, FAU_STG_EXT.2, FAU_STG_EXT.3, FAU_GEN.1, FAU_GEN.2, FAU_STG.1, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.1.3, FAU_STG_EXT.2.1, FAU_STG_EXT.3.1, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_STG.1.1, FAU_STG.1.2, FCS_RBG_EXT, FCS_RBG_EXT.1, FCS_SSHC_EXT, FCS_SSHC_EXT.1, FCS_SSHS_EXT, FCS_SSHS_EXT.1, FCS_TLSC_EXT, FCS_TLSC_EXT.1, FCS_TLSC_EXT.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SSHC_EXT.1.5, FCS_TLSC_EXT.1.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FIA_PMG_EXT, FIA_PMG_EXT.1, FIA_UIA_EXT, FIA_UIA_EXT.1, FIA_UAU_EXT, FIA_UAU_EXT.2, FIA_UAU.7, FIA_SOS.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU.5, FIA_UID.1, FIA_USB.1, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.2.1, FIA_UAU.7.1, FIA_SOS.1.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_SMF.1, FMT_MOF.1, FMT_MTD.1, FMT_SMR.2, FMT_MSA.1, FMT_MSA.3, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FPT_SKP_EXT, FPT_SKP_EXT.1, FPT_APW_EXT, FPT_APW_EXT.1, FPT_TST_EXT, FPT_TST_EXT.1, FPT_TST_EXT.2, FPT_TUD_EXT, FPT_TUD_EXT.1, FPT_STM.1, FPT_SKP_EXT.1.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_TST_EXT.1.1, FPT_TST_EXT.2.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TUD_EXT.2, FPT_STM.1.1, FTA_SSL.3, FTA_SSL_EXT, FTA_SSL_EXT.1, FTA_SSL.4, FTA_TAB.1, FTA_SSL, FTA_SSL_EXT.1.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Certificates
CSEC 2016005Evaluation facilities
atsecCertification process
out of scope, indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. The TSF shall ensure that the SSH protocolCertification process
out of scope, indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. The TSF shall ensure that the SSH protocolStandards
FIPS PUB 186-4, FIPS 140-2, PKCS #1, RFC4301, RFC4303, RFC3602, RFC4106, RFC2451, RFC4253, RFC4252, RFC4251, RFC5246, RFC4346, RFC3268, RFC4492, RFC5289, RFC6125, RFC 6125, RFC 5280, RFC6460, RFC5280, RFC2560, RFC5759, RFC2986, RFC4254, RFC5656, RFC6668, ISO/IEC 9796-2, ISO/IEC 14888-3, ISO/IEC 18031:2011, X.509File metadata
Title | Alcatel-Lucent Enterprise OmniSwitches with AOS 6.7.1.R04 and AOS 8.3.1.R01 Security Target for EAL2 (version 1.9 as of 2017-04-12) |
---|---|
Subject | Alcatel-Lucent Enterprise OmniSwitches with AOS 6.7.1.79.R04 and AOS 8.3.1.348.R01 |
Keywords | ALE USA Inc., ALE, Alcatel-Lucent Enterprise, OmniSwitch, Alcatel-Lucent Operating System, AOS, OmniSwitch 6250, OmniSwitch 6350, OmniSwitch 6450, OmniSwitch 6860, OmniSwitch 6865, OmniSwitch 6900, OmniSwitch 9900, OmniSwitch 10K, OS6250, OS6350, OS6450, OS6860, OS6865, OS6900, OS9900, OS10K |
Author | Alejandro Masino (generated by CCTool version 2.8.2-beta08) |
Creation date | D:20170413160933Z |
Modification date | D:20170413160933Z |
Pages | 128 |
Creator | Unknown |
Producer | XEP 4.25.502 |
Heuristics ?
Certificate ID: CSEC2016005
Extracted SARs
ASE_CCL.1, AGD_PRE.1, ASE_REQ.2, ASE_TSS.1, ATE_COV.1, ATE_IND.2, ADV_FSP.2, ASE_ECD.1, ALC_CMS.2, ASE_SPD.1, ALC_DEL.1, ALC_FLR.2, ADV_TDS.1, ASE_INT.1, ALC_CMC.2, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.2, ADV_ARC.1, AGD_OPE.1References ?
No references are available for this certificate.
Updates ?
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name ALE Omniswitch 6250, 6350, and 6450 with the AOS 6.7.1.79.R04 firmware and ALE Omniswitch 6860, 6865, 6900, 9900, and 10K with the AOS 8.3.1.348.R01 firmware was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CertificateCCRAandSOGIS.pdf",
"dgst": "0926688c27a813eb",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CSEC2016005",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"8.3.1.348",
"6.7.1.79"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "ALE USA Inc",
"manufacturer_web": "https://www.al-enterprise.com/",
"name": "ALE Omniswitch 6250, 6350, and 6450 with the AOS 6.7.1.79.R04 firmware and ALE Omniswitch 6860, 6865, 6900, 9900, and 10K with the AOS 8.3.1.348.R01 firmware",
"not_valid_after": "2022-05-12",
"not_valid_before": "2017-05-12",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "CertificateCCRAandSOGIS.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 2,
"ALC_FLR.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20170512140716+02\u002700\u0027",
"pdf_file_size_bytes": 1403059,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "Certification Report Omniswitch.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"SE": {
"CSEC2016005": 1
}
},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_SECURE": 1,
"A.LIMITED_FUNCTIONALITY": 1,
"A.PHYSICAL_PROTECTION": 1,
"A.REGULAR_UPDATES": 1,
"A.SERVICES_RELIABLE": 1,
"A.TRUSTED_ADMINISTRATOR": 1
},
"T": {
"T.INFORMATION_FLOW_POLICY_VIOLATION": 1,
"T.PASSWORD_CRACKING": 1,
"T.SECURITY_FUNCTIONALITY_COMPROMISE": 1,
"T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1,
"T.UNDETECTED_ACTIVITY": 1,
"T.UNTRUSTED_COMMUNICATION_CHANNELS": 1,
"T.UPDATE_COMPROMISE": 1,
"T.WEAK_AUTHENTICATION_ENDPOINTS": 1,
"T.WEAK_CRYPTOGRAPHY": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.2": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 2 augmented": 1,
"EAL2": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"IPsec": {
"IPsec": 4
},
"SSH": {
"SSH": 2
},
"TLS": {
"TLS": {
"TLS": 2,
"TLS v1.1": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 5
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-004": 1
},
"ISO": {
"ISO/IEC 17025": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "jyjoh",
"/CreationDate": "D:20170511192155",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20170511192155",
"/Producer": "GPL Ghostscript 8.15",
"/Title": "Microsoft Word - Certification Report Omniswitch Draft.doc",
"pdf_file_size_bytes": 320092,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 22
},
"st_filename": "ALE_OmniSwitch_EAL2M_ST_1.9.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDH": {
"ECDH": 1,
"ECDHE": 1
},
"ECDSA": {
"ECDSA": 10
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"SE": {
"CSEC 2016005": 1
}
},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_SECURE": 3,
"A.LIMITED_FUNCTIONALITY": 3,
"A.PHYSICAL_PROTECTION": 3,
"A.REGULAR_UPDATES": 3,
"A.SERVICES_RELIABLE": 4,
"A.TRUSTED_ADMINISTRATOR": 3
},
"O": {
"O.ACCESS_BANNER": 5,
"O.ADMIN_ACCESS": 15,
"O.ADMIN_SESSION": 7,
"O.AUDIT": 13,
"O.COMMUNICATION_CHANNELS": 18,
"O.CRYPTOGRAPHY": 18,
"O.MEDIATE": 16,
"O.SELF_TESTS": 4,
"O.STRONG_PASSWORDS": 8,
"O.TRUSTED_UPDATES": 8,
"O.TSF_DATA_PROTECTION": 11
},
"OE": {
"OE.ADMIN_CREDENTIALS_SECURE": 2,
"OE.NO_GENERAL_PURPOSE": 2,
"OE.PHYSICAL": 2,
"OE.SERVICES_RELIABLE": 3,
"OE.TRUSTED_ADMIN": 2,
"OE.UPDATES": 2
},
"T": {
"T.INFORMATION_FLOW_POLICY_VIOLATION": 2,
"T.PASSWORD_CRACKING": 3,
"T.SECURITY_FUNCTIONALITY_COMPROMISE": 2,
"T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 3,
"T.UNDETECTED_ACTIVITY": 3,
"T.UNTRUSTED_COMMUNICATION_CHANNELS": 1,
"T.UPDATE_COMPROMISE": 3,
"T.WEAK_AUTHENTICATION_ENDPOINTS": 2,
"T.WEAK_CRYPTOGRAPHY": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.2": 4
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 133
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 9,
"FAU_GEN.1": 14,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 6,
"FAU_GEN.2.1": 1,
"FAU_STG.1": 8,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG_EXT": 5,
"FAU_STG_EXT.1": 14,
"FAU_STG_EXT.1.1": 2,
"FAU_STG_EXT.1.2": 2,
"FAU_STG_EXT.1.3": 4,
"FAU_STG_EXT.2": 4,
"FAU_STG_EXT.2.1": 1,
"FAU_STG_EXT.3": 4,
"FAU_STG_EXT.3.1": 1
},
"FCS": {
"FCS_CKM.1": 37,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 18,
"FCS_CKM.2.1": 2,
"FCS_CKM.4": 20,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 108,
"FCS_COP.1.1": 8,
"FCS_RBG_EXT": 3,
"FCS_RBG_EXT.1": 16,
"FCS_RBG_EXT.1.1": 2,
"FCS_RBG_EXT.1.2": 3,
"FCS_SSHC_EXT": 32,
"FCS_SSHC_EXT.1": 18,
"FCS_SSHC_EXT.1.5": 1,
"FCS_SSHS_EXT": 29,
"FCS_SSHS_EXT.1": 18,
"FCS_TLSC_EXT": 23,
"FCS_TLSC_EXT.1": 5,
"FCS_TLSC_EXT.1.1": 2,
"FCS_TLSC_EXT.2": 18
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_IFC.1": 21,
"FDP_IFC.1.1": 2,
"FDP_IFF.1": 16,
"FDP_IFF.1.1": 2,
"FDP_IFF.1.2": 2,
"FDP_IFF.1.3": 2,
"FDP_IFF.1.4": 2,
"FDP_IFF.1.5": 2,
"FDP_ITC.1": 11,
"FDP_ITC.2": 11,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_ATD.1": 9,
"FIA_ATD.1.1": 1,
"FIA_PMG_EXT": 3,
"FIA_PMG_EXT.1": 12,
"FIA_PMG_EXT.1.1": 2,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 8,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 7,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.7": 7,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT": 3,
"FIA_UAU_EXT.2": 12,
"FIA_UAU_EXT.2.1": 2,
"FIA_UIA_EXT": 3,
"FIA_UIA_EXT.1": 15,
"FIA_UIA_EXT.1.1": 2,
"FIA_UIA_EXT.1.2": 2,
"FIA_UID.1": 9,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 6,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF.1": 34,
"FMT_MOF.1.1": 3,
"FMT_MSA.1": 8,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 8,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 18,
"FMT_MTD.1.1": 2,
"FMT_SMF.1": 21,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 2,
"FMT_SMR.2": 18,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_APW_EXT": 3,
"FPT_APW_EXT.1": 12,
"FPT_APW_EXT.1.1": 2,
"FPT_APW_EXT.1.2": 2,
"FPT_SKP_EXT": 3,
"FPT_SKP_EXT.1": 12,
"FPT_SKP_EXT.1.1": 2,
"FPT_STM.1": 10,
"FPT_STM.1.1": 1,
"FPT_TST_EXT": 4,
"FPT_TST_EXT.1": 12,
"FPT_TST_EXT.1.1": 3,
"FPT_TST_EXT.2": 6,
"FPT_TST_EXT.2.1": 1,
"FPT_TUD_EXT": 2,
"FPT_TUD_EXT.1": 13,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 3,
"FPT_TUD_EXT.1.3": 2,
"FPT_TUD_EXT.2": 1
},
"FTA": {
"FTA_SSL": 1,
"FTA_SSL.3": 9,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 8,
"FTA_SSL.4.1": 1,
"FTA_SSL_EXT": 4,
"FTA_SSL_EXT.1": 12,
"FTA_SSL_EXT.1.1": 2,
"FTA_TAB.1": 12,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC.1": 12,
"FTP_ITC.1.1": 2,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 8,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"indicated as \u201cREQUIRED\u201d but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. The TSF shall ensure that the SSH protocol": 2,
"out of scope": 2
}
},
"cipher_mode": {
"CBC": {
"CBC": 14
},
"GCM": {
"GCM": 7
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 35
}
},
"crypto_protocol": {
"IKE": {
"IKE": 3
},
"IPsec": {
"IPsec": 44
},
"SSH": {
"SSH": 112
},
"TLS": {
"SSL": {
"SSL": 1,
"SSLv1.0": 1,
"SSLv2.0": 1,
"SSLv3.0": 1
},
"TLS": {
"TLS": 72,
"TLS 1.1": 4,
"TLS 1.2": 4,
"TLS v1.1": 6,
"TLS v1.2": 4,
"TLSv1.0": 1,
"TLSv1.1": 18,
"TLSv1.2": 18
}
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 4
},
"MAC": {
"MAC": 39
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 14,
"P-384": 12,
"P-521": 12,
"secp256r1": 4,
"secp384r1": 4,
"secp521r1": 4
}
},
"eval_facility": {
"atsec": {
"atsec": 256
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 11
},
"SHA2": {
"SHA-2": 5,
"SHA-224": 1,
"SHA-256": 8,
"SHA-384": 4,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 13
},
"RNG": {
"RBG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 2,
"FIPS PUB 186-4": 6
},
"ISO": {
"ISO/IEC 14888-3": 1,
"ISO/IEC 18031:2011": 4,
"ISO/IEC 9796-2": 2
},
"PKCS": {
"PKCS #1": 2
},
"RFC": {
"RFC 5280": 2,
"RFC 6125": 2,
"RFC2451": 3,
"RFC2560": 4,
"RFC2986": 4,
"RFC3268": 15,
"RFC3602": 7,
"RFC4106": 3,
"RFC4251": 5,
"RFC4252": 8,
"RFC4253": 12,
"RFC4254": 2,
"RFC4301": 3,
"RFC4303": 4,
"RFC4346": 5,
"RFC4492": 14,
"RFC5246": 21,
"RFC5280": 5,
"RFC5289": 19,
"RFC5656": 2,
"RFC5759": 4,
"RFC6125": 5,
"RFC6460": 2,
"RFC6668": 2
},
"X509": {
"X.509": 27
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 21
}
},
"DES": {
"3DES": {
"Triple-DES": 7
}
},
"constructions": {
"MAC": {
"HMAC": 3,
"HMAC-SHA-256": 3,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 2
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 2
}
},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 4,
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 4,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 4,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 4,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 4,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 4,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 4,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 4,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 4,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 4,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 4,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 4,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 4,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 4,
"TLS_RSA_WITH_AES_128_CBC_SHA": 7,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 5,
"TLS_RSA_WITH_AES_256_CBC_SHA": 5,
"TLS_RSA_WITH_AES_256_CBC_SHA256": 5
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Alejandro Masino (generated by CCTool version 2.8.2-beta08)",
"/CreationDate": "D:20170413160933Z",
"/Creator": "Unknown",
"/Keywords": "ALE USA Inc., ALE, Alcatel-Lucent Enterprise, OmniSwitch, Alcatel-Lucent Operating System, AOS, OmniSwitch 6250, OmniSwitch 6350, OmniSwitch 6450, OmniSwitch 6860, OmniSwitch 6865, OmniSwitch 6900, OmniSwitch 9900, OmniSwitch 10K, OS6250, OS6350, OS6450, OS6860, OS6865, OS6900, OS9900, OS10K",
"/ModDate": "D:20170413160933Z",
"/Producer": "XEP 4.25.502",
"/Subject": "Alcatel-Lucent Enterprise OmniSwitches with AOS 6.7.1.79.R04 and AOS 8.3.1.348.R01",
"/Title": "Alcatel-Lucent Enterprise OmniSwitches with AOS 6.7.1.R04 and AOS 8.3.1.R01 Security Target for EAL2 (version 1.9 as of 2017-04-12)",
"/Trapped": "/False",
"/application": "CCTool version x.y",
"pdf_file_size_bytes": 1678792,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ietf.org/rfc/rfc4251.txt",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf",
"http://www.ietf.org/rfc/rfc5656.txt",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf",
"http://www.ietf.org/rfc/rfc4346.txt",
"http://www.ietf.org/rfc/rfc5246.txt",
"http://www.ietf.org/rfc/rfc2451.txt",
"http://www.ietf.org/rfc/rfc4254.txt",
"http://www.ietf.org/rfc/rfc4106.txt",
"http://www.ietf.org/rfc/rfc6668.txt",
"http://www.ietf.org/rfc/rfc4492.txt",
"http://www.ietf.org/rfc/rfc3268.txt",
"http://www.ietf.org/rfc/rfc4252.txt",
"http://www.ietf.org/rfc/rfc3602.txt",
"http://www.ietf.org/rfc/rfc4303.txt",
"http://www.ietf.org/rfc/rfc6460.txt",
"http://www.ietf.org/rfc/rfc5759.txt",
"http://www.ietf.org/rfc/rfc5289.txt",
"http://www.ietf.org/rfc/rfc2560.txt",
"http://www.ietf.org/rfc/rfc4253.txt",
"http://www.ietf.org/rfc/rfc5280.txt",
"http://www.ietf.org/rfc/rfc6125.txt",
"http://www.ietf.org/rfc/rfc4301.txt",
"http://www.ietf.org/rfc/rfc2986.txt"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 128
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/Certification%20Report%20Omniswitch.pdf",
"scheme": "SE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/ALE_OmniSwitch_EAL2M_ST_1.9.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f162d4753b6e08916158d2cb80d4f0a5060bed880b177c359f9e672287b4735c",
"txt_hash": "9c7daf6e2b0e23156cc18d034b6e3135a327e70b2cba2639cc8ff91d6b74dde1"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b7fafe4054158fbc0ec37169bff8e1954e1b0f7220b8d8b81cee9d64e07cb82e",
"txt_hash": "0d71a41dc87f5dd6d928a0fc2b7bfe39cbfaae55b93e2d8a78e1ff47cc8f75bf"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9e5d0576448c7d01f3538253e0218e635014b1bad6fd0339e28e54ab38b93382",
"txt_hash": "f01f4e076b36c73900beb828455a3666214cc62e60b57fd563f3c51cbc6b808a"
}
},
"status": "archived"
}