Brocade Director Models: DCX, DCX-4S, DCX 8510-4, DCX 8510-8; Switch Appliance Models: 300, 5100, 5300, 6510, 7800, 8000, BES; Embedded Blades: 5410, 5424, 5450, 5460, 5470, 5480; Director Blade Models: FC10-6, FC8-16, FC8-32, FC8-48, FC8-64, FC16-32, FC16-48, CP8, CR8, CR4S-8, CR16-4, CR16-8, FCOE10-24, FS8-18, FX8-24

CSV information

Status archived
Valid from 28.09.2012
Valid until 05.06.2015
Scheme 🇺🇸 US
Manufacturer Brocade Communications Systems, Inc.
Category Access Control Devices and Systems
Security level EAL4+, ALC_FLR.2
Maintenance updates Brocade FOS 7.1 Version 1.0, Dated March 9, 2013 (22.11.2013) Certification report
Brocade Communications Systems, Inc. Directors and Switches w/FOS 7.2.0a Version 3.1, Dated November 26, 2013 (06.02.2014) Certification report Security target

Heuristics summary

Certificate ID: CCEVS-VR-10376-2012

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Protocols
SSH
Libraries
OpenSSL

Security level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
CCEVS-VR-10376-2012

Standards
RFC 2625, RFC 2837

File metadata

Title Validation Report for N7K
Author Tammy Compton
Creation date D:20121102094605
Modification date D:20121102094605
Pages 18
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Frontpage

Certificate ID CCEVS-VR-10376-2012
Certified item Brocade Communication Systems, Inc, 1745 Technology Dr., San Jose, CA 95110 Brocade Directors and Switches
Certification lab US NIAP

Security target

Extracted keywords

Symmetric Algorithms
AES256, AES, RC4
Asymmetric Algorithms
DH
Protocols
SSH, SSL
Libraries
OpenSSL
Block cipher modes
CBC

Claims
O.ACCESS, O.ADMIN_ROLE, O.AUDIT_GENERATION, O.MANAGE, O.TOE_PROTECTION, O.USER_AUTHENTICATION, O.USER_IDENTIFICATION, O.AUDIT_GNEERATION, T.ACCOUNTABILITY, T.ADMIN_ERROR, T.MASQERADE, T.TSF_COMPROMISE, T.UNAUTH_ACCESS, T.MASQUERADE, A.LOCATE, A.NETWORK, A.NO_EVIL, OE.NETWORK, OE.CONFIG, OE.PHYCAL
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.3
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FCS_COP.1, FCS_CKM.1, FCS_CKM, FCS_COP.1.1, FCS_CKM.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_CKM.2, FDP_ACC.1, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1, FDP_ITC.2, FDP_ACC.2, FIA_AFL, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_UAU.5, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.2.1, FIA_UID.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF, FMT_SMR, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM, FPT_STM.1, FPT_STM.1.1, FTA_MCS, FTA_TSE, FTA_MCS.1, FTA_MCS.1.1, FTA_MCS.1.2, FTA_TSE.1, FTA_TSE.1.1, FTP_TRP, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Standards
FIPS 198, FIPS 46-3, FIPS 197, FIPS 140-2, RFC 2625, RFC 2837

File metadata

Title Brocade Communications Systems, Inc. Directors and Switches Security Target
Subject Security Target
Author trinhq
Creation date D:20140207141539-05'00'
Modification date D:20140207141555-05'00'
Pages 48
Creator Acrobat PDFMaker 10.1 for Word
Producer Adobe PDF Library 10.0

Heuristics

Certificate ID: CCEVS-VR-10376-2012

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3

References

No references are available for this certificate.

Updates

  • 12.05.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 10.02.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Brocade Director Models: DCX, DCX-4S, DCX 8510-4, DCX 8510-8; Switch Appliance Models: 300, 5100, 5300, 6510, 7800, 8000, BES; Embedded Blades: 5410, 5424, 5450, 5460, 5470, 5480; Director Blade Models: FC10-6, FC8-16, FC8-32, FC8-48, FC8-64, FC16-32, FC16-48, CP8, CR8, CR4S-8, CR16-4, CR16-8, FCOE10-24, FS8-18, FX8-24', 'id': 'CCEVS-VR-VID10376', 'url': 'https://www.niap-ccevs.org/product/10376', 'certification_date': '2012-09-28', 'expiration_date': '2015-06-05', 'category': 'Miscellaneous', 'vendor': 'Brocade Communications Systems LLC A Broadcom Inc. Company', 'evaluation_facility': 'Gossamer Security Solutions', 'scheme': 'US'}.
  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': None, 'eal': 'EAL4+'}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
    • The scheme_data property was set to None.
  • 06.01.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Brocade Director Models: DCX, DCX-4S, DCX 8510-4, DCX 8510-8; Switch Appliance Models: 300, 5100, 5300, 6510, 7800, 8000, BES; Embedded Blades: 5410, 5424, 5450, 5460, 5470, 5480; Director Blade Models: FC10-6, FC8-16, FC8-32, FC8-48, FC8-64, FC16-32, FC16-48, CP8, CR8, CR4S-8, CR16-4, CR16-8, FCOE10-24, FS8-18, FX8-24', 'id': 'CCEVS-VR-VID10376', 'url': 'https://www.niap-ccevs.org/product/10376', 'certification_date': '2012-09-28', 'expiration_date': '2015-06-05', 'category': 'Miscellaneous', 'vendor': 'Brocade Communications Systems LLC A Broadcom Inc. Company', 'evaluation_facility': 'Gossamer Security Solutions', 'scheme': 'US'}.
  • 30.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Brocade Director Models: DCX, DCX-4S, DCX 8510-4, DCX 8510-8; Switch Appliance Models: 300, 5100, 5300, 6510, 7800, 8000, BES; Embedded Blades: 5410, 5424, 5450, 5460, 5470, 5480; Director Blade Models: FC10-6, FC8-16, FC8-32, FC8-48, FC8-64, FC16-32, FC16-48, CP8, CR8, CR4S-8, CR16-4, CR16-8, FCOE10-24, FS8-18, FX8-24', 'id': 'CCEVS-VR-VID10376', 'url': 'https://www.niap-ccevs.org/product/10376', 'certification_date': '2012-09-28', 'expiration_date': '2015-06-05', 'category': 'Miscellaneous', 'vendor': 'Brocade Communications Systems LLC A Broadcom Inc. Company', 'evaluation_facility': 'Gossamer Security Solutions', 'scheme': 'US'}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2012-09-28', 'expiration_date': '2015-06-05'} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Maintenance Updates of the certificate were updated.

    • The following values were removed: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2014-02-06', 'maintenance_title': 'Brocade Communications Systems, Inc. Directors and Switches w/FOS 7.2.0a Version 3.1, Dated November 26, 2013', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10376-add1.pdf', 'maintenance_st_link': None}]}.
    • The following values were added: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2014-02-06', 'maintenance_title': 'Brocade Communications Systems, Inc. Directors and Switches w/FOS 7.2.0a Version 3.1, Dated November 26, 2013', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10376-add1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10376-st.pdf'}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e9a49454120c744195c17f77d980d3d183c424e7fd455c153f0a21b03b63075a', 'txt_hash': 'b869aa3dbde99d4a351a88b4c207dae96c49a3d1806fe1a58e98a4293747c6f8'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'dea72ab47ea8250fc7cce6e99a31499e71f64ef35367c14acae03924b9f69426', 'txt_hash': '858db401b1a6f3edcd798c29a09ea04da1a56d895eb11a42daf2da7e8fe717ef'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 322856, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Title': 'Validation Report for N7K', '/Author': 'Tammy Compton', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20121102094605', '/ModDate': 'D:20121102094605', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 606396, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 48, '/Author': 'trinhq', '/Company': 'SAIC', '/ContentTypeId': '0x010100FE3FA31A2FAD6A4287EEBB8E27D92F8E', '/CreationDate': "D:20140207141539-05'00'", '/Creator': 'Acrobat PDFMaker 10.1 for Word', '/ModDate': "D:20140207141555-05'00'", '/Producer': 'Adobe PDF Library 10.0', '/STDate': 'January 5, 2012', '/STDate_Short': '01/05/2012', '/STVersion': '2.7', '/SourceModified': 'D:20140207191510', '/Subject': 'Security Target', '/Title': 'Brocade Communications Systems, Inc. Directors and Switches Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-10376-2012', 'cert_item': 'Brocade Communication Systems, Inc, 1745 Technology Dr., San Jose, CA 95110 Brocade Directors and Switches', 'cert_lab': 'US NIAP'}}.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-10376-2012': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 9, 'EAL4': 2, 'EAL 4 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 5}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 6}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 2625': 1, 'RFC 2837': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 12, 'ADV_FSP.4': 11, 'ADV_IMP.1': 7, 'ADV_TDS.3': 15}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.2': 19, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_CMC.4': 15, 'ALC_CMS.4': 6, 'ALC_DEL.1': 5, 'ALC_DVS.1': 5, 'ALC_LCD.1': 6, 'ALC_TAT.1': 7}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 5, 'ATE_DPT.2': 6, 'ATE_FUN.1': 8, 'ATE_IND.2': 7}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.3': 7}}, 'cc_sfr': {'FAU': {'FAU_GEN': 3, 'FAU_GEN.1': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1}, 'FCS': {'FCS_COP.1': 16, 'FCS_CKM.1': 16, 'FCS_CKM': 3, 'FCS_COP.1.1': 2, 'FCS_CKM.1.1': 2, 'FCS_CKM.4': 10, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 2}, 'FDP': {'FDP_ACC.1': 13, 'FDP_ACC': 1, 'FDP_ACF': 3, 'FDP_IFC': 1, 'FDP_IFF': 3, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 4, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 11, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 4, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1': 3, 'FDP_ITC.2': 2, 'FDP_ACC.2': 1}, 'FIA': {'FIA_AFL': 3, 'FIA_ATD': 4, 'FIA_SOS': 3, 'FIA_UAU': 6, 'FIA_UID': 3, 'FIA_AFL.1': 6, 'FIA_UAU.5': 4, 'FIA_UID.2': 7, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 4, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 4, 'FIA_SOS.1.1': 1, 'FIA_UAU.2': 6, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 2}, 'FMT': {'FMT_MSA.1': 16, 'FMT_MSA.3': 17, 'FMT_MTD.1': 11, 'FMT_SMF': 3, 'FMT_SMR': 4, 'FMT_SMF.1': 11, 'FMT_SMR.1': 15, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM': 3, 'FPT_STM.1': 5, 'FPT_STM.1.1': 1}, 'FTA': {'FTA_MCS': 3, 'FTA_TSE': 3, 'FTA_MCS.1': 4, 'FTA_MCS.1.1': 1, 'FTA_MCS.1.2': 1, 'FTA_TSE.1': 4, 'FTA_TSE.1.1': 1}, 'FTP': {'FTP_TRP': 3, 'FTP_TRP.1': 4, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.ACCESS': 5, 'O.ADMIN_ROLE': 2, 'O.AUDIT_GENERATION': 2, 'O.MANAGE': 2, 'O.TOE_PROTECTION': 5, 'O.USER_AUTHENTICATION': 2, 'O.USER_IDENTIFICATION': 5, 'O.AUDIT_GNEERATION': 3}, 'T': {'T.ACCOUNTABILITY': 2, 'T.ADMIN_ERROR': 2, 'T.MASQERADE': 1, 'T.TSF_COMPROMISE': 2, 'T.UNAUTH_ACCESS': 2, 'T.MASQUERADE': 1}, 'A': {'A.LOCATE': 3, 'A.NETWORK': 3, 'A.NO_EVIL': 2}, 'OE': {'OE.NETWORK': 1, 'OE.CONFIG': 2, 'OE.PHYCAL': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES256': 1, 'AES': 1}, 'RC': {'RC4': 2}}}, 'asymmetric_crypto': {'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 21}, 'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 4}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 198': 2, 'FIPS 46-3': 2, 'FIPS 197': 10, 'FIPS 140-2': 8}, 'RFC': {'RFC 2625': 1, 'RFC 2837': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to st_vid10376-vr.pdf.
    • The st_filename property was set to st_vid10376-st.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
    • The cert_id property was set to CCEVS-VR-10376-2012.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10376-vr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10376-st.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Brocade Director Models: DCX, DCX-4S, DCX 8510-4, DCX 8510-8; Switch Appliance Models: 300, 5100, 5300, 6510, 7800, 8000, BES; Embedded Blades: 5410, 5424, 5450, 5460, 5470, 5480; Director Blade Models: FC10-6, FC8-16, FC8-32, FC8-48, FC8-64, FC16-32, FC16-48, CP8, CR8, CR4S-8, CR16-4, CR16-8, FCOE10-24, FS8-18, FX8-24 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Access Control Devices and Systems",
  "cert_link": null,
  "dgst": "10704a594b9b82c6",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-10376-2012",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "16",
        "5480",
        "5424",
        "32",
        "5460",
        "5300",
        "64",
        "5470",
        "7800",
        "5100",
        "8000",
        "24",
        "4",
        "8510",
        "8",
        "300",
        "18",
        "48",
        "6510",
        "5410",
        "5450",
        "6"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2013-11-22",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10376-add1.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Brocade FOS 7.1 Version 1.0, Dated March 9, 2013"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2014-02-06",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10376-add1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10376-st.pdf",
        "maintenance_title": "Brocade Communications Systems, Inc. Directors and Switches w/FOS 7.2.0a Version 3.1, Dated November 26, 2013"
      }
    ]
  },
  "manufacturer": "Brocade Communications Systems, Inc.",
  "manufacturer_web": "https://www.brocade.com",
  "name": "Brocade Director Models: DCX, DCX-4S, DCX 8510-4, DCX 8510-8; Switch Appliance Models: 300, 5100, 5300, 6510, 7800, 8000, BES; Embedded Blades: 5410, 5424, 5450, 5460, 5470, 5480; Director Blade Models: FC10-6, FC8-16, FC8-32, FC8-48, FC8-64, FC16-32, FC16-48, CP8, CR8, CR4S-8, CR16-4, CR16-8, FCOE10-24, FS8-18, FX8-24",
  "not_valid_after": "2015-06-05",
  "not_valid_before": "2012-09-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10376-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-10376-2012",
        "cert_item": "Brocade Communication Systems, Inc, 1745 Technology Dr., San Jose, CA 95110 Brocade Directors and Switches",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-10376-2012": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 9,
          "EAL 4 augmented": 2,
          "EAL4": 2,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 6
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "RFC": {
          "RFC 2625": 1,
          "RFC 2837": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Tammy Compton",
      "/CreationDate": "D:20121102094605",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20121102094605",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "Validation Report for N7K",
      "pdf_file_size_bytes": 322856,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "st_vid10376-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.LOCATE": 3,
          "A.NETWORK": 3,
          "A.NO_EVIL": 2
        },
        "O": {
          "O.ACCESS": 5,
          "O.ADMIN_ROLE": 2,
          "O.AUDIT_GENERATION": 2,
          "O.AUDIT_GNEERATION": 3,
          "O.MANAGE": 2,
          "O.TOE_PROTECTION": 5,
          "O.USER_AUTHENTICATION": 2,
          "O.USER_IDENTIFICATION": 5
        },
        "OE": {
          "OE.CONFIG": 2,
          "OE.NETWORK": 1,
          "OE.PHYCAL": 2
        },
        "T": {
          "T.ACCOUNTABILITY": 2,
          "T.ADMIN_ERROR": 2,
          "T.MASQERADE": 1,
          "T.MASQUERADE": 1,
          "T.TSF_COMPROMISE": 2,
          "T.UNAUTH_ACCESS": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 12,
          "ADV_FSP": 1,
          "ADV_FSP.4": 11,
          "ADV_IMP": 1,
          "ADV_IMP.1": 7,
          "ADV_TDS": 1,
          "ADV_TDS.3": 15
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 10,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 15,
          "ALC_CMS": 1,
          "ALC_CMS.4": 6,
          "ALC_DEL": 1,
          "ALC_DEL.1": 5,
          "ALC_DVS": 1,
          "ALC_DVS.1": 5,
          "ALC_FLR": 1,
          "ALC_FLR.2": 19,
          "ALC_LCD": 1,
          "ALC_LCD.1": 6,
          "ALC_TAT": 1,
          "ALC_TAT.1": 7
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 5,
          "ATE_DPT": 1,
          "ATE_DPT.2": 6,
          "ATE_FUN": 1,
          "ATE_FUN.1": 8,
          "ATE_IND": 1,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 7
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 3,
          "FAU_GEN.1": 6,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1
        },
        "FCS": {
          "FCS_CKM": 3,
          "FCS_CKM.1": 16,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 10,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 16,
          "FCS_COP.1.1": 2
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 13,
          "FDP_ACC.1.1": 1,
          "FDP_ACC.2": 1,
          "FDP_ACF": 3,
          "FDP_ACF.1": 4,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC": 1,
          "FDP_IFC.1": 11,
          "FDP_IFC.1.1": 1,
          "FDP_IFF": 3,
          "FDP_IFF.1": 4,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_ITC.1": 3,
          "FDP_ITC.2": 2
        },
        "FIA": {
          "FIA_AFL": 3,
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 4,
          "FIA_ATD.1": 4,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 3,
          "FIA_SOS.1": 4,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 6,
          "FIA_UAU.2": 6,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 4,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID": 3,
          "FIA_UID.1": 2,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 16,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 17,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_MTD.1": 11,
          "FMT_MTD.1.1": 2,
          "FMT_SMF": 3,
          "FMT_SMF.1": 11,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 4,
          "FMT_SMR.1": 15,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM": 3,
          "FPT_STM.1": 5,
          "FPT_STM.1.1": 1
        },
        "FTA": {
          "FTA_MCS": 3,
          "FTA_MCS.1": 4,
          "FTA_MCS.1.1": 1,
          "FTA_MCS.1.2": 1,
          "FTA_TSE": 3,
          "FTA_TSE.1": 4,
          "FTA_TSE.1.1": 1
        },
        "FTP": {
          "FTP_TRP": 3,
          "FTP_TRP.1": 4,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 4
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 21
        },
        "TLS": {
          "SSL": {
            "SSL": 7
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 8,
          "FIPS 197": 10,
          "FIPS 198": 2,
          "FIPS 46-3": 2
        },
        "RFC": {
          "RFC 2625": 1,
          "RFC 2837": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1,
            "AES256": 1
          },
          "RC": {
            "RC4": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "trinhq",
      "/Company": "SAIC",
      "/ContentTypeId": "0x010100FE3FA31A2FAD6A4287EEBB8E27D92F8E",
      "/CreationDate": "D:20140207141539-05\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 10.1 for Word",
      "/ModDate": "D:20140207141555-05\u002700\u0027",
      "/Producer": "Adobe PDF Library 10.0",
      "/STDate": "January 5, 2012",
      "/STDate_Short": "01/05/2012",
      "/STVersion": "2.7",
      "/SourceModified": "D:20140207191510",
      "/Subject": "Security Target",
      "/Title": "Brocade Communications Systems, Inc. Directors and Switches Security Target",
      "pdf_file_size_bytes": 606396,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 48
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10376-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10376-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e9a49454120c744195c17f77d980d3d183c424e7fd455c153f0a21b03b63075a",
      "txt_hash": "b869aa3dbde99d4a351a88b4c207dae96c49a3d1806fe1a58e98a4293747c6f8"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "dea72ab47ea8250fc7cce6e99a31499e71f64ef35367c14acae03924b9f69426",
      "txt_hash": "858db401b1a6f3edcd798c29a09ea04da1a56d895eb11a42daf2da7e8fe717ef"
    }
  },
  "status": "archived"
}