Brocade Director Models: 48000 and DCX; Brocade Switch Models: 200E, 300, 4100, 4900, 5000, 5100, 5300, 7500 and 7500E; Director Blede Models: FC2-16, FC4-16, FC4-32, FC4-46, FC4-18, FC4-32, FC4-48, FR4-18I, FC8-16, FC8-32, FC8-48, CP4, CP8, CR8; Embedded Bledes: 4012, 4016, 4018, 4020 and 4024

CSV information

Status archived
Valid from 31.03.2009
Valid until 20.07.2012
Scheme 🇺🇸 US
Manufacturer Brocade Communications Systems, Inc.
Category Access Control Devices and Systems
Security level ALC_FLR.2, EAL3+

Heuristics summary

Certificate ID: CCEVS-VR-VID-10233-2009

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Protocols
SSH

Security level
EAL 3, EAL3, EAL 3 augmented, EAL3 augmented
Security Assurance Requirements (SAR)
ADV_FSP, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_LCD, ALC_DVS
Certificates
CCEVS-VR-VID10233-2009

Standards
FIPS 140-2

File metadata

Title Draft Validation Report
Author SM Weinberg
Creation date D:20090528171141
Modification date D:20090528171141
Pages 14
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Frontpage

Certificate ID CCEVS-VR-VID10233-2009
Certification lab US NIAP

Security target

Extracted keywords

Symmetric Algorithms
RC4
Asymmetric Algorithms
DH
Protocols
SSH, SSL
Libraries
OpenSSL

Security level
EAL 3, EAL3, EAL 3 augmented, EAL3 augmented
Claims
O.ACCESS, O.ADMIN_ROLE, O.AUDIT_GENERATION, O.MANAGE, O.TOE_PROTECTION, O.USER_AUTHENTICATION, O.USER_IDENTIFICATION, O.AUDIT_GNEERATION, T.ACCOUNTABILITY, T.ADMIN_ERROR, T.MASQERADE, T.TSF_COMPROMISE, T.UNAUTH_ACCESS, T.MASQUERADE, A.LOCATE, A.NETWORK, A.NO_EVIL, OE.NETWORK, OE.CONFIG, OE.PHYCAL
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_ACC.2, FIA_ATD, FIA_UAU, FIA_UID, FIA_UAU.1, FIA_UID.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.2.1, FIA_UID.1, FMT_MSA, FMT_MTD, FMT_SMF, FMT_SMR, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FPT_ITT, FPT_STM, FPT_STM.1, FPT_STM.1.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_TRP

Standards
RFC 2625, RFC 2837

File metadata

Title Brocade Communications Systems, Inc. Directors and Switches Security Target
Subject Security Target
Author SAIC CCTL IA Team
Creation date D:20090528171052
Modification date D:20090528171052
Pages 38
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CCEVS-VR-VID-10233-2009

Extracted SARs

ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Scheme data

Product Brocade Director Models: 48000 and DCX; Brocade Switch Models: 200E, 300, 4100, 4900, 5000, 5100, 5300, 7500 and 7500E; Director Blade Models: FC2-16, FC4-16, FC4-32, FC4-46, FC4-18, FC4-32, FC4-48, FR4-18I, FC8-16, FC8-32, FC8-48, CP4, CP8, CR8; Embedded Blades: 4012, 4016, 4018, 4020, and 4024
Id CCEVS-VR-VID10233
Url https://www.niap-ccevs.org/products/10233
Api Url https://www.niap-ccevs.org/api/project/product/pcl_products/10233/
Certification Date 31.03.2009
Expiration Date None
Category Sensitive Data Protection
Categories ['Sensitive Data Protection', ' System Access Control']
Vendor Brocade Communications Systems LLC A Broadcom Inc. Company
Evaluation Facility Leidos Common Criteria Testing Laboratory
Scheme US

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Access Control Devices and Systems",
  "cert_link": null,
  "dgst": "9c5dbb1c2bf6afa8",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10233-2009",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL3+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5000",
        "5100",
        "32",
        "4018",
        "16",
        "48",
        "4012",
        "18",
        "5300",
        "300",
        "48000",
        "4016",
        "4024",
        "46",
        "4900",
        "7500",
        "4100",
        "4020"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "api_url": "https://www.niap-ccevs.org/api/project/product/pcl_products/10233/",
      "categories": [
        "Sensitive Data Protection",
        " System Access Control"
      ],
      "category": "Sensitive Data Protection",
      "certification_date": "2009-03-31",
      "evaluation_facility": "Leidos Common Criteria Testing Laboratory",
      "expiration_date": null,
      "id": "CCEVS-VR-VID10233",
      "product": "Brocade Director Models: 48000 and DCX; Brocade Switch Models: 200E, 300, 4100, 4900, 5000, 5100, 5300, 7500 and 7500E; Director Blade Models: FC2-16, FC4-16, FC4-32, FC4-46, FC4-18, FC4-32, FC4-48, FR4-18I, FC8-16, FC8-32, FC8-48, CP4, CP8, CR8; Embedded Blades: 4012, 4016, 4018, 4020, and 4024",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/products/10233",
      "vendor": "Brocade Communications Systems LLC A Broadcom Inc. Company"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Brocade Communications Systems, Inc.",
  "manufacturer_web": "https://www.brocade.com",
  "name": "Brocade Director Models: 48000 and DCX; Brocade Switch Models: 200E, 300, 4100, 4900, 5000, 5100, 5300, 7500 and 7500E; Director Blede Models: FC2-16, FC4-16, FC4-32, FC4-46, FC4-18, FC4-32, FC4-48, FR4-18I, FC8-16, FC8-32, FC8-48, CP4, CP8, CR8; Embedded Bledes: 4012, 4016, 4018, 4020 and 4024",
  "not_valid_after": "2012-07-20",
  "not_valid_before": "2009-03-31",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10233-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10233-2009",
        "cert_item": "",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10233-2009": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_FLR.2": 7,
          "ALC_LCD": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 7,
          "EAL 3 augmented": 1,
          "EAL3": 4,
          "EAL3 augmented": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 7
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "SM Weinberg",
      "/CreationDate": "D:20090528171141",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20090528171141",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "Draft Validation Report",
      "pdf_file_size_bytes": 353561,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "st_vid10233-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.LOCATE": 3,
          "A.NETWORK": 3,
          "A.NO_EVIL": 2
        },
        "O": {
          "O.ACCESS": 4,
          "O.ADMIN_ROLE": 2,
          "O.AUDIT_GENERATION": 2,
          "O.AUDIT_GNEERATION": 2,
          "O.MANAGE": 2,
          "O.TOE_PROTECTION": 4,
          "O.USER_AUTHENTICATION": 2,
          "O.USER_IDENTIFICATION": 4
        },
        "OE": {
          "OE.CONFIG": 2,
          "OE.NETWORK": 1,
          "OE.PHYCAL": 2
        },
        "T": {
          "T.ACCOUNTABILITY": 2,
          "T.ADMIN_ERROR": 2,
          "T.MASQERADE": 1,
          "T.MASQUERADE": 1,
          "T.TSF_COMPROMISE": 2,
          "T.UNAUTH_ACCESS": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 12,
          "ADV_FSP": 1,
          "ADV_FSP.3": 12,
          "ADV_TDS": 1,
          "ADV_TDS.2": 13
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 10,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.3": 12,
          "ALC_CMS": 1,
          "ALC_CMS.3": 6,
          "ALC_DEL": 1,
          "ALC_DEL.1": 5,
          "ALC_DVS": 1,
          "ALC_DVS.1": 5,
          "ALC_FLR": 1,
          "ALC_FLR.2": 19,
          "ALC_LCD": 1,
          "ALC_LCD.1": 6
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 5,
          "ATE_DPT": 1,
          "ATE_DPT.1": 5,
          "ATE_FUN": 1,
          "ATE_FUN.1": 8,
          "ATE_IND": 1,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.2": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 4,
          "EAL 3 augmented": 1,
          "EAL3": 7,
          "EAL3 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 3,
          "FAU_GEN.1": 6,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1
        },
        "FDP": {
          "FDP_ACC": 3,
          "FDP_ACC.1": 10,
          "FDP_ACC.1.1": 1,
          "FDP_ACC.2": 1,
          "FDP_ACF": 3,
          "FDP_ACF.1": 6,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 1
        },
        "FIA": {
          "FIA_ATD": 4,
          "FIA_ATD.1": 4,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 3,
          "FIA_UAU.1": 6,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 3,
          "FIA_UID.1": 1,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA": 6,
          "FMT_MSA.1": 4,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 6,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 12,
          "FMT_MTD.1": 1,
          "FMT_SMF": 3,
          "FMT_SMF.1": 9,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 4,
          "FMT_SMR.1": 10,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITT": 1,
          "FPT_STM": 3,
          "FPT_STM.1": 5,
          "FPT_STM.1.1": 1
        },
        "FTP": {
          "FTP_TRP": 2,
          "FTP_TRP.1": 4,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 4
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 13
        },
        "TLS": {
          "SSL": {
            "SSL": 3
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "RFC": {
          "RFC 2625": 1,
          "RFC 2837": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "RC": {
            "RC4": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "SAIC CCTL IA Team",
      "/CreationDate": "D:20090528171052",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20090528171052",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Security Target",
      "/Title": "Brocade Communications Systems, Inc. Directors and Switches Security Target",
      "pdf_file_size_bytes": 684437,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 38
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10233-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL3+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10233-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "df24e08205e9349e418c7eb40cefd7d35d76edb2b3917f83e160597abda4ef61",
      "txt_hash": "f1b1722421115026af46cc05b437246b1a10821330fb6b6348e5f3af0dfcda1b"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "ce71c1788ecff8d6c5c5323f6e97f0551e87837557f464d72851247b24165faa",
      "txt_hash": "d2df50fc18b643263544aacebfc98296a72a81baa72ab7ff6616435c32cd7025"
    }
  },
  "status": "archived"
}