Cisco Catalyst 4500 Series switches (4503-E, 4506-E, 4507R+E, 4510R+E, 4500X and 4500X-F) running IOS-XE 3.5.2E
CSV information ?
Status | archived |
---|---|
Valid from | 30.04.2014 |
Valid until | 30.04.2019 |
Scheme | 🇬🇧 UK |
Manufacturer | Cisco Systems, Inc. |
Category | Network and Network-Related Devices and Systems |
Security level |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Hash functions
MD5Protocols
SSH, IKEv1, IKE, IPsec, VPNVendor
Cisco, Cisco SystemsSecurity level
EAL1, EAL7Certificates
CRP276Side-channel analysis
SPAStandards
FIPS 140-2, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title | Certification Report template v3.0 |
---|---|
Author | Certification Body |
Creation date | D:20140502144405 |
Modification date | D:20140502144405 |
Pages | 21 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES-, AES-256, TDES, HMACAsymmetric Algorithms
DH, Diffie-HellmanHash functions
SHA1, SHA-1, SHA-512, SHA-256, SHA-384, MD5Schemes
MAC, Key ExchangeProtocols
SSH, TLS, IKEv1, IKE, IPsec, VPNRandomness
PRNG, DRBG, RNG, RBGBlock cipher modes
CBC, GCMVendor
Cisco, Cisco Systems, Inc, Cisco SystemsSecurity level
EAL1Claims
O.PROTECTED_COMMUNICATIONS, O.VERIFIABLE_UPDATES, O.SYSTEM_MONITORING, O.DISPLAY_BANNER, O.TOE_ADMINISTRATION, O.RESIDUAL_INFORMATION_CLEARING, O.RESOURCE_AVAILABILITY, O.SESSION_LOCK, O.TSF_SELF_TEST, O.RESIDUAL_INFORMATION_CLEA, O.PROTECTED_COMMUNICA, O.RESIDUAL_INFORMATION_, T.ADMIN_ERROR, T.RESOURCE_EXHAUSTION, T.TSF_FAILURE, T.UNDETECTED_ACTIONS, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMIN, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMIN, OE.NO_GENERAL_PURPSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1Security Functional Requirements (SFR)
FAU_GEN, FAU_STG_EXT, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.1, FAU_GEN.2, FAU_STG_EXT.1, FAU_STG_EXT.3, FAU_GEN.2.1, FAU_STG_EXT.1.1, FAU_STG_EXT.3.1, FCS_CKM, FCS_CKM_EXT, FCS_COP.1, FCS_RBG_EXT, FCS_SSH_EXT, FCS_CKM.1, FCS_CKM_EXT.4, FCS_RBG_EXT.1, FCS_SSH_EXT.1, FCS_CKM.1.1, FCS_CKM_EXT.4.1, FCS_COP.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SSH_EXT.1.1, FCS_SSH_EXT.1.2, FCS_SSH_EXT.1.3, FCS_SSH_EXT.1.4, FCS_SSH_EXT.1.5, FCS_SSH_EXT.1.6, FCS_SSH_EXT.1.7, FCS_SSH_EXT.1.8, FCS_SSH_EXT.1.9, FCS_CKM.4, FCS_TLS_EXT.1, FCS_COMM_PRO, FDP_IFF.1, FDP_RIP, FDP_RIP.2, FDP_RIP.2.1, FDP_ITC.1, FDP_ITC.2, FIA_PMG_EXT, FIA_UIA_EXT, FIA_UAU_EXT, FIA_UAU, FIA_PMG_EXT.1, FIA_UIA_EXT.1, FIA_UAU_EXT.5, FIA_UAU.6, FIA_UAU.7, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.5.1, FIA_UAU_EXT.5.2, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UID.1, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SFR.1, FPT_ITT.1, FPT_PTD_EXT.1, FPT_RPL, FPT_STM, FPT_TUD_EXT, FPT_TST_EXT, FPT_RPL.1, FPT_STM.1, FPT_TUD_EXT.1, FPT_TST_EXT.1, FPT_ITT.1.1, FPT_PTD_EXT.1.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TST_EXT.1.1, FPT_PTD_EXT, FPT_PTD.1, FPT_PTD_EXT.2, FRU_RSA, FRU_RSA.1, FRU_RSA.1.1, FTA_SSL_EXT, FTA_SSL, FTA_TAB, FTA_SSL_EXT.1, FTA_SSL.3, FTA_TAB.1, FTA_SSL_EXT.1.1, FTA_SSL.3.1, FTA_TAB.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITCSide-channel analysis
physical tamperingStandards
FIPS 140-2, FIPS PUB 197, FIPS PUB 186-3, FIPS PUB 180-3, FIPS 197, NIST SP 800-38A, NIST SP 800-38D, NIST SP 800-56B, SP 800-90, SP 900-90A, RFC 2865, RFC 3162, RFC 1492, RFC 1059, RFC 1119, RFC 1305, RFC 0894, RFC 0791, RFC 2460, RFC 4303, RFC 3602, RFC 4109, RFC 4252, RFC 4253, RFC 2385, RFC 2453, RFC 2328File metadata
Title | Security Target |
---|---|
Subject | Cat4K 4500 E & X Series NDPP CC Eval |
Author | Cisco TME |
Creation date | D:20140410105908-04'00' |
Modification date | D:20140410105908-04'00' |
Pages | 88 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Heuristics ?
Extracted SARs
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1Similar certificates
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Network Devices', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_nd_v1.0.pdf', 'pp_ids': None}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c11b4be0106ce89c4efc056e369a485c304166dc4090218dd9171242541a3661', 'txt_hash': '4f3472a07bf564197dbae7266a168910f37929c534b941c8947a4eabab7b6f48'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'dd3c60c707fdd4f575e6815fad180d22671ffa6efaebcb35fd74b5d2019bc4fe', 'txt_hash': 'e28a72e6ac35a3e636c4f77335223d2b5dc20a1d566b3f6e381a0207077d026c'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 880250, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/Title': 'Certification Report template v3.0', '/Author': 'Certification Body', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20140502144405', '/ModDate': 'D:20140502144405', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cesg.gov.uk/', 'http://www.sogisportal.eu/', 'http://www.commoncriteriaportal.org/', 'http://www.ukas.org/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1010570, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 88, '/Title': 'Security Target', '/Author': 'Cisco TME', '/Subject': 'Cat4K 4500 E & X Series NDPP CC Eval', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20140410105908-04'00'", '/ModDate': "D:20140410105908-04'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'UK': {'CRP276': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1, 'EAL7': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Cisco': {'Cisco': 31, 'Cisco Systems': 7}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'IKE': {'IKEv1': 2, 'IKE': 4}, 'IPsec': {'IPsec': 10}, 'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_CMC.1': 2, 'ALC_CMS.1': 2}, 'ATE': {'ATE_IND.1': 2}, 'AVA': {'AVA_VAN.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 5, 'FAU_STG_EXT': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.1': 7, 'FAU_GEN.2': 5, 'FAU_STG_EXT.1': 7, 'FAU_STG_EXT.3': 5, 'FAU_GEN.2.1': 1, 'FAU_STG_EXT.1.1': 1, 'FAU_STG_EXT.3.1': 1}, 'FCS': {'FCS_CKM': 2, 'FCS_CKM_EXT': 3, 'FCS_COP.1': 34, 'FCS_RBG_EXT': 3, 'FCS_SSH_EXT': 3, 'FCS_CKM.1': 15, 'FCS_CKM_EXT.4': 8, 'FCS_RBG_EXT.1': 4, 'FCS_SSH_EXT.1': 8, 'FCS_CKM.1.1': 1, 'FCS_CKM_EXT.4.1': 1, 'FCS_COP.1.1': 4, 'FCS_RBG_EXT.1.1': 1, 'FCS_RBG_EXT.1.2': 1, 'FCS_SSH_EXT.1.1': 1, 'FCS_SSH_EXT.1.2': 1, 'FCS_SSH_EXT.1.3': 1, 'FCS_SSH_EXT.1.4': 1, 'FCS_SSH_EXT.1.5': 1, 'FCS_SSH_EXT.1.6': 1, 'FCS_SSH_EXT.1.7': 1, 'FCS_SSH_EXT.1.8': 1, 'FCS_SSH_EXT.1.9': 1, 'FCS_CKM.4': 1, 'FCS_TLS_EXT.1': 1, 'FCS_COMM_PRO': 1}, 'FDP': {'FDP_IFF.1': 3, 'FDP_RIP': 2, 'FDP_RIP.2': 5, 'FDP_RIP.2.1': 1, 'FDP_ITC.1': 5, 'FDP_ITC.2': 1}, 'FIA': {'FIA_PMG_EXT': 3, 'FIA_UIA_EXT': 3, 'FIA_UAU_EXT': 3, 'FIA_UAU': 4, 'FIA_PMG_EXT.1': 4, 'FIA_UIA_EXT.1': 9, 'FIA_UAU_EXT.5': 5, 'FIA_UAU.6': 5, 'FIA_UAU.7': 5, 'FIA_PMG_EXT.1.1': 1, 'FIA_UIA_EXT.1.1': 1, 'FIA_UIA_EXT.1.2': 1, 'FIA_UAU_EXT.5.1': 1, 'FIA_UAU_EXT.5.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1': 2}, 'FMT': {'FMT_MTD': 2, 'FMT_SMF': 2, 'FMT_SMR': 2, 'FMT_MTD.1': 5, 'FMT_SMF.1': 6, 'FMT_SMR.1': 6, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SFR.1': 1}, 'FPT': {'FPT_ITT.1': 14, 'FPT_PTD_EXT.1': 11, 'FPT_RPL': 2, 'FPT_STM': 2, 'FPT_TUD_EXT': 3, 'FPT_TST_EXT': 3, 'FPT_RPL.1': 5, 'FPT_STM.1': 7, 'FPT_TUD_EXT.1': 5, 'FPT_TST_EXT.1': 5, 'FPT_ITT.1.1': 2, 'FPT_PTD_EXT.1.1': 2, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TUD_EXT.1.1': 1, 'FPT_TUD_EXT.1.2': 1, 'FPT_TUD_EXT.1.3': 1, 'FPT_TST_EXT.1.1': 1, 'FPT_PTD_EXT': 2, 'FPT_PTD.1': 5, 'FPT_PTD_EXT.2': 1}, 'FRU': {'FRU_RSA': 2, 'FRU_RSA.1': 5, 'FRU_RSA.1.1': 1}, 'FTA': {'FTA_SSL_EXT': 3, 'FTA_SSL': 3, 'FTA_TAB': 2, 'FTA_SSL_EXT.1': 6, 'FTA_SSL.3': 6, 'FTA_TAB.1': 5, 'FTA_SSL_EXT.1.1': 1, 'FTA_SSL.3.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC.1': 14, 'FTP_TRP.1': 14, 'FTP_ITC.1.1': 2, 'FTP_ITC.1.2': 2, 'FTP_ITC.1.3': 2, 'FTP_TRP.1.1': 2, 'FTP_TRP.1.2': 2, 'FTP_TRP.1.3': 2, 'FTP_ITC': 1}}, 'cc_claims': {'O': {'O.PROTECTED_COMMUNICATIONS': 6, 'O.VERIFIABLE_UPDATES': 4, 'O.SYSTEM_MONITORING': 7, 'O.DISPLAY_BANNER': 4, 'O.TOE_ADMINISTRATION': 7, 'O.RESIDUAL_INFORMATION_CLEARING': 2, 'O.RESOURCE_AVAILABILITY': 7, 'O.SESSION_LOCK': 4, 'O.TSF_SELF_TEST': 7, 'O.RESIDUAL_INFORMATION_CLEA': 1, 'O.PROTECTED_COMMUNICA': 1, 'O.RESIDUAL_INFORMATION_': 1}, 'T': {'T.ADMIN_ERROR': 3, 'T.RESOURCE_EXHAUSTION': 3, 'T.TSF_FAILURE': 3, 'T.UNDETECTED_ACTIONS': 2, 'T.UNAUTHORIZED_ACCESS': 4, 'T.UNAUTHORIZED_UPDATE': 3, 'T.USER_DATA_REUSE': 2}, 'A': {'A.NO_GENERAL_PURPOSE': 3, 'A.PHYSICAL': 3, 'A.TRUSTED_ADMIN': 3}, 'OE': {'OE.NO_GENERAL_PURPOSE': 2, 'OE.PHYSICAL': 3, 'OE.TRUSTED_ADMIN': 2, 'OE.NO_GENERAL_PURP': 1}}, 'vendor': {'Cisco': {'Cisco': 83, 'Cisco Systems, Inc': 3, 'Cisco Systems': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 13, 'AES-': 3, 'AES-256': 1}}, 'DES': {'3DES': {'TDES': 3}}, 'constructions': {'MAC': {'HMAC': 3}}}, 'asymmetric_crypto': {'FF': {'DH': {'DH': 10, 'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2, 'SHA-1': 4}, 'SHA2': {'SHA-512': 4, 'SHA-256': 3, 'SHA-384': 1}}, 'MD': {'MD5': {'MD5': 8}}}, 'crypto_scheme': {'MAC': {'MAC': 5}, 'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 41}, 'TLS': {'TLS': {'TLS': 6}}, 'IKE': {'IKEv1': 6, 'IKE': 21}, 'IPsec': {'IPsec': 40}, 'VPN': {'VPN': 1}}, 'randomness': {'PRNG': {'PRNG': 1, 'DRBG': 3}, 'RNG': {'RNG': 6, 'RBG': 3}}, 'cipher_mode': {'CBC': {'CBC': 3}, 'GCM': {'GCM': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 4, 'FIPS PUB 197': 2, 'FIPS PUB 186-3': 2, 'FIPS PUB 180-3': 2, 'FIPS 197': 1}, 'NIST': {'NIST SP 800-38A': 2, 'NIST SP 800-38D': 2, 'NIST SP 800-56B': 1, 'SP 800-90': 1, 'SP 900-90A': 1}, 'RFC': {'RFC 2865': 1, 'RFC 3162': 1, 'RFC 1492': 1, 'RFC 1059': 1, 'RFC 1119': 1, 'RFC 1305': 1, 'RFC 0894': 1, 'RFC 0791': 1, 'RFC 2460': 1, 'RFC 4303': 1, 'RFC 3602': 1, 'RFC 4109': 1, 'RFC 4252': 1, 'RFC 4253': 1, 'RFC 2385': 1, 'RFC 2453': 1, 'RFC 2328': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
CRP276 Cisco Cat4K v1.0.pdf
. - The st_filename property was set to
CAT4K NDPP ST 20140207-Final-updated-UPDATED20140410-Final.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
CRP276
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP276%20Cisco%20Cat4K%20v1.0.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CAT4K%20NDPP%20ST%2020140207-Final-updated-UPDATED20140410-Final.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Cisco Catalyst 4500 Series switches (4503-E, 4506-E, 4507R+E, 4510R+E, 4500X and 4500X-F) running IOS-XE 3.5.2E was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "2ae58c071bd55ee4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CRP276",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.5.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Cisco Systems, Inc.",
"manufacturer_web": "https://www.cisco.com",
"name": "Cisco Catalyst 4500 Series switches (4503-E, 4506-E, 4507R+E, 4510R+E, 4500X and 4500X-F) running IOS-XE 3.5.2E",
"not_valid_after": "2019-04-30",
"not_valid_before": "2014-04-30",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "CRP276 Cisco Cat4K v1.0.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"UK": {
"CRP276": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL1": 1,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 4,
"IKEv1": 2
},
"IPsec": {
"IPsec": 10
},
"SSH": {
"SSH": 2
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"SPA": 1
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
},
"FIPS": {
"FIPS 140-2": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 31,
"Cisco Systems": 7
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Certification Body",
"/CreationDate": "D:20140502144405",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20140502144405",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "Certification Report template v3.0",
"pdf_file_size_bytes": 880250,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ukas.org/",
"http://www.commoncriteriaportal.org/",
"http://www.sogisportal.eu/",
"http://www.cesg.gov.uk/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "CAT4K NDPP ST 20140207-Final-updated-UPDATED20140410-Final.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 10,
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_GENERAL_PURPOSE": 3,
"A.PHYSICAL": 3,
"A.TRUSTED_ADMIN": 3
},
"O": {
"O.DISPLAY_BANNER": 4,
"O.PROTECTED_COMMUNICA": 1,
"O.PROTECTED_COMMUNICATIONS": 6,
"O.RESIDUAL_INFORMATION_": 1,
"O.RESIDUAL_INFORMATION_CLEA": 1,
"O.RESIDUAL_INFORMATION_CLEARING": 2,
"O.RESOURCE_AVAILABILITY": 7,
"O.SESSION_LOCK": 4,
"O.SYSTEM_MONITORING": 7,
"O.TOE_ADMINISTRATION": 7,
"O.TSF_SELF_TEST": 7,
"O.VERIFIABLE_UPDATES": 4
},
"OE": {
"OE.NO_GENERAL_PURP": 1,
"OE.NO_GENERAL_PURPOSE": 2,
"OE.PHYSICAL": 3,
"OE.TRUSTED_ADMIN": 2
},
"T": {
"T.ADMIN_ERROR": 3,
"T.RESOURCE_EXHAUSTION": 3,
"T.TSF_FAILURE": 3,
"T.UNAUTHORIZED_ACCESS": 4,
"T.UNAUTHORIZED_UPDATE": 3,
"T.UNDETECTED_ACTIONS": 2,
"T.USER_DATA_REUSE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.1": 2,
"ALC_CMS.1": 2
},
"ATE": {
"ATE_IND.1": 2
},
"AVA": {
"AVA_VAN.1": 2
}
},
"cc_security_level": {
"EAL": {
"EAL1": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 5,
"FAU_GEN.1": 7,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_STG_EXT": 6,
"FAU_STG_EXT.1": 7,
"FAU_STG_EXT.1.1": 1,
"FAU_STG_EXT.3": 5,
"FAU_STG_EXT.3.1": 1
},
"FCS": {
"FCS_CKM": 2,
"FCS_CKM.1": 15,
"FCS_CKM.1.1": 1,
"FCS_CKM.4": 1,
"FCS_CKM_EXT": 3,
"FCS_CKM_EXT.4": 8,
"FCS_CKM_EXT.4.1": 1,
"FCS_COMM_PRO": 1,
"FCS_COP.1": 34,
"FCS_COP.1.1": 4,
"FCS_RBG_EXT": 3,
"FCS_RBG_EXT.1": 4,
"FCS_RBG_EXT.1.1": 1,
"FCS_RBG_EXT.1.2": 1,
"FCS_SSH_EXT": 3,
"FCS_SSH_EXT.1": 8,
"FCS_SSH_EXT.1.1": 1,
"FCS_SSH_EXT.1.2": 1,
"FCS_SSH_EXT.1.3": 1,
"FCS_SSH_EXT.1.4": 1,
"FCS_SSH_EXT.1.5": 1,
"FCS_SSH_EXT.1.6": 1,
"FCS_SSH_EXT.1.7": 1,
"FCS_SSH_EXT.1.8": 1,
"FCS_SSH_EXT.1.9": 1,
"FCS_TLS_EXT.1": 1
},
"FDP": {
"FDP_IFF.1": 3,
"FDP_ITC.1": 5,
"FDP_ITC.2": 1,
"FDP_RIP": 2,
"FDP_RIP.2": 5,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_PMG_EXT": 3,
"FIA_PMG_EXT.1": 4,
"FIA_PMG_EXT.1.1": 1,
"FIA_UAU": 4,
"FIA_UAU.6": 5,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 5,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT": 3,
"FIA_UAU_EXT.5": 5,
"FIA_UAU_EXT.5.1": 1,
"FIA_UAU_EXT.5.2": 1,
"FIA_UIA_EXT": 3,
"FIA_UIA_EXT.1": 9,
"FIA_UIA_EXT.1.1": 1,
"FIA_UIA_EXT.1.2": 1,
"FIA_UID.1": 2
},
"FMT": {
"FMT_MTD": 2,
"FMT_MTD.1": 5,
"FMT_MTD.1.1": 1,
"FMT_SFR.1": 1,
"FMT_SMF": 2,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 6,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT.1": 14,
"FPT_ITT.1.1": 2,
"FPT_PTD.1": 5,
"FPT_PTD_EXT": 2,
"FPT_PTD_EXT.1": 11,
"FPT_PTD_EXT.1.1": 2,
"FPT_PTD_EXT.2": 1,
"FPT_RPL": 2,
"FPT_RPL.1": 5,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_STM": 2,
"FPT_STM.1": 7,
"FPT_STM.1.1": 1,
"FPT_TST_EXT": 3,
"FPT_TST_EXT.1": 5,
"FPT_TST_EXT.1.1": 1,
"FPT_TUD_EXT": 3,
"FPT_TUD_EXT.1": 5,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 1,
"FPT_TUD_EXT.1.3": 1
},
"FRU": {
"FRU_RSA": 2,
"FRU_RSA.1": 5,
"FRU_RSA.1.1": 1
},
"FTA": {
"FTA_SSL": 3,
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 1,
"FTA_SSL_EXT": 3,
"FTA_SSL_EXT.1": 6,
"FTA_SSL_EXT.1.1": 1,
"FTA_TAB": 2,
"FTA_TAB.1": 5,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC": 1,
"FTP_ITC.1": 14,
"FTP_ITC.1.1": 2,
"FTP_ITC.1.2": 2,
"FTP_ITC.1.3": 2,
"FTP_TRP.1": 14,
"FTP_TRP.1.1": 2,
"FTP_TRP.1.2": 2,
"FTP_TRP.1.3": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"GCM": {
"GCM": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 21,
"IKEv1": 6
},
"IPsec": {
"IPsec": 40
},
"SSH": {
"SSH": 41
},
"TLS": {
"TLS": {
"TLS": 6
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 5
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 8
}
},
"SHA": {
"SHA1": {
"SHA-1": 4,
"SHA1": 2
},
"SHA2": {
"SHA-256": 3,
"SHA-384": 1,
"SHA-512": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 3,
"PRNG": 1
},
"RNG": {
"RBG": 3,
"RNG": 6
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 4,
"FIPS 197": 1,
"FIPS PUB 180-3": 2,
"FIPS PUB 186-3": 2,
"FIPS PUB 197": 2
},
"NIST": {
"NIST SP 800-38A": 2,
"NIST SP 800-38D": 2,
"NIST SP 800-56B": 1,
"SP 800-90": 1,
"SP 900-90A": 1
},
"RFC": {
"RFC 0791": 1,
"RFC 0894": 1,
"RFC 1059": 1,
"RFC 1119": 1,
"RFC 1305": 1,
"RFC 1492": 1,
"RFC 2328": 1,
"RFC 2385": 1,
"RFC 2453": 1,
"RFC 2460": 1,
"RFC 2865": 1,
"RFC 3162": 1,
"RFC 3602": 1,
"RFC 4109": 1,
"RFC 4252": 1,
"RFC 4253": 1,
"RFC 4303": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 13,
"AES-": 3,
"AES-256": 1
}
},
"DES": {
"3DES": {
"TDES": 3
}
},
"constructions": {
"MAC": {
"HMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 83,
"Cisco Systems": 1,
"Cisco Systems, Inc": 3
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Cisco TME",
"/CreationDate": "D:20140410105908-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20140410105908-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "Cat4K 4500 E \u0026 X Series NDPP CC Eval",
"/Title": "Security Target",
"pdf_file_size_bytes": 1010570,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 88
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_nd_v1.0.pdf",
"pp_name": "Protection Profile for Network Devices"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP276%20Cisco%20Cat4K%20v1.0.pdf",
"scheme": "UK",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CAT4K%20NDPP%20ST%2020140207-Final-updated-UPDATED20140410-Final.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c11b4be0106ce89c4efc056e369a485c304166dc4090218dd9171242541a3661",
"txt_hash": "4f3472a07bf564197dbae7266a168910f37929c534b941c8947a4eabab7b6f48"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "dd3c60c707fdd4f575e6815fad180d22671ffa6efaebcb35fd74b5d2019bc4fe",
"txt_hash": "e28a72e6ac35a3e636c4f77335223d2b5dc20a1d566b3f6e381a0207077d026c"
}
},
"status": "archived"
}