PacketLight PL2000 Series with Firmware v1.3.12c
CSV information ?
Status | active |
---|---|
Valid from | 25.09.2020 |
Valid until | 26.09.2025 |
Scheme | 🇦🇺 AU |
Manufacturer | PacketLight Network Ltd |
Category | Network and Network-Related Devices and Systems |
Security level | ALC_FLR.1, EAL2+ |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL 2, EAL 2 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1File metadata
Title | SACA75945.d20100615480 |
---|---|
Creation date | D:20201006154807+10'00' |
Modification date | D:20201006154807+10'00' |
Pages | 1 |
Creator | ACA75945.dpe.protected.mil.au |
Producer | KONICA MINOLTA bizhub C308 |
Certification report ?
Extracted keywords
Hash functions
SHA-256Protocols
SSH, TLS, TLS v1.2, TLS 1.2Security level
EAL2, EAL 2, EAL1, EAL2 augmented, EAL 2 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1Evaluation facilities
Teron LabsFile metadata
Creation date | D:20200921171013+10'00' |
---|---|
Modification date | D:20200921171026+10'00' |
Pages | 15 |
Creator | Acrobat PDFMaker 17 for Word |
Producer | Adobe PDF Library 15.0 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, HMAC, HMAC-SHA-384, HMAC-SHA-256, HMAC-SHA-512Asymmetric Algorithms
RSA 2048, ECDH, ECC, DH, Diffie-HellmanHash functions
SHA-1, SHA-384, SHA-512, SHA-256Schemes
Key agreementProtocols
SSH, TLS, TLS v1.2, TLS 1.2Randomness
TRNG, DRBG, RNGElliptic Curves
P-256, P-521, P-384Block cipher modes
ECB, CBC, CTR, CFB, GCMVendor
STMSecurity level
EAL2, EAL2 augmentedClaims
O.AUDIT, O.COMMUNICATION, O.ACCESS, O.MANAGEMENT, O.TAMPERING, T.AUDIT, T.COMMUNICATION, T.ACCESS, T.MANAGEMENT, T.TAMPERING, OE.ADMIN, OE.PHYSICAL, OSP.ADMIN, OSP.PHYSICALSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_COP, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.2, FDP_IFF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.2.1, FDP_IFC.2.2, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FDP_ACF.2, FIA_ATD.1, FIA_UAU.1, FIA_UAU.6, FIA_UAU.7, FIA_UID.1, FIA_SOS.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_SOS.1.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS.1, FPT_PHP.1, FPT_STM.1, FPT_TEE.1, FPT_TST.1, FPT_FLS.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_STM.1.1, FPT_TEE.1.1, FPT_TEE.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ACC.1, FPT_ACF.1, FTA_SSL.3, FTA_SSL.4, FTA_SSL.3.1, FTA_SSL.4.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Side-channel analysis
physical tamperingStandards
FIPS 140-2, FIPS140-2, FIPS PUB 197, FIPS 197, FIPS PUB 198, FIPS PUB 180-4, FIPS PUB 186-4, NIST SP 800-90A, SP 800-56A, SP 800-38A, SP 800-38D, SP 800-133, SP 800-90A, SP 800-135, SP 800-52, NIST SP 800-135, PKCS1, RFC 5288, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title | Packetlight PL2000 Series EAL2+ALC_FLR.1 Security Target v1.3 |
---|---|
Author | jussipekka leiwo |
Creation date | D:20200831042311Z00'00' |
Modification date | D:20200831042311Z00'00' |
Pages | 43 |
Creator | Word |
Producer | macOS Version 10.14.6 (Build 18G4032) Quartz PDFContext |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0992a5e37d152833ea4a5588d1055f8d5866b030018edb499f918c3da56c9026', 'txt_hash': '645bd8ce86692c5053c6ed11cafc5682459b49de6f710992db6621703876f929'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '95f3c4e9df0df19edefa0efd30d3640c3aa047c49c31efe361e84a81b08e5312', 'txt_hash': '165975d9415b506bc96f9f2d66b6079165f0071c7bfb907db6accab6be4d9ffb'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 3044422, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 43, '/Title': 'Packetlight PL2000 Series EAL2+ALC_FLR.1 Security Target v1.3', '/Author': 'jussipekka leiwo', '/Subject': '', '/Producer': 'macOS Version 10.14.6 (Build 18G4032) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20200831042311Z00'00'", '/ModDate': "D:20200831042311Z00'00'", '/Keywords': '', '/AAPL:Keywords': '[]', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 844980, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Title': 'SACA75945.d20100615480', '/Creator': 'ACA75945.dpe.protected.mil.au', '/Producer': 'KONICA MINOLTA bizhub C308', '/CreationDate': "D:20201006154807+10'00'", '/ModDate': "D:20201006154807+10'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 7, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 7, 'FAU_SAR.1': 5, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FCS': {'FCS_CKM.1': 11, 'FCS_CKM.2': 6, 'FCS_CKM.4': 13, 'FCS_COP.1': 5, 'FCS_COP': 9, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 8, 'FDP_IFC.2': 6, 'FDP_IFF.1': 7, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.2.1': 1, 'FDP_IFC.2.2': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_IFC.1': 6, 'FDP_ACF.2': 1}, 'FIA': {'FIA_ATD.1': 6, 'FIA_UAU.1': 6, 'FIA_UAU.6': 6, 'FIA_UAU.7': 6, 'FIA_UID.1': 10, 'FIA_SOS.1': 6, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MSA.1': 11, 'FMT_MSA.3': 13, 'FMT_SMF.1': 7, 'FMT_SMR.1': 12, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 6, 'FPT_PHP.1': 6, 'FPT_STM.1': 7, 'FPT_TEE.1': 6, 'FPT_TST.1': 5, 'FPT_FLS.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TEE.1.1': 1, 'FPT_TEE.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_ACC.1': 1, 'FPT_ACF.1': 1}, 'FTA': {'FTA_SSL.3': 6, 'FTA_SSL.4': 5, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_TRP.1': 7, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.AUDIT': 8, 'O.COMMUNICATION': 7, 'O.ACCESS': 8, 'O.MANAGEMENT': 8, 'O.TAMPERING': 8}, 'T': {'T.AUDIT': 4, 'T.COMMUNICATION': 5, 'T.ACCESS': 5, 'T.MANAGEMENT': 6, 'T.TAMPERING': 5}, 'OE': {'OE.ADMIN': 4, 'OE.PHYSICAL': 3}, 'OSP': {'OSP.ADMIN': 4, 'OSP.PHYSICAL': 4}}, 'vendor': {'STMicroelectronics': {'STM': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 17}}, 'constructions': {'MAC': {'HMAC': 4, 'HMAC-SHA-384': 4, 'HMAC-SHA-256': 2, 'HMAC-SHA-512': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 2}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECC': {'ECC': 5}}, 'FF': {'DH': {'DH': 9, 'Diffie-Hellman': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-384': 9, 'SHA-512': 8, 'SHA-256': 3}}}, 'crypto_scheme': {'KA': {'Key agreement': 5}}, 'crypto_protocol': {'SSH': {'SSH': 20}, 'TLS': {'TLS': {'TLS': 16, 'TLS v1.2': 1, 'TLS 1.2': 1}}}, 'randomness': {'TRNG': {'TRNG': 2}, 'PRNG': {'DRBG': 10}, 'RNG': {'RNG': 2}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 3}, 'CTR': {'CTR': 5}, 'CFB': {'CFB': 1}, 'GCM': {'GCM': 12}}, 'ecc_curve': {'NIST': {'P-256': 8, 'P-521': 4, 'P-384': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 9}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 20, 'FIPS140-2': 6, 'FIPS PUB 197': 1, 'FIPS 197': 2, 'FIPS PUB 198': 2, 'FIPS PUB 180-4': 3, 'FIPS PUB 186-4': 1}, 'NIST': {'NIST SP 800-90A': 2, 'SP 800-56A': 5, 'SP 800-38A': 3, 'SP 800-38D': 3, 'SP 800-133': 1, 'SP 800-90A': 9, 'SP 800-135': 1, 'SP 800-52': 1, 'NIST SP 800-135': 1}, 'PKCS': {'PKCS1': 2}, 'RFC': {'RFC 5288': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL 2 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
Packetlight PL2000 Series EAL2_ALC_FLR_1 Security Targetv1_3.pdf
. - The cert_filename property was set to
EFT-T010 2020_130 PacketLight Cert - OS_colour_ver.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
Certificate Number: 2020/130
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '040f1500909fd6a73da6eb32c9a3e435a6a8222ebb6f2148f414b7667975b512', 'txt_hash': 'cec50d0632b01f9044a75428b1210f349d9eecc7e2a10d41243e31307e43bc93'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 541271, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/Author': '', '/Checked by': '32123', '/Comments': '', '/Company': '', '/CreationDate': "D:20200921171013+10'00'", '/Creator': 'Acrobat PDFMaker 17 for Word', '/Keywords': '', '/ModDate': "D:20200921171026+10'00'", '/Objective-Caveats': '', '/Objective-Classification': '[Inherited - Unclassified]', '/Objective-Comment': '', '/Objective-CreationStamp': 'D:20200821', '/Objective-DatePublished': '', '/Objective-Document Type [system]': '', '/Objective-FileNumber': '', '/Objective-Id': 'BN20396975', '/Objective-IsApproved': '0', '/Objective-IsPublished': '0', '/Objective-ModificationStamp': 'D:20200921', '/Objective-Owner': 'Clacher, Chris MR', '/Objective-Parent': 'CR', '/Objective-Path': 'Objective Global Folder - PROD:Defence Business Units:Australian Signals Directorate:ASD : Australian Signals Directorate:ACSC GROUP:CSS - CYBER SECURITY SERVICES DIVISION:Technical Uplift Branch - TU:Standards & Guidelines:4. Australasian Certification A', '/Objective-State': 'Being Edited', '/Objective-Title': 'ACSC Certification Report EFT-T010 PacketLight PL-2000 1.3.12c EAL2+', '/Objective-Version': '0.13', '/Objective-VersionComment': '', '/Objective-VersionNumber': '13', '/Producer': 'Adobe PDF Library 15.0', '/SourceModified': 'D:20200921070954', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.cyber.gov.au/sites/default/files/2019-03/AISEP_Policy_Manual.pdf', 'https://www.nzism.gcsb.govt.nz/ism-document/', 'https://www.commoncriteriaportal.org/', 'https://www.gcsb.govt.nz/', 'https://www.cyber.gov.au/ism']}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL 2': 1, 'EAL1': 1, 'EAL2 augmented': 1, 'EAL 2 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Teron': {'Teron Labs': 4}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 1}, 'TLS': {'TLS': {'TLS': 1, 'TLS v1.2': 1, 'TLS 1.2': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ACSC Certification Report EFT-T010 PacketLight PL-2000 1.3.12c v1.0.pdf
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ACSC%20Certification%20Report%20EFT-T010%20PacketLight%20PL-2000%201.3.12c%20v1.0.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Packetlight%20PL2000%20Series%20EAL2_ALC_FLR_1%20Security%20Targetv1_3.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name PacketLight PL2000 Series with Firmware v1.3.12c was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T010%202020_130%20PacketLight%20Cert%20-%20OS_colour_ver.pdf",
"dgst": "e1b196cd909833bb",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "Certificate Number: 2020/130",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.3.12"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "PacketLight Network Ltd",
"manufacturer_web": "https://www.packetlight.com/",
"name": "PacketLight PL2000 Series with Firmware v1.3.12c",
"not_valid_after": "2025-09-26",
"not_valid_before": "2020-09-25",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "EFT-T010 2020_130 PacketLight Cert - OS_colour_ver.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 2 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20201006154807+10\u002700\u0027",
"/Creator": "ACA75945.dpe.protected.mil.au",
"/ModDate": "D:20201006154807+10\u002700\u0027",
"/Producer": "KONICA MINOLTA bizhub C308",
"/Title": "SACA75945.d20100615480",
"pdf_file_size_bytes": 844980,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "ACSC Certification Report EFT-T010 PacketLight PL-2000 1.3.12c v1.0.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.1": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 2 augmented": 1,
"EAL1": 1,
"EAL2": 3,
"EAL2 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 1
},
"TLS": {
"TLS": {
"TLS": 1,
"TLS 1.2": 1,
"TLS v1.2": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Teron": {
"Teron Labs": 4
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/Checked by": "32123",
"/Comments": "",
"/Company": "",
"/CreationDate": "D:20200921171013+10\u002700\u0027",
"/Creator": "Acrobat PDFMaker 17 for Word",
"/Keywords": "",
"/ModDate": "D:20200921171026+10\u002700\u0027",
"/Objective-Caveats": "",
"/Objective-Classification": "[Inherited - Unclassified]",
"/Objective-Comment": "",
"/Objective-CreationStamp": "D:20200821",
"/Objective-DatePublished": "",
"/Objective-Document Type [system]": "",
"/Objective-FileNumber": "",
"/Objective-Id": "BN20396975",
"/Objective-IsApproved": "0",
"/Objective-IsPublished": "0",
"/Objective-ModificationStamp": "D:20200921",
"/Objective-Owner": "Clacher, Chris MR",
"/Objective-Parent": "CR",
"/Objective-Path": "Objective Global Folder - PROD:Defence Business Units:Australian Signals Directorate:ASD : Australian Signals Directorate:ACSC GROUP:CSS - CYBER SECURITY SERVICES DIVISION:Technical Uplift Branch - TU:Standards \u0026 Guidelines:4. Australasian Certification A",
"/Objective-State": "Being Edited",
"/Objective-Title": "ACSC Certification Report EFT-T010 PacketLight PL-2000 1.3.12c EAL2+",
"/Objective-Version": "0.13",
"/Objective-VersionComment": "",
"/Objective-VersionNumber": "13",
"/Producer": "Adobe PDF Library 15.0",
"/SourceModified": "D:20200921070954",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 541271,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/",
"https://www.cyber.gov.au/ism",
"https://www.gcsb.govt.nz/",
"https://www.nzism.gcsb.govt.nz/ism-document/",
"https://www.cyber.gov.au/sites/default/files/2019-03/AISEP_Policy_Manual.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "Packetlight PL2000 Series EAL2_ALC_FLR_1 Security Targetv1_3.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 5
},
"ECDH": {
"ECDH": 2
}
},
"FF": {
"DH": {
"DH": 9,
"Diffie-Hellman": 6
}
},
"RSA": {
"RSA 2048": 2
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.ACCESS": 8,
"O.AUDIT": 8,
"O.COMMUNICATION": 7,
"O.MANAGEMENT": 8,
"O.TAMPERING": 8
},
"OE": {
"OE.ADMIN": 4,
"OE.PHYSICAL": 3
},
"OSP": {
"OSP.ADMIN": 4,
"OSP.PHYSICAL": 4
},
"T": {
"T.ACCESS": 5,
"T.AUDIT": 4,
"T.COMMUNICATION": 5,
"T.MANAGEMENT": 6,
"T.TAMPERING": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.1": 7
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 4,
"EAL2 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 7,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1
},
"FCS": {
"FCS_CKM.1": 11,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 6,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 13,
"FCS_CKM.4.1": 1,
"FCS_COP": 9,
"FCS_COP.1": 5
},
"FDP": {
"FDP_ACC.1": 12,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ACF.2": 1,
"FDP_IFC.1": 6,
"FDP_IFC.2": 6,
"FDP_IFC.2.1": 1,
"FDP_IFC.2.2": 1,
"FDP_IFF.1": 7,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC.1": 4,
"FDP_ITC.2": 4
},
"FIA": {
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 6,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 6,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.6": 6,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 6,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 10,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MSA.1": 11,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 13,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 12,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ACC.1": 1,
"FPT_ACF.1": 1,
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_PHP.1": 6,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_STM.1": 7,
"FPT_STM.1.1": 1,
"FPT_TEE.1": 6,
"FPT_TEE.1.1": 1,
"FPT_TEE.1.2": 1,
"FPT_TST.1": 5,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 5,
"FTA_SSL.4.1": 1
},
"FTP": {
"FTP_TRP.1": 7,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 5
},
"ECB": {
"ECB": 5
},
"GCM": {
"GCM": 12
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 20
},
"TLS": {
"TLS": {
"TLS": 16,
"TLS 1.2": 1,
"TLS v1.2": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 5
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 8,
"P-384": 4,
"P-521": 4
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA2": {
"SHA-256": 3,
"SHA-384": 9,
"SHA-512": 8
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 10
},
"RNG": {
"RNG": 2
},
"TRNG": {
"TRNG": 2
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 9
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 140-2": 20,
"FIPS 197": 2,
"FIPS PUB 180-4": 3,
"FIPS PUB 186-4": 1,
"FIPS PUB 197": 1,
"FIPS PUB 198": 2,
"FIPS140-2": 6
},
"NIST": {
"NIST SP 800-135": 1,
"NIST SP 800-90A": 2,
"SP 800-133": 1,
"SP 800-135": 1,
"SP 800-38A": 3,
"SP 800-38D": 3,
"SP 800-52": 1,
"SP 800-56A": 5,
"SP 800-90A": 9
},
"PKCS": {
"PKCS1": 2
},
"RFC": {
"RFC 5288": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 17
}
},
"constructions": {
"MAC": {
"HMAC": 4,
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 4,
"HMAC-SHA-512": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"STMicroelectronics": {
"STM": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/AAPL:Keywords": "[]",
"/Author": "jussipekka leiwo",
"/CreationDate": "D:20200831042311Z00\u002700\u0027",
"/Creator": "Word",
"/Keywords": "",
"/ModDate": "D:20200831042311Z00\u002700\u0027",
"/Producer": "macOS Version 10.14.6 (Build 18G4032) Quartz PDFContext",
"/Subject": "",
"/Title": "Packetlight PL2000 Series EAL2+ALC_FLR.1 Security Target v1.3",
"pdf_file_size_bytes": 3044422,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 43
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ACSC%20Certification%20Report%20EFT-T010%20PacketLight%20PL-2000%201.3.12c%20v1.0.pdf",
"scheme": "AU",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Packetlight%20PL2000%20Series%20EAL2_ALC_FLR_1%20Security%20Targetv1_3.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "95f3c4e9df0df19edefa0efd30d3640c3aa047c49c31efe361e84a81b08e5312",
"txt_hash": "165975d9415b506bc96f9f2d66b6079165f0071c7bfb907db6accab6be4d9ffb"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "040f1500909fd6a73da6eb32c9a3e435a6a8222ebb6f2148f414b7667975b512",
"txt_hash": "cec50d0632b01f9044a75428b1210f349d9eecc7e2a10d41243e31307e43bc93"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0992a5e37d152833ea4a5588d1055f8d5866b030018edb499f918c3da56c9026",
"txt_hash": "645bd8ce86692c5053c6ed11cafc5682459b49de6f710992db6621703876f929"
}
},
"status": "active"
}