Cisco Catalyst 3850 Series Switches running IOS-XE 3.6.0E and Catalyst 6500 Series Switches running IOS 15.1(2)SY3

CSV information ?

Status archived
Valid from 27.11.2014
Valid until 27.11.2019
Scheme 🇳🇱 NL
Manufacturer Cisco Systems, Inc.
Category Network and Network-Related Devices and Systems
Security level EAL3

Heuristics summary ?

Certificate ID: NSCIB-CC-14-39582-CR

Certificate ?

Certification report ?

Extracted keywords

Schemes
MAC
Protocols
SSH

Vendor
Cisco, Cisco Systems, Inc, Cisco Systems

Security level
EAL4, EAL3, EAL 3
Certificates
NSCIB-CC-14-39582-CR, NSCIB-CC-14-39582
Evaluation facilities
Brightsight

File metadata

Title Certification Report NSCIB-CC-14-39582-CR
Creation date D:20141209141825+01'00'
Pages 14
Creator pdfFactory Pro www.pdffactory.com
Producer pdfFactory Pro 4.05 (Windows Vista Business x86 Dutch)

Frontpage

Certificate ID NSCIB-CC-14-39582-CR
Certified item Cisco Catalyst 3850 Series Switches running IOS-XE 3.6.0E and Catalyst 6500 Series Switches running IOS 15.1(2)SY3
Certification lab Brightsight
Developer Cisco Systems, Inc

Security target ?

Extracted keywords

Symmetric Algorithms
AES, TDES, HMAC
Asymmetric Algorithms
DH
Hash functions
MD5
Schemes
MAC
Protocols
SSH, TLS, VPN
Randomness
PRNG, RNG
Block cipher modes
CBC

Vendor
Cisco, Cisco Systems, Inc

Security level
EAL3
Claims
O.ACCESS_CONTROL, O.ADMIN_ROLE, O.AUDIT_GEN, O.AUDIT_VIEW, O.CFG_MANAGE, O.IDAUTH, O.MEDIATE, O.SELFPRO, O.STARTUP_TEST, O.TIME, O.DISPLAY_BANNER, O.RESIDUAL_INFORMATION_CLEARING, O.DISPALY_BANNER, O.RESIDUAL_INFORMATION, T.AUDIT_REVIEW, T.AUTHADMIN, T.MEDIATE, T.NOAUDIT, T.NOAUTH, T.NOMGT, T.UNAUTH_MGT_ACCESS, T.TIME, T.USER_DATA_REUSE, A.NOEVIL, A.TRAIN_AUDIT, A.TRAIN_GUIDAN, A.LOCATE, A.CONFIDENTIALITY, A.INTEROPERABILITY, A.LOWEXP, OE.AUDIT_REVIEW, OE.CONFIDENTIALITY, OE.INTEROPERABILITY, OE.LOCATE, OE.LOWEXP, OE.NOEVIL, OE.TRAIN_GUIDAN
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2
Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_STG, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_STG.1, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FCS_CKM.1, FCS_CKM, FCS_COP.1, FCS_SSH_EXT, FCS_SSH_EXT.1, FCS_CKM.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1.1, FCS_SSH_EXT.1.1, FCS_SSH_EXT.1.2, FCS_SSH_EXT.1.3, FCS_SSH_EXT.1.4, FCS_SSH_EXT.1.5, FCS_SSH_EXT.1.6, FCS_SSH_EXT.1.7, FCS_CKM.2, FCS_COP, FDP_IFF.1, FDP_ACC, FDP_ACF, FDP_IFC.1, FDP_RIP, FDP_ACC.2, FDP_ACF.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_RIP.1, FIA_ATD.1, FIA_UAU.2, FIA_UAU, FIA_UID.2, FIA_UAU_EXT.5, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.7.1, FIA_UID.2.1, FIA_UID.1, FIA_UAU.7, FIA_UIA_EXT.1, FIA_UAU.5, FMT_MOF.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MOF.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FPT_RPL, FPT_STM, FPT_TST_EXT, FPT_STM.1, FPT_TST_EXT.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FPT_TST_EXT.1.1, FPT_RPL.1, FPT_TST_EXP.1, FTA_SSL, FTA_TAB, FTA_SSL.3.1, FTA_TAB.1.1, FTA_SSL.3, FTA_TAB.1, FTP_RPL

Side-channel analysis
malfunction

Standards
FIPS 186-3, FIPS 140-2, FIPS PUB 197, FIPS 197, NIST SP 800-38A, RFC 3394, RFC 1321, RFC 2328, RFC 2385, RFC 4253, RFC 2453

File metadata

Title Security Target
Author Cisco TME
Creation date D:20141126144830-05'00'
Modification date D:20141126144830-05'00'
Pages 77
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Heuristics ?

Certificate ID: NSCIB-CC-14-39582-CR

Extracted SARs

ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Similar certificates

Name Certificate ID
Cisco Systems (1100, 1200, 1300, 1400 series Wireless Devices running IOS 12.3 (8JA2; 3200 series Wireless Router running IOS 12..4(6)XE3; AS5350, 5400, 5850 Universal Gateway running IOS 12.4(17); IAD2430 Integrated Access Device running IOS 12.4(17) with Cisco Secure Access Control Server (ACS) version 4.1.4.13 for Microsoft Windows Server CCEVS-VR-VID-6013-2008 Compare
Cisco Catalyst 6500 Series Switches running IOS 15.0(1)SY1 CCEVS-VR-10490-2012 Compare
Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5) BSI-DSZ-CC-0937-2014 Compare
Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5) BSI-DSZ-CC-0838-2014 Compare
Cisco Catalyst 2960CX and 3560CX Series Compact Switches running IOS 15.2(3)E1 CCEVS-VR-VID-10647-2015 Compare
Cisco Catalyst 2960C, 2960S, 2960SF, 2960X, 2960XR running IOS 15.2(2a)E1 and 3560C, 3560X, 3750X running IOS 15.2(2)E1 CCEVS-VR-VID-10606-2014 Compare
Cisco Firewall Services Module (FWSM) Version 3.1.(3.17) for: Cisco Catalyst 6500 Switches and Cisco 7600 Series routers CCEVS-VR-0027-2007 Compare
Cisco Catalyst 9400 Series Switches running IOS-XE 16.6 CCEVS-VR-VID-10863-2018 Compare
Cisco Nexus 5600 Series Switches with 2000 Series Fabric Extenders running NX-OS 7.2(1)N1(1) NSCIB-CC-15-77333-CR Compare
Cisco Catalyst 3650 and 3850 Series Switches running IOS-XE 16.9 CCEVS-VR-VID-10940-2019 Compare
Cisco Catalyst 4500 Series Wired Access Switches running IOS-XE 3.10 CCEVS-VR-10906-2018 Compare
Cisco Catalyst 3K/4K Wired Access Switches running IOS-XE 3.8.0E CCEVS-VR-10688-2015 Compare
Cisco Catalyst 3650, 3850, 4500E (Sup7E, Sup7LE, Sup8E), 4500X, 4500XF running IOS-XE 3.6.1S CCEVS-VR-VID-10607-2014 Compare
Cisco Catalyst Industrial Ethernet 3x00 Rugged Series (IE3200, IE3300, IE3400, IE3400H) Switches running IOS-XE 17.3 CCEVS-VR-VID-11177-2021 Compare
Cisco Nexus 7000 Series Switch running Software version NX-OS version 5.1(a) and Cisco Secure Access Control Server (ACS) running version 5.2 patch 3 CCEVS-VR-10349-2011 Compare
Cisco Nexus 5000 Series Switch w/2000 Series Fabric Extenders running s/w NX-OS v5.0(3)N1(1c), and Cisco Secure Access Control Server (ACS) running s/w v5.2 patch 3 CCEVS-VR-10384-2011 Compare
Cisco Catalyst 4500 Series switches (4503-E, 4506-E, 4507R+E, 4510R+E, 4500X and 4500X-F) running IOS-XE 3.5.2E CRP276 Compare
Cisco Integrated Service Routers (ISR): Cisco 800 Series ISRs: 881, 881G and 891; Cisco 1900 Series ISRs: 1905, 1921, and 1941; Cisco 2900 Series ISRs: 2901, 2911, 2921 and 2951; Cisco 3900 Series ISRs: 3925, 3925E, 3945 and 3945E; running IOS 15.1.2T3 CCEVS-VR-10425-2011 Compare
Cisco Aggregation Services Router 1000 Series (ASR1K), Cisco Cloud Services Router 1000V (CSR1000V), Cisco Integrated Services Router 1100 Series (ISR1100), Cisco Integrated Services Router 4200 Series (ISR4K) running IOS-XE 17.3 CCEVS-VR-11186-2021 Compare
Cisco Systems Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, and 7200 running Cisco IOS Release 12.4(11)T2; 7300, 7400, and 7600 running Cisco IOS Release 12.2(18) SXF8; 10000 and 12000 running 12.0(32)s7) and Cisco Secure ACS version 4.1.2.12 CCEVS-VR-VID-6014-2008 Compare
Showing 5 out of 20.

References ?

No references are available for this certificate.

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '314540efa0539aebb7acbfab7e78fc5caa04cfac11131c5ecb0b5b0703505caa', 'txt_hash': 'd51408b5bcaa80043d15c17d80baebcf6706dbd259a1c28ce959fd9dfe8fd708'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2c29eb76b17ed32790f94f8bf47a41733a73908929c4309f38013c5eda35763f', 'txt_hash': 'b1080b19cef61e49ee4cf5bb293a7bac20469980570c3d7f2d1bead7468004cb'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 342173, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 14, '/CreationDate': "D:20141209141825+01'00'", '/Creator': 'pdfFactory Pro www.pdffactory.com', '/Producer': 'pdfFactory Pro 4.05 (Windows Vista Business x86 Dutch)', '/Title': 'Certification Report NSCIB-CC-14-39582-CR', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.sogisportal.eu', 'http://www.tuv.com/nl', 'http://www.commoncriteriaportal.org']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1269182, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 77, '/Title': 'Security Target', '/Author': 'Cisco TME', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20141126144830-05'00'", '/ModDate': "D:20141126144830-05'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cisco.com/c/en/us/td/docs/ios/netmgmt/configuration/guide/15_1s/nm_15_1s_book.pdf']}}.
    • The report_frontpage property was set to {'NL': {'cert_id': 'NSCIB-CC-14-39582-CR', 'cert_item': 'Cisco Catalyst 3850 Series Switches running IOS-XE 3.6.0E and Catalyst 6500 Series Switches running IOS 15.1(2)SY3', 'developer': 'Cisco Systems, Inc', 'cert_lab': ' Brightsight'}}.
    • The report_keywords property was set to {'cc_cert_id': {'NL': {'NSCIB-CC-14-39582-CR': 13, 'NSCIB-CC-14-39582': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL3': 2, 'EAL 3': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Cisco': {'Cisco': 18, 'Cisco Systems, Inc': 1, 'Cisco Systems': 2}}, 'eval_facility': {'BrightSight': {'Brightsight': 5}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'SSH': {'SSH': 3}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.3': 2, 'ADV_TDS.2': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_CMC.3': 2, 'ALC_CMS.3': 2, 'ALC_DEL.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 2, 'ATE_FUN.1': 1, 'ATE_IND.2': 2, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.2': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 5, 'FAU_SAR': 1, 'FAU_STG': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.1': 10, 'FAU_GEN.2': 5, 'FAU_SAR.1': 6, 'FAU_STG.1': 6, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_CKM.1': 19, 'FCS_CKM': 1, 'FCS_COP.1': 25, 'FCS_SSH_EXT': 2, 'FCS_SSH_EXT.1': 6, 'FCS_CKM.1.1': 2, 'FCS_CKM.4': 10, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 5, 'FCS_SSH_EXT.1.1': 1, 'FCS_SSH_EXT.1.2': 1, 'FCS_SSH_EXT.1.3': 1, 'FCS_SSH_EXT.1.4': 1, 'FCS_SSH_EXT.1.5': 1, 'FCS_SSH_EXT.1.6': 1, 'FCS_SSH_EXT.1.7': 1, 'FCS_CKM.2': 2, 'FCS_COP': 2}, 'FDP': {'FDP_IFF.1': 39, 'FDP_ACC': 5, 'FDP_ACF': 1, 'FDP_IFC.1': 20, 'FDP_RIP': 2, 'FDP_ACC.2': 6, 'FDP_ACF.1': 3, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1.1': 3, 'FDP_IFF.1.1': 3, 'FDP_IFF.1.2': 3, 'FDP_IFF.1.3': 3, 'FDP_IFF.1.4': 3, 'FDP_IFF.1.5': 3, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 5, 'FDP_ITC.2': 1, 'FDP_ACC.1': 2, 'FDP_RIP.1': 4}, 'FIA': {'FIA_ATD.1': 6, 'FIA_UAU.2': 7, 'FIA_UAU': 4, 'FIA_UID.2': 8, 'FIA_UAU_EXT.5': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 2, 'FIA_UAU.7': 4, 'FIA_UIA_EXT.1': 1, 'FIA_UAU.5': 3}, 'FMT': {'FMT_MOF.1': 10, 'FMT_MSA.2': 5, 'FMT_MSA.3': 20, 'FMT_MTD': 1, 'FMT_SMF': 1, 'FMT_SMR': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1': 4, 'FMT_MTD.1.1': 1, 'FMT_SMF.1': 8, 'FMT_SMR.1': 13, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 6}, 'FPT': {'FPT_RPL': 2, 'FPT_STM': 2, 'FPT_TST_EXT': 3, 'FPT_STM.1': 8, 'FPT_TST_EXT.1': 4, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TST_EXT.1.1': 1, 'FPT_RPL.1': 3, 'FPT_TST_EXP.1': 1}, 'FTA': {'FTA_SSL': 2, 'FTA_TAB': 2, 'FTA_SSL.3.1': 1, 'FTA_TAB.1.1': 1, 'FTA_SSL.3': 7, 'FTA_TAB.1': 4}, 'FTP': {'FTP_RPL': 1}}, 'cc_claims': {'O': {'O.ACCESS_CONTROL': 8, 'O.ADMIN_ROLE': 4, 'O.AUDIT_GEN': 6, 'O.AUDIT_VIEW': 5, 'O.CFG_MANAGE': 6, 'O.IDAUTH': 4, 'O.MEDIATE': 5, 'O.SELFPRO': 7, 'O.STARTUP_TEST': 5, 'O.TIME': 4, 'O.DISPLAY_BANNER': 4, 'O.RESIDUAL_INFORMATION_CLEARING': 4, 'O.DISPALY_BANNER': 1, 'O.RESIDUAL_INFORMATION': 1}, 'T': {'T.AUDIT_REVIEW': 4, 'T.AUTHADMIN': 2, 'T.MEDIATE': 3, 'T.NOAUDIT': 2, 'T.NOAUTH': 3, 'T.NOMGT': 2, 'T.UNAUTH_MGT_ACCESS': 3, 'T.TIME': 2, 'T.USER_DATA_REUSE': 3}, 'A': {'A.NOEVIL': 3, 'A.TRAIN_AUDIT': 2, 'A.TRAIN_GUIDAN': 3, 'A.LOCATE': 2, 'A.CONFIDENTIALITY': 3, 'A.INTEROPERABILITY': 2, 'A.LOWEXP': 3}, 'OE': {'OE.AUDIT_REVIEW': 4, 'OE.CONFIDENTIALITY': 3, 'OE.INTEROPERABILITY': 3, 'OE.LOCATE': 3, 'OE.LOWEXP': 3, 'OE.NOEVIL': 3, 'OE.TRAIN_GUIDAN': 3}}, 'vendor': {'Cisco': {'Cisco': 48, 'Cisco Systems, Inc': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'DES': {'3DES': {'TDES': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 13}}}, 'crypto_scheme': {'MAC': {'MAC': 12}}, 'crypto_protocol': {'SSH': {'SSH': 27}, 'TLS': {'TLS': {'TLS': 1}}, 'VPN': {'VPN': 2}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 6}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 4}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-3': 2, 'FIPS 140-2': 6, 'FIPS PUB 197': 2, 'FIPS 197': 1}, 'NIST': {'NIST SP 800-38A': 2}, 'RFC': {'RFC 3394': 1, 'RFC 1321': 2, 'RFC 2328': 3, 'RFC 2385': 3, 'RFC 4253': 1, 'RFC 2453': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to [CR] NSCIB-CC-14-39582-CR.pdf.
    • The st_filename property was set to [ST] Cisco_Cat3850Cat6500_ST_v1.0_Final.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to [''].
    • The cert_id property was set to NSCIB-CC-14-39582-CR.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-14-39582-CR.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20Cisco_Cat3850Cat6500_ST_v1.0_Final.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Cisco Catalyst 3850 Series Switches running IOS-XE 3.6.0E and Catalyst 6500 Series Switches running IOS 15.1(2)SY3 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "ee9e51c93091fca8",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-14-39582-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "15.1",
        "3.6.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Cisco Systems, Inc.",
  "manufacturer_web": "https://www.cisco.com",
  "name": "Cisco Catalyst 3850 Series Switches running IOS-XE 3.6.0E and Catalyst 6500 Series Switches running IOS 15.1(2)SY3",
  "not_valid_after": "2019-11-27",
  "not_valid_before": "2014-11-27",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "[CR] NSCIB-CC-14-39582-CR.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-14-39582-CR",
        "cert_item": "Cisco Catalyst 3850 Series Switches running IOS-XE 3.6.0E and Catalyst 6500 Series Switches running IOS 15.1(2)SY3",
        "cert_lab": " Brightsight",
        "developer": "Cisco Systems, Inc"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "NSCIB-CC-14-39582": 1,
          "NSCIB-CC-14-39582-CR": 13
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 3": 1,
          "EAL3": 2,
          "EAL4": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 3
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 5
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 18,
          "Cisco Systems": 2,
          "Cisco Systems, Inc": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20141209141825+01\u002700\u0027",
      "/Creator": "pdfFactory Pro www.pdffactory.com",
      "/Producer": "pdfFactory Pro 4.05 (Windows Vista Business x86 Dutch)",
      "/Title": "Certification Report NSCIB-CC-14-39582-CR",
      "pdf_file_size_bytes": 342173,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.sogisportal.eu",
          "http://www.commoncriteriaportal.org",
          "http://www.tuv.com/nl",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 14
    },
    "st_filename": "[ST] Cisco_Cat3850Cat6500_ST_v1.0_Final.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 2
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONFIDENTIALITY": 3,
          "A.INTEROPERABILITY": 2,
          "A.LOCATE": 2,
          "A.LOWEXP": 3,
          "A.NOEVIL": 3,
          "A.TRAIN_AUDIT": 2,
          "A.TRAIN_GUIDAN": 3
        },
        "O": {
          "O.ACCESS_CONTROL": 8,
          "O.ADMIN_ROLE": 4,
          "O.AUDIT_GEN": 6,
          "O.AUDIT_VIEW": 5,
          "O.CFG_MANAGE": 6,
          "O.DISPALY_BANNER": 1,
          "O.DISPLAY_BANNER": 4,
          "O.IDAUTH": 4,
          "O.MEDIATE": 5,
          "O.RESIDUAL_INFORMATION": 1,
          "O.RESIDUAL_INFORMATION_CLEARING": 4,
          "O.SELFPRO": 7,
          "O.STARTUP_TEST": 5,
          "O.TIME": 4
        },
        "OE": {
          "OE.AUDIT_REVIEW": 4,
          "OE.CONFIDENTIALITY": 3,
          "OE.INTEROPERABILITY": 3,
          "OE.LOCATE": 3,
          "OE.LOWEXP": 3,
          "OE.NOEVIL": 3,
          "OE.TRAIN_GUIDAN": 3
        },
        "T": {
          "T.AUDIT_REVIEW": 4,
          "T.AUTHADMIN": 2,
          "T.MEDIATE": 3,
          "T.NOAUDIT": 2,
          "T.NOAUTH": 3,
          "T.NOMGT": 2,
          "T.TIME": 2,
          "T.UNAUTH_MGT_ACCESS": 3,
          "T.USER_DATA_REUSE": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.3": 2,
          "ADV_TDS.2": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.3": 2,
          "ALC_CMS.3": 2,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_LCD.1": 2
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 5,
          "FAU_GEN.1": 10,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 5,
          "FAU_GEN.2.1": 1,
          "FAU_SAR": 1,
          "FAU_SAR.1": 6,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG": 1,
          "FAU_STG.1": 6,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 19,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 10,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 2,
          "FCS_COP.1": 25,
          "FCS_COP.1.1": 5,
          "FCS_SSH_EXT": 2,
          "FCS_SSH_EXT.1": 6,
          "FCS_SSH_EXT.1.1": 1,
          "FCS_SSH_EXT.1.2": 1,
          "FCS_SSH_EXT.1.3": 1,
          "FCS_SSH_EXT.1.4": 1,
          "FCS_SSH_EXT.1.5": 1,
          "FCS_SSH_EXT.1.6": 1,
          "FCS_SSH_EXT.1.7": 1
        },
        "FDP": {
          "FDP_ACC": 5,
          "FDP_ACC.1": 2,
          "FDP_ACC.2": 6,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 1,
          "FDP_ACF.1": 3,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 20,
          "FDP_IFC.1.1": 3,
          "FDP_IFF.1": 39,
          "FDP_IFF.1.1": 3,
          "FDP_IFF.1.2": 3,
          "FDP_IFF.1.3": 3,
          "FDP_IFF.1.4": 3,
          "FDP_IFF.1.5": 3,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 1,
          "FDP_RIP": 2,
          "FDP_RIP.1": 4,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 4,
          "FIA_UAU.2": 7,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 3,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.7": 4,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_EXT.5": 1,
          "FIA_UIA_EXT.1": 1,
          "FIA_UID.1": 2,
          "FIA_UID.2": 8,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 10,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 6,
          "FMT_MSA.2": 5,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 20,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_MTD": 1,
          "FMT_MTD.1": 4,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 8,
          "FMT_SMR": 1,
          "FMT_SMR.1": 13,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_RPL": 2,
          "FPT_RPL.1": 3,
          "FPT_RPL.1.1": 1,
          "FPT_RPL.1.2": 1,
          "FPT_STM": 2,
          "FPT_STM.1": 8,
          "FPT_STM.1.1": 1,
          "FPT_TST_EXP.1": 1,
          "FPT_TST_EXT": 3,
          "FPT_TST_EXT.1": 4,
          "FPT_TST_EXT.1.1": 1
        },
        "FTA": {
          "FTA_SSL": 2,
          "FTA_SSL.3": 7,
          "FTA_SSL.3.1": 1,
          "FTA_TAB": 2,
          "FTA_TAB.1": 4,
          "FTA_TAB.1.1": 1
        },
        "FTP": {
          "FTP_RPL": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 27
        },
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 2
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 12
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 13
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RNG": 6
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 4
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 6,
          "FIPS 186-3": 2,
          "FIPS 197": 1,
          "FIPS PUB 197": 2
        },
        "NIST": {
          "NIST SP 800-38A": 2
        },
        "RFC": {
          "RFC 1321": 2,
          "RFC 2328": 3,
          "RFC 2385": 3,
          "RFC 2453": 1,
          "RFC 3394": 1,
          "RFC 4253": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 14
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 48,
          "Cisco Systems, Inc": 3
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Cisco TME",
      "/CreationDate": "D:20141126144830-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20141126144830-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Title": "Security Target",
      "pdf_file_size_bytes": 1269182,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cisco.com/c/en/us/td/docs/ios/netmgmt/configuration/guide/15_1s/nm_15_1s_book.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 77
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-14-39582-CR.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20Cisco_Cat3850Cat6500_ST_v1.0_Final.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "314540efa0539aebb7acbfab7e78fc5caa04cfac11131c5ecb0b5b0703505caa",
      "txt_hash": "d51408b5bcaa80043d15c17d80baebcf6706dbd259a1c28ce959fd9dfe8fd708"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2c29eb76b17ed32790f94f8bf47a41733a73908929c4309f38013c5eda35763f",
      "txt_hash": "b1080b19cef61e49ee4cf5bb293a7bac20469980570c3d7f2d1bead7468004cb"
    }
  },
  "status": "archived"
}