Cisco Intrusion Detection System Sensor Appliance IDS-4200 series Version 4.1(3)
CSV information ?
Status | archived |
---|---|
Valid from | 28.05.2008 |
Valid until | 20.07.2012 |
Scheme | 🇺🇸 US |
Manufacturer | Cisco Systems, Inc. |
Category | Detection Devices and Systems |
Security level | EAL2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSH, TLSVendor
Cisco Systems, Inc, CiscoSecurity level
EAL 4, EAL2, EAL 2Security Functional Requirements (SFR)
FMT_SMR.1Certificates
CCEVS-VR-04-0062File metadata
Title | Validators Report |
---|---|
Author | Jandria Alexander |
Creation date | D:20040728124750-04'00' |
Modification date | D:20040728124810-03'00' |
Pages | 21 |
Creator | Acrobat PDFMaker 5.0 for Word |
Producer | Acrobat Distiller 5.0.5 (Windows) |
Frontpage
Certificate ID | CCEVS-VR-04-0062 |
---|---|
Certified item | Cisco Intrusion Detection System Sensor Appliance IDS-4200 series Version 4.1(3 |
Certification lab | US NIAP |
Security target ?
Extracted keywords
Schemes
MACProtocols
SSH, TLS, TLS v1.0Vendor
Cisco Systems, Inc, CiscoSecurity level
EAL2, EAL2 augmentedClaims
O.TIME, O.IDSCAN, O.IDSENS, O.IDANLZ, O.RESPON, O.EADMIN, O.ACCESS, O.IDAUTH, O.OFLOWS, O.AUDITS, O.INTEGR, O.EXPORT, O.INSTAL, O.PHYCAL, O.CREDEN, O.PERSON, O.EIDAUTH, O.EPROTCT, O.INTROP, O.PTPROTCT, O.PROTCT, O.PTPROTC, T.TIME, T.COMINT, T.COMDIS, T.LOSSOF, T.NOHALT, T.PRIVIL, T.IMPCON, T.INFLUX, T.FACCNT, T.SCNCFG, T.SCNMLC, T.SCNVUL, T.FALACT, T.FALREC, T.FALASC, T.MISUSE, T.INADVE, T.MISACT, T.ENOHALT, A.ACCESS, A.DYNMIC, A.ASCOPE, A.PROTCT, A.LOCATE, A.MANAGE, A.NOEVIL, A.NOTRSTSecurity Assurance Requirements (SAR)
ACM_CAP.2, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_VLA.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.2, FAU_STG.4, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL, FAU_SEL.1.1, FAU_STG, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4.1, FIA_UAU.1, FIA_AFL.1, FIA_ATD.1, FIA_UID.1, FIA_UAU, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_ATD.1.1, FIA_UID, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MTD.1, FMT_SMR.1, FMT_SMF.1, FMT_MDT.1, FMT_MOF.1.1, FMT_MTD, FMT_MTD.1.1, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FPT_ITA.1, FPT_ITC.1, FPT_ITI.1, FPT_RVM, FPT_SEP_EXP.1, FPT_ITA, FPT_ITA.1.1, FPT_ITC, FPT_ITC.1.1, FPT_ITI, FPT_ITI.1.1, FPT_ITI.1.2, FPT_RVM.1.1, FPT_STM.1, FPT_SEP_ENV.1, FPT_STM, FPT_STM.1.1, FPT_SEP_ENV, FPT_SEP.1, FPT_RVM.1, FPT_SEPSide-channel analysis
malfunctionStandards
ISO/IEC 15408:1999File metadata
Title | Cisco Systems, Inc |
---|---|
Author | Preferred Customer |
Creation date | D:20120627122124 |
Modification date | D:20120627122124 |
Pages | 84 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Extracted SARs
ADV_FSP.1, AVA_SOF.1, AGD_ADM.1, AVA_VLA.1, ATE_COV.1, ATE_FUN.1, ALC_FLR.1, ADV_RCR.1, AGD_USR.1, ADV_HLD.1, ATE_IND.2Similar certificates
Scheme data ?
Product | Cisco Intrusion Detection System Sensor Appliance IDS-4200 series Version 4.1(3) | |
---|---|---|
Id | CCEVS-VR-VID6002 | |
Url | https://www.niap-ccevs.org/product/6002 | |
Certification Date | 28.05.2004 | |
Expiration Date | None | |
Category | Wireless Monitoring | |
Vendor | Cisco Systems, Inc. | |
Evaluation Facility | Arca CCTL | |
Scheme | US |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2004-05-28'}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Intrusion Detection System System Protection Profile, Version 1.4', 'pp_eal': 'EAL2', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_ids_sys_v1.4.pdf', 'pp_ids': None}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '72f5e08a776475331fc23ab424476bced5e2c16228e2a26db24ff3173a73e634', 'txt_hash': '093936d9acb1d9171d565db42d90cf8988f73530a0911d273b1fb560038881c0'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 701192, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 84, '/Title': 'Cisco Systems, Inc', '/Author': 'Preferred Customer', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20120627122124', '/ModDate': 'D:20120627122124', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 10, 'EAL2 augmented': 6}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 12}, 'ADO': {'ADO_DEL.1': 6, 'ADO_IGS.1': 6}, 'ADV': {'ADV_FSP.1': 9, 'ADV_HLD.1': 12, 'ADV_RCR.1': 5}, 'AGD': {'AGD_ADM.1': 13, 'AGD_USR.1': 10}, 'ALC': {'ALC_FLR.1': 15}, 'ATE': {'ATE_COV.1': 5, 'ATE_FUN.1': 10, 'ATE_IND.2': 8}, 'AVA': {'AVA_SOF.1': 7, 'AVA_VLA.1': 7}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 14, 'FAU_SAR.1': 10, 'FAU_SAR.2': 11, 'FAU_SAR.3': 8, 'FAU_SEL.1': 10, 'FAU_STG.2': 12, 'FAU_STG.4': 9, 'FAU_GEN': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR': 3, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL': 1, 'FAU_SEL.1.1': 1, 'FAU_STG': 2, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_STG.4.1': 1}, 'FIA': {'FIA_UAU.1': 13, 'FIA_AFL.1': 5, 'FIA_ATD.1': 7, 'FIA_UID.1': 12, 'FIA_UAU': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD': 1, 'FIA_ATD.1.1': 1, 'FIA_UID': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 19, 'FMT_MTD.1': 14, 'FMT_SMR.1': 11, 'FMT_SMF.1': 14, 'FMT_MDT.1': 1, 'FMT_MOF.1.1': 2, 'FMT_MTD': 1, 'FMT_MTD.1.1': 1, 'FMT_SMR': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_ITA.1': 7, 'FPT_ITC.1': 8, 'FPT_ITI.1': 10, 'FPT_RVM': 3, 'FPT_SEP_EXP.1': 11, 'FPT_ITA': 1, 'FPT_ITA.1.1': 1, 'FPT_ITC': 1, 'FPT_ITC.1.1': 1, 'FPT_ITI': 1, 'FPT_ITI.1.1': 1, 'FPT_ITI.1.2': 1, 'FPT_RVM.1.1': 1, 'FPT_STM.1': 7, 'FPT_SEP_ENV.1': 5, 'FPT_STM': 1, 'FPT_STM.1.1': 1, 'FPT_SEP_ENV': 1, 'FPT_SEP.1': 3, 'FPT_RVM.1': 9, 'FPT_SEP': 3}}, 'cc_claims': {'O': {'O.TIME': 4, 'O.IDSCAN': 8, 'O.IDSENS': 9, 'O.IDANLZ': 6, 'O.RESPON': 4, 'O.EADMIN': 6, 'O.ACCESS': 11, 'O.IDAUTH': 21, 'O.OFLOWS': 5, 'O.AUDITS': 9, 'O.INTEGR': 7, 'O.EXPORT': 4, 'O.INSTAL': 5, 'O.PHYCAL': 6, 'O.CREDEN': 5, 'O.PERSON': 5, 'O.EIDAUTH': 3, 'O.EPROTCT': 3, 'O.INTROP': 5, 'O.PTPROTCT': 2, 'O.PROTCT': 6, 'O.PTPROTC': 1}, 'T': {'T.TIME': 3, 'T.COMINT': 3, 'T.COMDIS': 3, 'T.LOSSOF': 3, 'T.NOHALT': 3, 'T.PRIVIL': 3, 'T.IMPCON': 3, 'T.INFLUX': 3, 'T.FACCNT': 3, 'T.SCNCFG': 3, 'T.SCNMLC': 3, 'T.SCNVUL': 3, 'T.FALACT': 3, 'T.FALREC': 3, 'T.FALASC': 3, 'T.MISUSE': 3, 'T.INADVE': 3, 'T.MISACT': 3, 'T.ENOHALT': 1}, 'A': {'A.ACCESS': 3, 'A.DYNMIC': 3, 'A.ASCOPE': 3, 'A.PROTCT': 3, 'A.LOCATE': 3, 'A.MANAGE': 3, 'A.NOEVIL': 3, 'A.NOTRST': 3}}, 'vendor': {'Cisco': {'Cisco Systems, Inc': 104, 'Cisco': 36}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {'SSH': {'SSH': 14}, 'TLS': {'TLS': {'TLS': 9, 'TLS v1.0': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408:1999': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
st_vid6002-st.pdf
.
The computed heuristics were updated.
- The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
.
- The st property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID6002-VR.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6002-st.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Cisco Intrusion Detection System Sensor Appliance IDS-4200 series Version 4.1(3) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Detection Devices and Systems",
"cert_link": null,
"dgst": "4560880f17789ba1",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-0062-2004",
"cert_lab": [
"US"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.1"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Wireless Monitoring",
"certification_date": "2004-05-28",
"evaluation_facility": "Arca CCTL",
"expiration_date": null,
"id": "CCEVS-VR-VID6002",
"product": "Cisco Intrusion Detection System Sensor Appliance IDS-4200 series Version 4.1(3)",
"scheme": "US",
"url": "https://www.niap-ccevs.org/product/6002",
"vendor": "Cisco Systems, Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Cisco Systems, Inc.",
"manufacturer_web": "https://www.cisco.com",
"name": "Cisco Intrusion Detection System Sensor Appliance IDS-4200 series Version 4.1(3)",
"not_valid_after": "2012-07-20",
"not_valid_before": "2008-05-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ST_VID6002-VR.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-04-0062",
"cert_item": "Cisco Intrusion Detection System Sensor Appliance IDS-4200 series Version 4.1(3",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-04-0062": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 10,
"EAL 4": 1,
"EAL2": 2
}
},
"cc_sfr": {
"FMT": {
"FMT_SMR.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 5
},
"TLS": {
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 58,
"Cisco Systems, Inc": 14
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Jandria Alexander",
"/CreationDate": "D:20040728124750-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 5.0 for Word",
"/ModDate": "D:20040728124810-03\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "Validators Report",
"pdf_file_size_bytes": 369902,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "st_vid6002-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 3,
"A.ASCOPE": 3,
"A.DYNMIC": 3,
"A.LOCATE": 3,
"A.MANAGE": 3,
"A.NOEVIL": 3,
"A.NOTRST": 3,
"A.PROTCT": 3
},
"O": {
"O.ACCESS": 11,
"O.AUDITS": 9,
"O.CREDEN": 5,
"O.EADMIN": 6,
"O.EIDAUTH": 3,
"O.EPROTCT": 3,
"O.EXPORT": 4,
"O.IDANLZ": 6,
"O.IDAUTH": 21,
"O.IDSCAN": 8,
"O.IDSENS": 9,
"O.INSTAL": 5,
"O.INTEGR": 7,
"O.INTROP": 5,
"O.OFLOWS": 5,
"O.PERSON": 5,
"O.PHYCAL": 6,
"O.PROTCT": 6,
"O.PTPROTC": 1,
"O.PTPROTCT": 2,
"O.RESPON": 4,
"O.TIME": 4
},
"T": {
"T.COMDIS": 3,
"T.COMINT": 3,
"T.ENOHALT": 1,
"T.FACCNT": 3,
"T.FALACT": 3,
"T.FALASC": 3,
"T.FALREC": 3,
"T.IMPCON": 3,
"T.INADVE": 3,
"T.INFLUX": 3,
"T.LOSSOF": 3,
"T.MISACT": 3,
"T.MISUSE": 3,
"T.NOHALT": 3,
"T.PRIVIL": 3,
"T.SCNCFG": 3,
"T.SCNMLC": 3,
"T.SCNVUL": 3,
"T.TIME": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.2": 12
},
"ADO": {
"ADO_DEL.1": 6,
"ADO_IGS.1": 6
},
"ADV": {
"ADV_FSP.1": 9,
"ADV_HLD.1": 12,
"ADV_RCR.1": 5
},
"AGD": {
"AGD_ADM.1": 13,
"AGD_USR.1": 10
},
"ALC": {
"ALC_FLR.1": 15
},
"ATE": {
"ATE_COV.1": 5,
"ATE_FUN.1": 10,
"ATE_IND.2": 8
},
"AVA": {
"AVA_SOF.1": 7,
"AVA_VLA.1": 7
}
},
"cc_security_level": {
"EAL": {
"EAL2": 10,
"EAL2 augmented": 6
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 14,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR": 3,
"FAU_SAR.1": 10,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 11,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 8,
"FAU_SAR.3.1": 1,
"FAU_SEL": 1,
"FAU_SEL.1": 10,
"FAU_SEL.1.1": 1,
"FAU_STG": 2,
"FAU_STG.2": 12,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1,
"FAU_STG.4": 9,
"FAU_STG.4.1": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 1,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_UAU": 1,
"FIA_UAU.1": 13,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID": 1,
"FIA_UID.1": 12,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MDT.1": 1,
"FMT_MOF.1": 19,
"FMT_MOF.1.1": 2,
"FMT_MTD": 1,
"FMT_MTD.1": 14,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 11,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITA": 1,
"FPT_ITA.1": 7,
"FPT_ITA.1.1": 1,
"FPT_ITC": 1,
"FPT_ITC.1": 8,
"FPT_ITC.1.1": 1,
"FPT_ITI": 1,
"FPT_ITI.1": 10,
"FPT_ITI.1.1": 1,
"FPT_ITI.1.2": 1,
"FPT_RVM": 3,
"FPT_RVM.1": 9,
"FPT_RVM.1.1": 1,
"FPT_SEP": 3,
"FPT_SEP.1": 3,
"FPT_SEP_ENV": 1,
"FPT_SEP_ENV.1": 5,
"FPT_SEP_EXP.1": 11,
"FPT_STM": 1,
"FPT_STM.1": 7,
"FPT_STM.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 14
},
"TLS": {
"TLS": {
"TLS": 9,
"TLS v1.0": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2
}
},
"standard_id": {
"ISO": {
"ISO/IEC 15408:1999": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 36,
"Cisco Systems, Inc": 104
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Preferred Customer",
"/CreationDate": "D:20120627122124",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20120627122124",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "Cisco Systems, Inc",
"pdf_file_size_bytes": 701192,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 84
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL2",
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_ids_sys_v1.4.pdf",
"pp_name": "Intrusion Detection System System Protection Profile, Version 1.4"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID6002-VR.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6002-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "37b7afd2af75f2ed5579236f73979b3f9e6450e8e94c47a09951b88a8a2a2565",
"txt_hash": "96f7af4c7f5676e7e15ed7fe3929a1a55b311fd60783d0ce47a48b1c96ce9fa3"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "72f5e08a776475331fc23ab424476bced5e2c16228e2a26db24ff3173a73e634",
"txt_hash": "093936d9acb1d9171d565db42d90cf8988f73530a0911d273b1fb560038881c0"
}
},
"status": "archived"
}