Cisco Systems (1100, 1200, 1300, 1400 series Wireless Devices running IOS 12.3 (8JA2; 3200 series Wireless Router running IOS 12..4(6)XE3; AS5350, 5400, 5850 Universal Gateway running IOS 12.4(17); IAD2430 Integrated Access Device running IOS 12.4(17) with Cisco Secure Access Control Server (ACS) version 4.1.4.13 for Microsoft Windows Server

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 09.06.2008
Valid until 20.07.2012
Scheme 🇺🇸 US
Manufacturer Cisco Systems, Inc.
Category Access Control Devices and Systems
Security level ALC_FLR.1, EAL3+

Heuristics summary ?

Certificate ID: CCEVS-VR-VID-6013-2008

Certificate ?

Certification report ?

Extracted keywords

Schemes
MAC
Protocols
SSH, SSL, VPN

Vendor
Cisco, Cisco Systems, Cisco Systems, Inc

Security level
EAL 3, EAL 1, EAL 4, EAL3, EAL 3 augmented
Claims
A.NOEVIL, A.TRAIN_AUDIT, A.TRAIN_GUIDAN, A.LOCATE, A.CONFIDENTIALITY, A.GENPUR, A.INTEROPERABILITY, A.LOWEXP
Security Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_VLA.1, AVA_SOF.1
Certificates
CCEVS-VR-VID6013-2008

Standards
RFC 2865

File metadata

Title VID6013-VR-0001 DRAFT
Subject CCEVS Validation Report - Cisco IOSAAA Wireless EAL3
Creation date D:20080709123454-04'00'
Modification date D:20080709123605-04'00'
Pages 21
Creator Acrobat PDFMaker 7.0 for Word
Producer Acrobat Distiller 7.0 (Windows)

Frontpage

Certificate ID CCEVS-VR-VID6013-2008
Certified item Cisco Wireless (1100, 1200, 1300, 1400, 3200), Cisco Devices (IAD 2430), Cisco Access Servers (5350, 5400, 5850), and Cisco Secure Access Control Server (ACS) for Windows Server version 4.1.4.13
Certification lab US NIAP

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES
Asymmetric Algorithms
Diffie-Hellman
Hash functions
MD5
Schemes
MAC
Protocols
SSH, SSL, VPN

Vendor
Cisco Systems, Inc, Cisco Systems, Cisco

Security level
EAL3, EAL 3, EAL3 augmented
Claims
O.AUDIT_GEN, O.AUDIT_VIEW, O.CFG_MANAGE, O.IDAUTH, O.MEDIATE, O.SELFPRO, O.STARTUP_TEST, O.TIME, O.ACCESS_CONTROL, T.AUDIT_REVIEW, T.MEDIATE, T.NOAUDIT, T.NOAUTH, T.NOMGT, T.TIME, T.UNAUTH_MGT_ACCESS, A.NOEVIL, A.TRAIN_AUDIT, A.TRAIN_GUIDAN, A.LOCATE, A.GENPUR, A.LOWEXP, A.CONFIDENTIALITY, A.INTEROPERABILITY, OE.ACS_PROTECT, OE.ACS_TIME, OE.GENPUR, OE.LOCATE, OE.LOWEXP, OE.NOEVIL, OE.AUDIT_REVIEW, OE.TRAIN_GUIDAN, OE.CONFIDENTIALITY, OE.INTEROPERABILITY
Security Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN.1.1, FAU_STG.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_IFC.1, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FIA_AFL.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_UID.1, FMT_MSA.1, FMT_SMR.1, FMT_MOF.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF, FPT_RVM.1, FPT_ITT.1, FPT_ITT.1.1, FPT_RVM.1.1, FPT_STM.1, FPT_SEP, FPT_STM, FPT_SEP.1, FPT_ATM.1, FPT_SEP_EXP.1

Standards
FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 140-1, FIPS 197, PKCS #1, RFC 2865, RFC 2403, ISO/IEC 15408:2004

File metadata

Title Cisco_IOS_Wireless_EAL3_ST_v1 8_042408.fm
Author joewheel
Creation date D:20080709103110-04'00'
Modification date D:20080709123904-04'00'
Pages 54
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 8.1.0 (Windows)

Heuristics ?

Certificate ID: CCEVS-VR-VID-6013-2008

Extracted SARs

AVA_MSU.1, ATE_DPT.1, ADV_FSP.1, ADV_HLD.2, ALC_FLR.1, AVA_VLA.1, ATE_IND.2, AGD_USR.1, ALC_DVS.1, ADV_RCR.1, ATE_COV.2, AGD_ADM.1, AVA_SOF.1, ATE_FUN.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2006-4097
C M N
HIGH 7.8 6.9 31.12.2006 05:00
CVE-2008-0532
C M N
HIGH 10.0 10.0 14.03.2008 20:44
CVE-2008-0533
C M N
MEDIUM 4.3 2.9 14.03.2008 20:44
CVE-2013-3466
C M N
HIGH 9.3 10.0 29.08.2013 12:07

Similar certificates

Name Certificate ID
Cisco Systems Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, and 7200 running Cisco IOS Release 12.4(11)T2; 7300, 7400, and 7600 running Cisco IOS Release 12.2(18) SXF8; 10000 and 12000 running 12.0(32)s7) and Cisco Secure ACS version 4.1.2.12 CCEVS-VR-VID-6014-2008 Compare
Cisco Unified Wireless Network Solution composed of the following components: Cisco Aironet 1130, 1230, and 1240 AG Series Access Points; Cisco 4400 Series Wireless LAN Controllers; Cisco Catalyst 6500 Series Wireless Integrated Services Module (WiSM); Cisco Wireless Control System (WCS); Cisco Secure Access Control Server (ACS); Cisco 2710 Wireless Location CCEVS-VR-VID-10324-2009 Compare
Cisco Nexus 7000 Series Switch running Software version NX-OS version 5.1(a) and Cisco Secure Access Control Server (ACS) running version 5.2 patch 3 CCEVS-VR-10349-2011 Compare
Cisco Aggregation Services Router 1000 Series (ASR1K), Cisco Cloud Services Router 1000V (CSR1000V), Cisco Integrated Services Router 1100 Series (ISR1100), Cisco Integrated Services Router 4200 Series (ISR4K) running IOS-XE 17.3 CCEVS-VR-11186-2021 Compare
Cisco Systems Catalyst Switches and Cisco Secure ACS for Windows Server Version 4.1.4.13 CCEVS-VR-VID-6012-2008 Compare
Cisco Nexus 5000 Series Switch w/2000 Series Fabric Extenders running s/w NX-OS v5.0(3)N1(1c), and Cisco Secure Access Control Server (ACS) running s/w v5.2 patch 3 CCEVS-VR-10384-2011 Compare
CISCO ADAPTIVE SECURITY APPLIANCES (ASA) AND CISCO ADAPTIVE SECURITY APPLIANCES VIRTUAL (ASAV) Version: ASA 9.4(1.13), ASAv 9.4(1.240) ASDM 7.4Components: ASA 5500 Series (5506-X, 5506-H, 5506-W, 5508-X, 5516-X) and ASAv running on VM ESXi 5.1 and 5.5 on the Unified Computing System (UCS) EN120E, EN120S M2, E140S M1, E140S M2, E140D M1, E160D M2, E160D M1, E180D M2, E140DP M1, E160DP M1, C22 M3, C24 M3, C220 M3, C220 M4, C240 M3, C240 M4, C260 M2, C420 M3, C460 M2, and C460 M4 Certificate Number: 2016/102 Compare
Cisco Aggregation Services Router (ASR) 9000 series with Carrier Routing System (CSR) routers CRS-1 and CRS-3, version 4.1.1 CCEVS-VR-VID-10439-2011 Compare
Cisco Network Admission Control (NAC) solution including the NAC Appliance, NAC Network Module for Cisco Integrated Services Routers (ISRs), NAC Agent, NAC Profiler, and Cisco Secure Access Control Server (ACS) Certificate Number: 2009/51 Compare
HP BladeSystem c7000 and c3000 Enclosure with Onboard Administrator (running firmware version 3.71), Virtual Connect (running firmware version 4.01), and HP Integrated Lights-Out 3 (version 1.50) 383-4-209 Compare
Cisco Integrated Service Routers (ISR): Cisco 800 Series ISRs: 881, 881G and 891; Cisco 1900 Series ISRs: 1905, 1921, and 1941; Cisco 2900 Series ISRs: 2901, 2911, 2921 and 2951; Cisco 3900 Series ISRs: 3925, 3925E, 3945 and 3945E; running IOS 15.1.2T3 CCEVS-VR-10425-2011 Compare
Cisco Catalyst 3850 Series Switches running IOS-XE 3.6.0E and Catalyst 6500 Series Switches running IOS 15.1(2)SY3 NSCIB-CC-14-39582-CR Compare
Cisco Firewall Services Module (FWSM) Version 3.1.(3.17) for: Cisco Catalyst 6500 Switches and Cisco 7600 Series routers CCEVS-VR-0027-2007 Compare
Northern Light Video Conferencing System (NLVC) consist of NLVC Client version 6.3.0.0, NLVC Server Webadmin Tool version 7.0.0.1, and NLVC Server version 6.1-0.21 ISCB-5-RPT-C034-CR-v1a Compare
Trustwave Network Access Control (NAC) Version 4.1 and Central Manager Software Version 4.1 383-4-249 Compare
Cisco Aggregation Service Router (ASR) 900 Series (902, 903, and 920) running IOS-XE 3.13.(1)S CCEVS-VR-VID-10599-2015 Compare
Cisco Network Convergence System 540, 5500 and 5700 (NCS540, NCS5500, NCS5700) Series running IOS-XR, version 7.4.1 NSCIB-CC-0597525-CR Compare
Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m JISEC-CC-CRP-C0246 Compare
Japan: Ricoh imagio MP 4000/5000 series, Overseas: Ricoh Aficio MP 4000/5000 series, Savin 9040/9050 series, Lanier MP 4000/5000 series, Gestetner MP 4000/5000 series, Nashuatec MP 4000/5000 series, Rex-Rotary MP 4000/5000 series, Infotec MP 4000/5000 series Version: System/Copy: 1.09, Network Support: 7.23, Scanner: 01.23, Printer: 1.09, Fax: 03.00.00, Web Support: 1.57, Web Uapl: 1.13.1, Network Doc Box: 1.09.3C, Ic Key: 1100, Ic Hdd: 01 JISEC-CC-CRP-C0239 Compare
Cisco UCS 5100 Series Blade Server Chassis, B-Series Blade Servers, C-Series Rack-Mount Servers, 2200/2300 Series Fabric Extenders, and 6200/6300 Series Fabric Interconnects with Unified Computing System (UCS) Manager 3.1(2b) NSCIB-CC-58905-CR Compare
Ricoh imagio MP C7501 SP/C6001 SP both with imagio FAX Unit Type23, imagio Security Card Type7, and imagio HDD Encryption Card Type7 Version: - Software version: System/Copy 1.03, Network Support 9.62, Scanner 01.05, Printer 1.03, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.04, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.6, RPCS Font 1.00, Engine 1.07:06, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-18(WW) 02.00.00, Data Erase Opt 1.01x JISEC-CC-CRP-C0320 Compare
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC1120_4113-100 10 EMS-APT Software Version 4.0 (build 20) with fixes BC0400-01 1, BC0400-02 1, BS0400-01 1, BS0400-02 1; NPT-1010 Software Version 4.0 (build 35); NPT-1020/1021 Software Version 4.0 (build 35); and NPT-1200 Software Version 4.0 (build 35) None Compare
Tripwire Manager version 4.6.1 and Tripwire for Servers version 4.6.1 CCEVS-VR-VID-10124-2009 Compare
Showing 5 out of 23.

Scheme data ?

Product Cisco Systems [1100, 1200, 1300, 1400 series Wireless Devices running IOS 12.3(8)JA2; 3200 series Wireless Router running IOS 12.4(6)XE3; AS5350, 5400, 5850 Universal Gateway running IOS 12.4(17); IAD2430 Integrated Access Device running IOS 12.4(17)] with Cisco Secure Access Control Server (ACS) version 4.1.4.13 for Microsoft Windows Server
Id CCEVS-VR-VID6013
Url https://www.niap-ccevs.org/product/6013
Certification Date 2008-06-09T00:06:00Z
Expiration Date None
Category Network Switch, Router
Vendor Cisco Systems, Inc.
Evaluation Facility Arca CCTL
Scheme US

References ?

No references are available for this certificate.

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2006-4097']} values added.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2006-4097']} values discarded.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a2ad248a26f0e92474c062c1ae897341c256eb7c58e081beca1ef0b84be364d1', 'txt_hash': 'd87088db69301ebf9fa5ade1f7cb88f1484f9b2e178d75d546c9ad0ad34ea031'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'df4888f4a72d4d5e440bf4bc6962798b9943583646656a0dcc5348054ff79fcf', 'txt_hash': 'a1ec50932c5031a2d2d79591f9fd0af9351271a022883182dc97def6e5dca505'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 288720, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/CreationDate': "D:20080709123454-04'00'", '/Subject': 'CCEVS Validation Report - Cisco IOSAAA Wireless EAL3', '/Author': '', '/Creator': 'Acrobat PDFMaker 7.0 for Word', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/ModDate': "D:20080709123605-04'00'", '/SourceModified': 'D:20080709163427', '/Title': 'VID6013-VR-0001 DRAFT', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_book09186a0080087df1.html', 'http://www.cisco.com/en/US/partner/products/hw/gatecont/ps887/products_configuration_guide_book09186a0080192878.html', 'http://www.cisco.com/en/US/partner/docs/wireless/access_point/1130/quick/guide/ap1130qs.html', 'http://www.cisco.com/en/US/partner/docs/wireless/bridge/1400/12.3_8_JA/configuration/guide/sc1238ja.html', 'http://cisco.com/en/US/docs/wireless/access_point/12.3_8_JA/command/reference/1238jacr.html', 'http://www.cisco.com/en/US/partner/docs/wireless/bridge/1400/quick/guide/br1410qs.html', 'http://www.cisco.com/en/US/products/sw/iosswrel/ps5187/products_command_reference_book09186a008017d0a2.html', 'http://www.cisco.com/en/US/partner/docs/wireless/access_point/1200/installation/guide/1200-TD-Book-Wrapper.html', 'http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_book09186a0080080ff9.html', 'http://www.cisco.com/en/US/products/sw/iosswrel/ps5187/prod_configuration_guide09186a008017d583.html', 'http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html', 'http://www.cisco.com/en/US/partner/products/hw/routers/ps272/products_regulatory_approvals_and_compliance09186a00804717b6.html', 'http://www.cisco.com/en/US/products/ps6706/prod_release_note09186a00806c23a8.html', 'http://www.cisco.com/en/US/partner/docs/wireless/access_point/1300/quick/guide/br13qsg.html', 'http://www.cisco.com/en/US/partner/docs/wireless/access_point/1130/installation/guide/1130-TD-Book-Wrapper.html', 'http://www.cisco.com/en/US/partner/products/hw/univgate/ps509/products_installation_guide_book09186a008007cc9f.html', 'http://www.cisco.com/en/US/partner/docs/routers/access/as5400/hardware/installation/guide/hwig.html', 'http://www.cisco.com/en/US/partner/products/hw/routers/ps272/products_technical_reference_book09186a0080227b02.html', 'http://www.cisco.com/en/US/partner/docs/wireless/bridge/1400/installation/guide/1400hig4.html', 'http://www.cisco.com/en/US/partner/docs/routers/access/as5350/hardware/quick/guide/53_54QSG.html', 'http://www.cisco.com/en/US/partner/docs/wireless/access_point/1100/installation/guide/1100hig7.html', 'http://www.cisco.com/en/US/products/ps6350/products_configuration_guide_book09186a0080430ee6.html', 'http://www.cisco.com/en/US/partner/docs/wireless/access_point/1200/ios/quick/guide/12iosqsg.html', 'http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html', 'http://www.cisco.com/en/US/products/hw/univgate/ps501/prod_command_reference09186a00800a97c9.html', 'http://www.cisco.com/en/US/partner/docs/routers/access/as5350/software/configuration/guide/53swcg_1.html', 'http://www.cisco.com/en/US/partner/products/hw/gatecont/ps887/products_installation_guide_book09186a00801d7e1d.html', 'http://www.cisco.com/en/US/partner/products/hw/univgate/ps501/products_configuration_guide_book09186a008007dfbb.html', 'http://www.cisco.com/en/US/products/ps6350/products_configuration_guide_book09186a008043360a.html', 'http://www.cisco.com/en/US/partner/docs/wireless/access_point/1300/installation/guide/1300hig6.html', 'http://www.cisco.com/en/US/partner/products/hw/univgate/ps509/prod_configuration_guide09186a00800c98a3.html', 'http://www.cisco.com/en/US/partner/docs/wireless/access_point/1100/quick/guide/ap11qsg.html', 'http://www.cisco.com/univercd/cc/td/doc/product/access/mar_3200/mar_assm/index.htm', 'http://www.cisco.com/en/US/partner/products/hw/gatecont/ps887/products_quick_start09186a0080192891.html']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 274239, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 54, '/CreationDate': "D:20080709103110-04'00'", '/Author': 'joewheel', '/Creator': 'PScript5.dll Version 5.2.2', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/ModDate': "D:20080709123904-04'00'", '/Title': 'Cisco_IOS_Wireless_EAL3_ST_v1 8_042408.fm', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-VID6013-2008', 'cert_item': 'Cisco Wireless (1100, 1200, 1300, 1400, 3200), Cisco Devices (IAD 2430), Cisco Access Servers (5350, 5400, 5850), and Cisco Secure Access Control Server (ACS) for Windows Server version 4.1.4.13', 'cert_lab': 'US NIAP'}}.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID6013-2008': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 2, 'EAL 1': 1, 'EAL 4': 1, 'EAL3': 20, 'EAL 3 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_CAP.3': 1, 'ACM_SCP.1': 1}, 'ADO': {'ADO_DEL.1': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.1': 1, 'ADV_HLD.2': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_FLR.1': 4, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.1': 1, 'AVA_VLA.1': 1, 'AVA_SOF.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.NOEVIL': 1, 'A.TRAIN_AUDIT': 1, 'A.TRAIN_GUIDAN': 1, 'A.LOCATE': 1, 'A.CONFIDENTIALITY': 1, 'A.GENPUR': 1, 'A.INTEROPERABILITY': 1, 'A.LOWEXP': 1}}, 'vendor': {'Cisco': {'Cisco': 80, 'Cisco Systems': 19, 'Cisco Systems, Inc': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'SSH': {'SSH': 1}, 'TLS': {'SSL': {'SSL': 3}}, 'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 2865': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 83, 'EAL 3': 6, 'EAL3 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.3': 20, 'ACM_SCP.1': 7}, 'ADO': {'ADO_DEL.1': 9, 'ADO_IGS.1': 11}, 'ADV': {'ADV_FSP.1': 12, 'ADV_HLD.2': 17, 'ADV_RCR.1': 8}, 'AGD': {'AGD_ADM.1': 17, 'AGD_USR.1': 13}, 'ALC': {'ALC_DVS.1': 10, 'ALC_FLR.1': 15}, 'ATE': {'ATE_COV.2': 9, 'ATE_DPT.1': 8, 'ATE_FUN.1': 13, 'ATE_IND.2': 11}, 'AVA': {'AVA_MSU.1': 13, 'AVA_SOF.1': 10, 'AVA_VLA.1': 12}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 9, 'FAU_SAR.1': 9, 'FAU_GEN.1.1': 1, 'FAU_STG.1': 4, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.1.2': 2, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_CKM.1': 10, 'FCS_CKM.4': 9, 'FCS_COP.1': 8, 'FCS_CKM.1.1': 3, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 3}, 'FDP': {'FDP_IFC.1': 11, 'FDP_IFF.1': 13, 'FDP_IFC.1.1': 3, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 2, 'FDP_IFF.1.3': 2, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_IFF.1.6': 2}, 'FIA': {'FIA_AFL.1': 7, 'FIA_ATD.1': 6, 'FIA_UAU.2': 10, 'FIA_UID.2': 8, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.1': 4, 'FMT_SMR.1': 12, 'FMT_MOF.1': 11, 'FMT_MSA.2': 10, 'FMT_MSA.3': 11, 'FMT_MTD.1': 7, 'FMT_SMF.1': 8, 'FMT_MOF.1.1': 2, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF': 1}, 'FPT': {'FPT_RVM.1': 12, 'FPT_ITT.1': 5, 'FPT_ITT.1.1': 1, 'FPT_RVM.1.1': 2, 'FPT_STM.1': 4, 'FPT_SEP': 1, 'FPT_STM': 1, 'FPT_SEP.1': 1, 'FPT_ATM.1': 1, 'FPT_SEP_EXP.1': 1}}, 'cc_claims': {'O': {'O.AUDIT_GEN': 5, 'O.AUDIT_VIEW': 7, 'O.CFG_MANAGE': 4, 'O.IDAUTH': 6, 'O.MEDIATE': 4, 'O.SELFPRO': 10, 'O.STARTUP_TEST': 4, 'O.TIME': 6, 'O.ACCESS_CONTROL': 4}, 'T': {'T.AUDIT_REVIEW': 5, 'T.MEDIATE': 2, 'T.NOAUDIT': 5, 'T.NOAUTH': 2, 'T.NOMGT': 3, 'T.TIME': 3, 'T.UNAUTH_MGT_ACCESS': 2}, 'A': {'A.NOEVIL': 4, 'A.TRAIN_AUDIT': 2, 'A.TRAIN_GUIDAN': 4, 'A.LOCATE': 2, 'A.GENPUR': 2, 'A.LOWEXP': 2, 'A.CONFIDENTIALITY': 2, 'A.INTEROPERABILITY': 2}, 'OE': {'OE.ACS_PROTECT': 7, 'OE.ACS_TIME': 4, 'OE.GENPUR': 3, 'OE.LOCATE': 3, 'OE.LOWEXP': 3, 'OE.NOEVIL': 3, 'OE.AUDIT_REVIEW': 3, 'OE.TRAIN_GUIDAN': 2, 'OE.CONFIDENTIALITY': 2, 'OE.INTEROPERABILITY': 2}}, 'vendor': {'Cisco': {'Cisco Systems, Inc': 5, 'Cisco Systems': 69, 'Cisco': 75}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 1}, '3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 3}}}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 7}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'SSH': {'SSH': 10}, 'TLS': {'SSL': {'SSL': 5}}, 'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 197': 1, 'FIPS PUB 140-1': 1, 'FIPS 197': 1}, 'PKCS': {'PKCS #1': 1}, 'RFC': {'RFC 2865': 1, 'RFC 2403': 1}, 'ISO': {'ISO/IEC 15408:2004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to st_vid6013-vr.pdf.
    • The st_filename property was set to st_vid6013-st.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
    • The cert_id property was set to CCEVS-VR-VID-6013-2008.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6013-vr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6013-st.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Cisco Systems (1100, 1200, 1300, 1400 series Wireless Devices running IOS 12.3 (8JA2; 3200 series Wireless Router running IOS 12..4(6)XE3; AS5350, 5400, 5850 Universal Gateway running IOS 12.4(17); IAD2430 Integrated Access Device running IOS 12.4(17) with Cisco Secure Access Control Server (ACS) version 4.1.4.13 for Microsoft Windows Server was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Access Control Devices and Systems",
  "cert_link": null,
  "dgst": "65db1ec8204cb03b",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-6013-2008",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:cisco:secure_access_control_server:4.1.4.13:-:windows:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_access_control_server:4.1:-:windows:*:*:*:*:*",
        "cpe:2.3:a:cisco:acs_for_windows:4.1:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_access_control_server:4.1.4:-:windows:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.1.4.13",
        "12.3",
        "12.4"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2013-3466",
        "CVE-2006-4097",
        "CVE-2008-0532",
        "CVE-2008-0533"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Network Switch, Router",
      "certification_date": "2008-06-09T00:06:00Z",
      "evaluation_facility": "Arca CCTL",
      "expiration_date": null,
      "id": "CCEVS-VR-VID6013",
      "product": "Cisco Systems [1100, 1200, 1300, 1400 series Wireless Devices running IOS 12.3(8)JA2; 3200 series Wireless Router running IOS 12.4(6)XE3; AS5350, 5400, 5850 Universal Gateway running IOS 12.4(17); IAD2430 Integrated Access Device running IOS 12.4(17)] with Cisco Secure Access Control Server (ACS) version 4.1.4.13 for Microsoft Windows Server",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/product/6013",
      "vendor": "Cisco Systems, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Cisco Systems, Inc.",
  "manufacturer_web": "https://www.cisco.com",
  "name": "Cisco Systems (1100, 1200, 1300, 1400 series Wireless Devices running IOS 12.3 (8JA2; 3200 series Wireless Router running IOS 12..4(6)XE3; AS5350, 5400, 5850 Universal Gateway running IOS 12.4(17); IAD2430 Integrated Access Device running IOS 12.4(17) with Cisco Secure Access Control Server (ACS) version 4.1.4.13 for Microsoft Windows Server",
  "not_valid_after": "2012-07-20",
  "not_valid_before": "2008-06-09",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid6013-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID6013-2008",
        "cert_item": "Cisco Wireless (1100, 1200, 1300, 1400, 3200), Cisco Devices (IAD 2430), Cisco Access Servers (5350, 5400, 5850), and Cisco Secure Access Control Server (ACS) for Windows Server version 4.1.4.13",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID6013-2008": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.CONFIDENTIALITY": 1,
          "A.GENPUR": 1,
          "A.INTEROPERABILITY": 1,
          "A.LOCATE": 1,
          "A.LOWEXP": 1,
          "A.NOEVIL": 1,
          "A.TRAIN_AUDIT": 1,
          "A.TRAIN_GUIDAN": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.3": 1,
          "ACM_SCP.1": 1
        },
        "ADO": {
          "ADO_DEL.1": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.1": 1,
          "ADV_HLD.2": 1,
          "ADV_RCR.1": 1
        },
        "AGD": {
          "AGD_ADM.1": 1,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 4
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_MSU.1": 1,
          "AVA_SOF.1": 1,
          "AVA_VLA.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 2,
          "EAL 3 augmented": 2,
          "EAL 4": 1,
          "EAL3": 20
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 3
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "RFC": {
          "RFC 2865": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 80,
          "Cisco Systems": 19,
          "Cisco Systems, Inc": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20080709123454-04\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0 for Word",
      "/ModDate": "D:20080709123605-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/SourceModified": "D:20080709163427",
      "/Subject": "CCEVS Validation Report - Cisco IOSAAA Wireless EAL3",
      "/Title": "VID6013-VR-0001 DRAFT",
      "pdf_file_size_bytes": 288720,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cisco.com/en/US/partner/products/hw/univgate/ps509/prod_configuration_guide09186a00800c98a3.html",
          "http://www.cisco.com/en/US/products/sw/iosswrel/ps5187/products_command_reference_book09186a008017d0a2.html",
          "http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_book09186a0080087df1.html",
          "http://www.cisco.com/en/US/partner/products/hw/gatecont/ps887/products_configuration_guide_book09186a0080192878.html",
          "http://www.cisco.com/en/US/products/sw/iosswrel/ps5187/prod_configuration_guide09186a008017d583.html",
          "http://www.cisco.com/en/US/partner/docs/routers/access/as5400/hardware/installation/guide/hwig.html",
          "http://www.cisco.com/en/US/products/ps6350/products_configuration_guide_book09186a0080430ee6.html",
          "http://www.cisco.com/en/US/partner/docs/wireless/bridge/1400/quick/guide/br1410qs.html",
          "http://www.cisco.com/en/US/partner/docs/wireless/bridge/1400/12.3_8_JA/configuration/guide/sc1238ja.html",
          "http://www.cisco.com/univercd/cc/td/doc/product/access/mar_3200/mar_assm/index.htm",
          "http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html",
          "http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html",
          "http://www.cisco.com/en/US/partner/docs/wireless/access_point/1130/installation/guide/1130-TD-Book-Wrapper.html",
          "http://www.cisco.com/en/US/partner/docs/wireless/access_point/1100/quick/guide/ap11qsg.html",
          "http://www.cisco.com/en/US/partner/docs/wireless/bridge/1400/installation/guide/1400hig4.html",
          "http://www.cisco.com/en/US/products/ps6350/products_configuration_guide_book09186a008043360a.html",
          "http://www.cisco.com/en/US/partner/docs/routers/access/as5350/software/configuration/guide/53swcg_1.html",
          "http://www.cisco.com/en/US/partner/products/hw/gatecont/ps887/products_installation_guide_book09186a00801d7e1d.html",
          "http://www.cisco.com/en/US/partner/products/hw/routers/ps272/products_technical_reference_book09186a0080227b02.html",
          "http://www.cisco.com/en/US/products/hw/univgate/ps501/prod_command_reference09186a00800a97c9.html",
          "http://www.cisco.com/en/US/partner/docs/wireless/access_point/1200/installation/guide/1200-TD-Book-Wrapper.html",
          "http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_book09186a0080080ff9.html",
          "http://www.cisco.com/en/US/partner/docs/wireless/access_point/1130/quick/guide/ap1130qs.html",
          "http://cisco.com/en/US/docs/wireless/access_point/12.3_8_JA/command/reference/1238jacr.html",
          "http://www.cisco.com/en/US/partner/docs/wireless/access_point/1300/installation/guide/1300hig6.html",
          "http://www.cisco.com/en/US/partner/docs/routers/access/as5350/hardware/quick/guide/53_54QSG.html",
          "http://www.cisco.com/en/US/products/ps6706/prod_release_note09186a00806c23a8.html",
          "http://www.cisco.com/en/US/partner/products/hw/univgate/ps501/products_configuration_guide_book09186a008007dfbb.html",
          "http://www.cisco.com/en/US/partner/docs/wireless/access_point/1300/quick/guide/br13qsg.html",
          "http://www.cisco.com/en/US/partner/products/hw/routers/ps272/products_regulatory_approvals_and_compliance09186a00804717b6.html",
          "http://www.cisco.com/en/US/partner/products/hw/univgate/ps509/products_installation_guide_book09186a008007cc9f.html",
          "http://www.cisco.com/en/US/partner/products/hw/gatecont/ps887/products_quick_start09186a0080192891.html",
          "http://www.cisco.com/en/US/partner/docs/wireless/access_point/1200/ios/quick/guide/12iosqsg.html",
          "http://www.cisco.com/en/US/partner/docs/wireless/access_point/1100/installation/guide/1100hig7.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    },
    "st_filename": "st_vid6013-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 3
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONFIDENTIALITY": 2,
          "A.GENPUR": 2,
          "A.INTEROPERABILITY": 2,
          "A.LOCATE": 2,
          "A.LOWEXP": 2,
          "A.NOEVIL": 4,
          "A.TRAIN_AUDIT": 2,
          "A.TRAIN_GUIDAN": 4
        },
        "O": {
          "O.ACCESS_CONTROL": 4,
          "O.AUDIT_GEN": 5,
          "O.AUDIT_VIEW": 7,
          "O.CFG_MANAGE": 4,
          "O.IDAUTH": 6,
          "O.MEDIATE": 4,
          "O.SELFPRO": 10,
          "O.STARTUP_TEST": 4,
          "O.TIME": 6
        },
        "OE": {
          "OE.ACS_PROTECT": 7,
          "OE.ACS_TIME": 4,
          "OE.AUDIT_REVIEW": 3,
          "OE.CONFIDENTIALITY": 2,
          "OE.GENPUR": 3,
          "OE.INTEROPERABILITY": 2,
          "OE.LOCATE": 3,
          "OE.LOWEXP": 3,
          "OE.NOEVIL": 3,
          "OE.TRAIN_GUIDAN": 2
        },
        "T": {
          "T.AUDIT_REVIEW": 5,
          "T.MEDIATE": 2,
          "T.NOAUDIT": 5,
          "T.NOAUTH": 2,
          "T.NOMGT": 3,
          "T.TIME": 3,
          "T.UNAUTH_MGT_ACCESS": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.3": 20,
          "ACM_SCP.1": 7
        },
        "ADO": {
          "ADO_DEL.1": 9,
          "ADO_IGS.1": 11
        },
        "ADV": {
          "ADV_FSP.1": 12,
          "ADV_HLD.2": 17,
          "ADV_RCR.1": 8
        },
        "AGD": {
          "AGD_ADM.1": 17,
          "AGD_USR.1": 13
        },
        "ALC": {
          "ALC_DVS.1": 10,
          "ALC_FLR.1": 15
        },
        "ATE": {
          "ATE_COV.2": 9,
          "ATE_DPT.1": 8,
          "ATE_FUN.1": 13,
          "ATE_IND.2": 11
        },
        "AVA": {
          "AVA_MSU.1": 13,
          "AVA_SOF.1": 10,
          "AVA_VLA.1": 12
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 6,
          "EAL3": 83,
          "EAL3 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 9,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 9,
          "FAU_SAR.1.1": 2,
          "FAU_SAR.1.2": 2,
          "FAU_STG.1": 4,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FCS": {
          "FCS_CKM.1": 10,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.4": 9,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 8,
          "FCS_COP.1.1": 3
        },
        "FDP": {
          "FDP_IFC.1": 11,
          "FDP_IFC.1.1": 3,
          "FDP_IFF.1": 13,
          "FDP_IFF.1.1": 2,
          "FDP_IFF.1.2": 2,
          "FDP_IFF.1.3": 2,
          "FDP_IFF.1.4": 2,
          "FDP_IFF.1.5": 2,
          "FDP_IFF.1.6": 2
        },
        "FIA": {
          "FIA_AFL.1": 7,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_UAU.2": 10,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 1,
          "FIA_UID.2": 8,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_MOF.1": 11,
          "FMT_MOF.1.1": 2,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 10,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 8,
          "FMT_SMR.1": 12,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ATM.1": 1,
          "FPT_ITT.1": 5,
          "FPT_ITT.1.1": 1,
          "FPT_RVM.1": 12,
          "FPT_RVM.1.1": 2,
          "FPT_SEP": 1,
          "FPT_SEP.1": 1,
          "FPT_SEP_EXP.1": 1,
          "FPT_STM": 1,
          "FPT_STM.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 10
        },
        "TLS": {
          "SSL": {
            "SSL": 5
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 7
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 197": 1,
          "FIPS PUB 140-1": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 3
        },
        "ISO": {
          "ISO/IEC 15408:2004": 1
        },
        "PKCS": {
          "PKCS #1": 1
        },
        "RFC": {
          "RFC 2403": 1,
          "RFC 2865": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1
          },
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 75,
          "Cisco Systems": 69,
          "Cisco Systems, Inc": 5
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "joewheel",
      "/CreationDate": "D:20080709103110-04\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20080709123904-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.1.0 (Windows)",
      "/Title": "Cisco_IOS_Wireless_EAL3_ST_v1 8_042408.fm",
      "pdf_file_size_bytes": 274239,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 54
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6013-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "ALC_FLR.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6013-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a2ad248a26f0e92474c062c1ae897341c256eb7c58e081beca1ef0b84be364d1",
      "txt_hash": "d87088db69301ebf9fa5ade1f7cb88f1484f9b2e178d75d546c9ad0ad34ea031"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "df4888f4a72d4d5e440bf4bc6962798b9943583646656a0dcc5348054ff79fcf",
      "txt_hash": "a1ec50932c5031a2d2d79591f9fd0af9351271a022883182dc97def6e5dca505"
    }
  },
  "status": "archived"
}