Huawei NE40E Series Software Consisting of VRP and the Underlying OS

CSV information ?

Status active
Valid from 26.10.2018
Valid until 25.10.2023
Scheme 🇩🇪 DE
Manufacturer Huawei Technologies Co., Ltd.
Category Network and Network-Related Devices and Systems
Security level

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1053-2018

Certification report ?

Extracted keywords

Hash functions
SHA256
Schemes
MAC
Protocols
SSH, TLS
Randomness
RNG

Vendor
Huawei, Huawei Technologies Co

Security level
EAL 1, EAL 4, EAL 2
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_SPD.1, ASE_TSS.1, ASE_OBJ.2, ASE_REQ.2
Security Functional Requirements (SFR)
FCS_SSHS_EXT.1, FMT_MTD, FTP_TRP
Certificates
BSI-DSZ-CC-1053-2018
Evaluation facilities
TÜV Informationstechnik
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, BSI-DSZ-CC- 1053-2018, Version 2.0, Date 2018-10-24, TÜV Informationstechnik GmbH, (confidential document) [8] collaborative Protection Profile for Network Devices, Version 2.0 + Errata 20180314

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, BSI-DSZ-CC- 1053-2018, Version 2.0, Date 2018-10-24, TÜV Informationstechnik GmbH, (confidential document) [8] collaborative Protection Profile for Network Devices, Version 2.0 + Errata 20180314

Standards
AIS 20, AIS 32, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-1053-2018
Subject: Zertifizierunsreport Huawei NE40E Series Software Consisting of VRP and the Underlying OS, V800R010C00SPC200, V8000R010SPH220T
Keywords: "Common Criteria, Certification, Zertifizierung, "
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20181107103002+01'00'
Modification date: D:20181107131053+01'00'
Pages: 26
Creator: Writer
Producer: LibreOffice 5.2

Frontpage

Certificate ID: BSI-DSZ-CC-1053-2018
Certified item: Huawei NE40E Series Software Consisting of VRP and the Underlying OS, V800R010C00SPC200, V800R010SPH220T
Certification lab: BSI
Developer: Huawei Technologies Co., Ltd

References

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES256, AES128, DES, HMAC, HMAC-SHA-256
Asymmetric Algorithms
Diffie-Hellman, DH
Hash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, SHA256, SHA-2
Schemes
MAC, Key Exchange
Protocols
SSH, SSL, TLS, TLS 1.2, TLS 1.1, TLS v1.2, TLS1.2, TLS1.1, IKE, IPsec
Randomness
DRBG, RNG, RBG
Block cipher modes
CTR, GCM
TLS cipher suites
TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_CBC_SHA

Vendor
Huawei, Huawei Technologies Co

Claims
T.UNAUTHORIZED_ADMINISTRATOR_ACCESS, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_COMMUNICATION_CHANNELS, T.WEAK_AUTHENTICATION_ENDPOINTS, T.UPDATE_COMPROMISE, T.UNDETECTED_ACTIVITY, T.SECURITY_FUNCTIONALITY_COMPROMISE, T.PASSWORD_CRACKING, T.SECURITY_FUNCTIONALITY_FAILURE, A.PHYSICAL_PROTECTION, A.LIMITED_FUNCTIONALITY, A.NO_THRU_TRAFFIC_PROTECTION, A.TRUSTED_ADMINISTRATOR, A.REGULAR_UPDATES, A.ADMIN_CREDENTIALS_SECURE, A.RESIDUAL_INFORMATION, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.NO_THRU_TRAFFIC_PROTECTION, OE.TRUSTED_ADMIN, OE.UPDATES, OE.ADMIN_CREDENTIALS_SECURE, OE.RESIDUAL_INFORMATION
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_STG_EXT.1, FAU_STG, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.1.3, FAU_STG.3, FAU_STG.1.1, FAU_STG.1.2, FAU_STG_EXT, FCO_CPC_EXT.1, FCO_CPC_EXT.1.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP, FCS_RBG_EXT.1, FCS_SSHC_EXT.1, FCS_SSHS_EXT.1, FCS_TLSC_EXT.1, FCS_SSHC_EXT.1.1, FCS_SSHC_EXT.1.2, FCS_SSHC_EXT.1.3, FCS_SSHC_EXT.1.4, FCS_SSHC_EXT.1.5, FCS_SSHC_EXT.1.6, FCS_SSHC_EXT.1.7, FCS_SSHC_EXT.1.8, FCS_SSHC_EXT.1.9, FCS_SSHS_EXT.1.1, FCS_SSHS_EXT.1.2, FCS_SSHS_EXT.1.3, FCS_SSHS_EXT.1.4, FCS_SSHS_EXT.1.5, FCS_SSHS_EXT.1.6, FCS_SSHS_EXT.1.7, FCS_SSHS_EXT.1.8, FCS_TLSC_EXT.1.1, FCS_TLSC_EXT.1.2, FCS_TLSC_EXT.1.3, FCS_TLSC_EXT.1.4, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_RBG_EXT, FCS_COP.1.1, FCS_COP.1, FCS_RBG_EXT.1.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_RBG_EXT.1.2, FCS_RBG.1, FIA_AFL.1, FIA_PMG_EXT.1, FIA_UIA_EXT.1, FIA_UAU_EXT.2, FIA_UAU.7, FIA_AFL.1.1, FIA_AFL.1.2, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.2.1, FIA_UAU.7.1, FIA_UID.1, FIA_UAU.1, FMT_MOF, FMT_MTD, FMT_SMF.1, FMT_SMR.2, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.1, FPT_SKP_EXT.1, FPT_APW_EXT.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_STM, FPT_STM_EXT.1, FPT_TUD_EXT.2, FPT_ITT, FPT_ITT.1, FPT_TUD_EXT, FPT_TST_EXT, FPT_TST_EXT.2, FPT_TUD_EXT.1.2, FPT_TUD_EXT.2.2, FPT_SKP_EXT.1.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.3, FPT_STM_EXT.1.1, FPT_STM_EXT.1.2, FTA_SSL_EXT.1, FTA_SSL.3, FTA_SSL.4, FTA_TAB.1, FTA_SSL_EXT.1.1, FTA_SSL.4.1, FTP_ITC.1, FTP_TRP, FTP_TRP.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_ITC.2
Certification process
out of scope, indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. All required algorithms required by RFC 4253 are, indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. AES128-CBC and AES256-CBC are implemented according

Certification process
out of scope, indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. All required algorithms required by RFC 4253 are, indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. AES128-CBC and AES256-CBC are implemented according

Standards
FIPS PUB 186-4, FIPS186-4, FIPS 186-4, FIPS 198-1, NIST SP 800-56B, SP 800-56B, SP 800-131A, NIST SP 800-56A, PKCS #1, PKCS#1, PKCS#3, AIS20, RFC 1195, RFC 3526, RFC 4253, RFC 5647, RFC 6668, RFC 4251, RFC 5246, RFC 4346, RFC 5288, RFC5246, RFC 6125, RFC 5280, RFC3526, RFC4253, RFC 5759, RFC 5656, RFC 3268, RFC3447, RFC 4252, RFC 4254, ISO/IEC 9796-2, ISO/IEC 10118, ISO/IEC 9797-2, ISO/IEC 10118-3, ISO/IEC 14888-3, ISO/IEC 18031:2011, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title: Huawei NE40E Series Software Consisting of VRP and the Underlying OS, Security Target Lite
Subject: Huawei NE40E Series Software Consisting of VRP and the Underlying OS, Security Target Lite
Keywords: Huawei; Security Target Lite; Common Criteria; NE40E; VRP; Router
Author: Huawei Technologies Co. Ltd.
Creation date: D:20181023102025+02'00'
Modification date: D:20181023102808+02'00'
Pages: 87
Creator: Microsoft® Word 2013
Producer: Microsoft® Word 2013

References

Heuristics ?

Certificate ID: BSI-DSZ-CC-1053-2018

Extracted SARs

ADV_FSP.1, ASE_OBJ.1, ASE_CCL.1, ASE_REQ.1, ALC_CMC.1, ASE_TSS.1, ATE_IND.1, AGD_PRE.1, ASE_SPD.1, AVA_VAN.1, ALC_CMS.1, ASE_INT.1, ASE_ECD.1, AGD_OPE.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Huawei NE40E Series Software Consisting of VRP and the Underlying OS was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['-']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}]}}.
  • 21.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*']}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2015-8673']}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '93617722f9726ead858d55aabdd0d65f150ac7e81c608df9c496d1f34904c9f0', 'st_pdf_hash': '9aa1f2ee24b8effbdeb433ed0e61f130d603c771b1c61a8c73bf06ded1e4c39c', 'report_txt_hash': '5fe87248ffe4381902ece61f60ab6432e6a3662097dd6e33780a4ebc01469411', 'st_txt_hash': 'ba48ef8caf068d71362310688de54f58ec442aac55fb40169e656b9cc107a046'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_vendor': {'Huawei': 33}} data.
    • The st_keywords property was updated, with the {'rules_vendor': {'Huawei': 97}} data.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/AIS', 'http://www.commoncriteriaportal.org/', 'http://www.sogisportal.eu/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://support.huawei.com/hdx/pages/DOC100020474631189120/02/DOC100020474631189120/02/resources/vrp/dc_vrp_mac_cfg_0001.html?ft=99&id=dc_vrp_mac_cfg_0001&keyword=mac%2520address%2520table&text=Overview&docid=DOC1000204746#dc_vrp_mac_cfg_0001__tab_dc_vrp_mac_cfg_000101', 'http://www.rfc-editor.org/info/rfc3526']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1053-2018': 52}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 1': 1, 'EAL 2': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR': 1, 'ALC_CMC.1': 1, 'ALC_CMS.1': 1}, 'ATE': {'ATE_IND.1': 1}, 'AVA': {'AVA_VAN.1': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 5, 'ASE_REQ.2': 5}}, 'cc_sfr': {'FCS': {'FCS_SSHS_EXT.1': 1}}, 'cc_claims': {'T': {'T.PAT': 1}}, 'vendor': {'Huawei': {'Huawei': 21, 'Huawei Technologies Co': 12}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {'SSH': {'SSH': 10}, 'TLS': {'TLS': {'TLS': 2}}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 20': 2, 'AIS 32': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, '800R010SPH220T, BSI-DSZ-CC- 1053-2018, Version 2.0, Date 2018-10-24, TÜV Informationstechnik GmbH, (confidential document) [8] collaborative Protection Profile for Network Devices, Version 2.0 + Errata 20180314': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_CMC.1': 2, 'ALC_CMS.1': 2}, 'ATE': {'ATE_IND.1': 2}, 'AVA': {'AVA_VAN.1': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 2, 'ASE_INT.1': 2, 'ASE_OBJ.1': 2, 'ASE_REQ.1': 2, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 14, 'FAU_GEN.2': 7, 'FAU_STG_EXT.1': 8, 'FAU_STG.1': 9, 'FAU_GEN.1.1': 4, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_STG_EXT.1.1': 2, 'FAU_STG_EXT.1.2': 2, 'FAU_STG_EXT.1.3': 2, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCO': {'FCO_CPC_EXT.1': 1, 'FCO_CPC_EXT.1.2': 1}, 'FCS': {'FCS_CKM.1': 26, 'FCS_CKM.2': 17, 'FCS_CKM.4': 18, 'FCS_RBG_EXT.1': 8, 'FCS_SSHC_EXT.1': 8, 'FCS_SSHS_EXT.1': 8, 'FCS_TLSC_EXT.1': 9, 'FCS_SSHS_EXT.1.1': 3, 'FCS_SSHS_EXT.1.2': 3, 'FCS_SSHS_EXT.1.3': 3, 'FCS_SSHS_EXT.1.4': 3, 'FCS_SSHS_EXT.1.5': 3, 'FCS_SSHS_EXT.1.6': 3, 'FCS_SSHS_EXT.1.7': 3, 'FCS_SSHS_EXT.1.8': 4, 'FCS_TLSC_EXT.1.1': 5, 'FCS_TLSC_EXT.1.2': 3, 'FCS_TLSC_EXT.1.3': 3, 'FCS_TLSC_EXT.1.4': 3, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 2, 'FCS_CKM.4.1': 1, 'FCS_RBG_EXT': 1, 'FCS_COP.1.1': 3, 'FCS_RBG_EXT.1.1': 1, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_RBG_EXT.1.2': 3, 'FCS_COP.1': 3, 'FCS_SSHC_EXT.1.1': 2, 'FCS_SSHC_EXT.1.2': 2, 'FCS_SSHC_EXT.1.3': 2, 'FCS_SSHC_EXT.1.4': 2, 'FCS_COP': 2, 'FCS_SSHC_EXT.1.5': 4, 'FCS_SSHC_EXT.1.9': 3, 'FCS_SSHC_EXT.1.6': 2, 'FCS_SSHC_EXT.1.7': 2, 'FCS_SSHC_EXT.1.8': 3, 'FCS_RBG.1': 1}, 'FIA': {'FIA_AFL.1': 8, 'FIA_PMG_EXT.1': 8, 'FIA_UIA_EXT.1': 18, 'FIA_UAU_EXT.2': 10, 'FIA_UAU.7': 7, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_PMG_EXT.1.1': 1, 'FIA_UIA_EXT.1.1': 1, 'FIA_UIA_EXT.1.2': 2, 'FIA_UAU_EXT.2.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1': 2, 'FIA_UAU.1': 3}, 'FMT': {'FMT_SMF.1': 21, 'FMT_SMR.2': 14, 'FMT_MOF.1': 1, 'FMT_MTD.1': 4, 'FMT_SMF.1.1': 1, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 2, 'FMT_SMR.2.3': 2, 'FMT_SMR.1': 5}, 'FPT': {'FPT_SKP_EXT.1': 8, 'FPT_APW_EXT.1': 7, 'FPT_TST_EXT.1': 8, 'FPT_TUD_EXT.1': 8, 'FPT_STM_EXT.1': 10, 'FPT_TUD_EXT.2': 4, 'FPT_ITT': 1, 'FPT_ITT.1': 4, 'FPT_TUD_EXT': 2, 'FPT_TST_EXT': 2, 'FPT_TST_EXT.2': 4, 'FPT_TUD_EXT.1.2': 3, 'FPT_TUD_EXT.2.2': 1, 'FPT_SKP_EXT.1.1': 1, 'FPT_APW_EXT.1.1': 1, 'FPT_APW_EXT.1.2': 1, 'FPT_TST_EXT.1.1': 1, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.3': 6, 'FPT_STM_EXT.1.1': 1, 'FPT_STM_EXT.1.2': 1}, 'FTA': {'FTA_SSL_EXT.1': 9, 'FTA_SSL.3': 7, 'FTA_SSL.4': 7, 'FTA_TAB.1': 13, 'FTA_SSL_EXT.1.1': 1, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_ITC.1': 26, 'FTP_TRP.1': 2, 'FTP_ITC': 1, 'FTP_ITC.1.1': 5, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 2, 'FTP_ITC.2': 6}}, 'cc_claims': {'T': {'T.UNAUTHORIZED_ADMINISTRATOR_ACCESS': 2, 'T.WEAK_CRYPTOGRAPHY': 2, 'T.UNTRUSTED_COMMUNICATION_CHANNELS': 4, 'T.WEAK_AUTHENTICATION_ENDPOINTS': 2, 'T.SECURITY_FUNCTIONALITY_COMPROMISE': 2, 'T.SECURITY_FUNCTIONALITY_FAILURE': 2, 'T.UNDETECTED_ACTIVITY': 2, 'T.PASSWORD_CRACKING': 3, 'T.UPDATE_COMPROMISE': 1}, 'A': {'A.PHYSICAL_PROTECTION': 2, 'A.LIMITED_FUNCTIONALITY': 2, 'A.TRUSTED_ADMINISTRATOR': 2, 'A.REGULAR_UPDATES': 2, 'A.NO_THRU_TRAFFIC_PROTECTION': 1, 'A.ADMIN_CREDENTIALS_SECURE': 1, 'A.RESIDUAL_INFORMATION': 1}, 'OE': {'OE': 1, 'OE.PHYSICAL': 3, 'OE.NO_GENERAL_PURPOSE': 3, 'OE.NO_THRU_TRAFFIC_PROTECTION': 3, 'OE.UPDATES': 3, 'OE.TRUSTED_ADMIN': 2, 'OE.ADMIN_CREDENTIALS_SECURE': 2, 'OE.RESIDUAL_INFORMATION': 2}}, 'vendor': {'STMicroelectronics': {'STM': 15}, 'Huawei': {'Huawei': 96, 'Huawei Technologies Co': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 18, 'AES256': 4, 'AES128': 2}}, 'DES': {'DES': {'DES': 1}}, 'constructions': {'MAC': {'HMAC': 3, 'HMAC-SHA-256': 2}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 6, 'DH': 5}, 'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 17, 'SHA1': 3}, 'SHA2': {'SHA-256': 15, 'SHA-384': 6, 'SHA-512': 1, 'SHA256': 4, 'SHA384': 2, 'SHA-2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 32}, 'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 130}, 'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 49, 'TLS 1.2': 1, 'TLS 1.1': 1, 'TLS v1.2': 1, 'TLS1.2': 2, 'TLS1.1': 1}}, 'IKE': {'IKE': 1}, 'IPsec': {'IPsec': 6}}, 'randomness': {'PRNG': {'DRBG': 16}, 'RNG': {'RNG': 6, 'RBG': 20}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'CTR': {'CTR': 2}, 'GCM': {'GCM': 31}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_RSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_RSA_WITH_AES_128_CBC_SHA': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 8}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 6, 'FIPS186-4': 1, 'FIPS 186-4': 1, 'FIPS 198-1': 1}, 'NIST': {'NIST SP 800-56B': 2, 'SP 800-56B': 1, 'NIST SP 800-56A': 1}, 'PKCS': {'PKCS #1': 1, 'PKCS#1': 1, 'PKCS#3': 1}, 'BSI': {'AIS20': 7}, 'RFC': {'RFC 1195': 1, 'RFC 3526': 2, 'RFC 4253': 9, 'RFC 5647': 8, 'RFC 6668': 4, 'RFC 4251': 4, 'RFC 5246': 4, 'RFC 4346': 3, 'RFC 5288': 4, 'RFC5246': 2, 'RFC 6125': 4, 'RFC 5280': 6, 'RFC3526': 2, 'RFC 5759': 2, 'RFC 4252': 2, 'RFC 4254': 2, 'RFC 5656': 1, 'RFC 3268': 3, 'RFC3447': 1}, 'ISO': {'ISO/IEC 9796-2': 3, 'ISO/IEC 10118': 2, 'ISO/IEC 9797-2': 1, 'ISO/IEC 10118-3': 1, 'ISO/IEC 14888-3': 1, 'ISO/IEC 18031:2011': 5}, 'X509': {'X.509': 18}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 's indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. All required algorithms required by RFC 4253 are': 1, 's indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. AES128-CBC and AES256-CBC are implemented according': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'collaborative Protection Profile for Network Devices v2.0 + Errata 20180314', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/CPP_ND_V2.0E.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '1053a_pdf.pdf', 'st_filename': '1053b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1053-2018': 28}}}}, 'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL 4': 1}}}}, 'cc_sar': {'__update__': {'ASE': {'__insert__': {'ASE_TSS.1': 1}}}}, 'cc_sfr': {'__insert__': {'FMT': {'FMT_MTD': 1}, 'FTP': {'FTP_TRP': 1}}}, 'cc_claims': {}, 'vendor': {'__update__': {'Huawei': {'__update__': {'Huawei': 23}}}}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-02102': 1}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'BSI-DSZ-CC- 1053-2018, Version 2.0, Date 2018-10-24, TÜV Informationstechnik GmbH, (confidential document) [8] collaborative Protection Profile for Network Devices, Version 2.0 + Errata 20180314': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ASE': {'__update__': {'ASE_TSS.1': 3}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_STG': 7, 'FAU_STG.3': 2, 'FAU_STG_EXT': 1}, '__update__': {'FAU_GEN.1': 11, 'FAU_STG.1': 8, 'FAU_GEN.1.1': 5}}, 'FCO': {'__update__': {'FCO_CPC_EXT.1': 2}}, 'FCS': {'__update__': {'FCS_CKM.1': 18, 'FCS_CKM.2': 15, 'FCS_CKM.4': 17, 'FCS_RBG_EXT.1': 7, 'FCS_SSHS_EXT.1.5': 5, 'FCS_TLSC_EXT.1.1': 6, 'FCS_CKM.1.1': 3, 'FCS_RBG_EXT': 7, 'FCS_COP.1': 5, 'FCS_SSHC_EXT.1.1': 3, 'FCS_SSHC_EXT.1.2': 3, 'FCS_SSHC_EXT.1.3': 3, 'FCS_SSHC_EXT.1.4': 3, 'FCS_COP': 67, 'FCS_SSHC_EXT.1.5': 8, 'FCS_SSHC_EXT.1.9': 4, 'FCS_SSHC_EXT.1.6': 3, 'FCS_SSHC_EXT.1.7': 3, 'FCS_SSHC_EXT.1.8': 4}}, 'FIA': {'__update__': {'FIA_AFL.1': 9, 'FIA_UAU_EXT.2': 13, 'FIA_UAU.7': 8, 'FIA_PMG_EXT.1.1': 2, 'FIA_UAU.1': 1}}, 'FMT': {'__insert__': {'FMT_MOF': 31, 'FMT_MTD': 14}, '__update__': {'FMT_SMR.2': 9, 'FMT_MOF.1': 6, 'FMT_MTD.1': 7, 'FMT_SMR.2.3': 3}}, 'FPT': {'__insert__': {'FPT_STM': 2}, '__update__': {'FPT_APW_EXT.1': 8, 'FPT_STM_EXT.1': 9, 'FPT_ITT.1': 7, 'FPT_TUD_EXT.1.1': 3, 'FPT_STM_EXT.1.2': 2}}, 'FTA': {'__update__': {'FTA_SSL.3': 9}}, 'FTP': {'__insert__': {'FTP_TRP': 11}, '__update__': {'FTP_ITC.1': 27, 'FTP_TRP.1': 5, 'FTP_ITC.1.1': 7}}}}, 'cc_claims': {'__update__': {'T': {'__update__': {'T.UNDETECTED_ACTIVITY': 3, 'T.PASSWORD_CRACKING': 4, 'T.UPDATE_COMPROMISE': 2}}, 'A': {'__update__': {'A.NO_THRU_TRAFFIC_PROTECTION': 2, 'A.ADMIN_CREDENTIALS_SECURE': 2, 'A.RESIDUAL_INFORMATION': 2}}, 'OE': {'__update__': {'OE.TRUSTED_ADMIN': 3, 'OE.ADMIN_CREDENTIALS_SECURE': 3, 'OE.RESIDUAL_INFORMATION': 3}, '__delete__': ['OE']}}}, 'vendor': {'__update__': {'Huawei': {'__update__': {'Huawei': 14}}}, '__delete__': ['STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'constructions': {'__update__': {'MAC': {'__update__': {'HMAC-SHA-256': 4}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 11, 'SHA1': 1}}, 'SHA2': {'__update__': {'SHA-256': 14, 'SHA-384': 5, 'SHA256': 2}, '__delete__': ['SHA384']}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 26}}}}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 141}}, 'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 56}}}}}}, 'randomness': {'__update__': {'PRNG': {'__update__': {'DRBG': 8}}, 'RNG': {'__update__': {'RNG': 3, 'RBG': 4}}}}, 'cipher_mode': {'__update__': {'GCM': {'__update__': {'GCM': 9}}}, '__delete__': ['CBC']}, 'tee_name': {}, 'standard_id': {'__update__': {'NIST': {'__insert__': {'SP 800-131A': 1}}, 'RFC': {'__insert__': {'RFC4253': 1}, '__update__': {'RFC 4253': 11, 'RFC 6668': 3, 'RFC 4346': 2, 'RFC 5280': 9, 'RFC 4252': 1, 'RFC 4254': 1}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. All required algorithms required by RFC 4253 are': 1, 'indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. AES128-CBC and AES256-CBC are implemented according': 1}, '__delete__': ['s indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. All required algorithms required by RFC 4253 are', 's indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. AES128-CBC and AES256-CBC are implemented according']}}}} data.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'collaborative Protection Profile for Network Devices v2.0 + Errata 20180314', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/CPP_ND_V2.0E.pdf', 'pp_link': None, 'pp_ids': None}]}.

    The computed heuristics were updated.

    • The cpe_matches property was set to None.
    • The related_cves property was set to None.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'collaborative Protection Profile for Network Devices v2.0 + Errata 20180314', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/CPP_ND_V2.0E.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/1053c_pdf.pdf",
  "dgst": "4e246ff7fd346630",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "BSI-DSZ-CC-1053-2018",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Huawei Technologies Co., Ltd.",
  "manufacturer_web": "https://www.huawei.com",
  "name": "Huawei NE40E Series Software Consisting of VRP and the Underlying OS",
  "not_valid_after": "2023-10-25",
  "not_valid_before": "2018-10-26",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "1053a_pdf.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {
        "cc_security_level": "Common Criteria Part 3 conformant",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1053-2018",
        "cert_item": "Huawei NE40E Series Software Consisting of VRP and the Underlying OS, V800R010C00SPC200, V800R010SPH220T",
        "cert_lab": "BSI",
        "developer": "Huawei Technologies Co., Ltd",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "collaborative Protection Profile for Network Devices, Version 2.0 + Errata 20180314, 2018-03-14, NDFW- iTC (Exact conformance"
      },
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1053-2018": 28
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 1,
          "ALC_FLR": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 5,
          "ASE_REQ.2": 5,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_SSHS_EXT.1": 1
        },
        "FMT": {
          "FMT_MTD": 1
        },
        "FTP": {
          "FTP_TRP": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "BSI-DSZ-CC- 1053-2018, Version 2.0, Date 2018-10-24, T\u00dcV Informationstechnik GmbH, (confidential document) [8] collaborative Protection Profile for Network Devices, Version 2.0 + Errata 20180314": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 10
        },
        "TLS": {
          "TLS": {
            "TLS": 2
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA256": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS 32": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Huawei": {
          "Huawei": 23,
          "Huawei Technologies Co": 12
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20181107103002+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, \"",
      "/ModDate": "D:20181107131053+01\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "Zertifizierunsreport Huawei NE40E Series Software Consisting of VRP and the Underlying OS, V800R010C00SPC200, V8000R010SPH220T",
      "/Title": "Certification Report BSI-DSZ-CC-1053-2018",
      "pdf_file_size_bytes": 1360376,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "http://www.sogisportal.eu/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierung"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 26
    },
    "st_filename": "1053b_pdf.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 5,
            "Diffie-Hellman": 6
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN_CREDENTIALS_SECURE": 2,
          "A.LIMITED_FUNCTIONALITY": 2,
          "A.NO_THRU_TRAFFIC_PROTECTION": 2,
          "A.PHYSICAL_PROTECTION": 2,
          "A.REGULAR_UPDATES": 2,
          "A.RESIDUAL_INFORMATION": 2,
          "A.TRUSTED_ADMINISTRATOR": 2
        },
        "OE": {
          "OE.ADMIN_CREDENTIALS_SECURE": 3,
          "OE.NO_GENERAL_PURPOSE": 3,
          "OE.NO_THRU_TRAFFIC_PROTECTION": 3,
          "OE.PHYSICAL": 3,
          "OE.RESIDUAL_INFORMATION": 3,
          "OE.TRUSTED_ADMIN": 3,
          "OE.UPDATES": 3
        },
        "T": {
          "T.PASSWORD_CRACKING": 4,
          "T.SECURITY_FUNCTIONALITY_COMPROMISE": 2,
          "T.SECURITY_FUNCTIONALITY_FAILURE": 2,
          "T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 2,
          "T.UNDETECTED_ACTIVITY": 3,
          "T.UNTRUSTED_COMMUNICATION_CHANNELS": 4,
          "T.UPDATE_COMPROMISE": 2,
          "T.WEAK_AUTHENTICATION_ENDPOINTS": 2,
          "T.WEAK_CRYPTOGRAPHY": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.1": 2,
          "ALC_CMS.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 2,
          "ASE_INT.1": 2,
          "ASE_OBJ.1": 2,
          "ASE_REQ.1": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 3
        },
        "ATE": {
          "ATE_IND.1": 2
        },
        "AVA": {
          "AVA_VAN.1": 2
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 11,
          "FAU_GEN.1.1": 5,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 7,
          "FAU_GEN.2.1": 1,
          "FAU_STG": 7,
          "FAU_STG.1": 8,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 2,
          "FAU_STG_EXT": 1,
          "FAU_STG_EXT.1": 8,
          "FAU_STG_EXT.1.1": 2,
          "FAU_STG_EXT.1.2": 2,
          "FAU_STG_EXT.1.3": 2
        },
        "FCO": {
          "FCO_CPC_EXT.1": 2,
          "FCO_CPC_EXT.1.2": 1
        },
        "FCS": {
          "FCS_CKM.1": 18,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 15,
          "FCS_CKM.2.1": 2,
          "FCS_CKM.4": 17,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 67,
          "FCS_COP.1": 5,
          "FCS_COP.1.1": 3,
          "FCS_RBG.1": 1,
          "FCS_RBG_EXT": 7,
          "FCS_RBG_EXT.1": 7,
          "FCS_RBG_EXT.1.1": 1,
          "FCS_RBG_EXT.1.2": 3,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1,
          "FCS_SSHC_EXT.1": 8,
          "FCS_SSHC_EXT.1.1": 3,
          "FCS_SSHC_EXT.1.2": 3,
          "FCS_SSHC_EXT.1.3": 3,
          "FCS_SSHC_EXT.1.4": 3,
          "FCS_SSHC_EXT.1.5": 8,
          "FCS_SSHC_EXT.1.6": 3,
          "FCS_SSHC_EXT.1.7": 3,
          "FCS_SSHC_EXT.1.8": 4,
          "FCS_SSHC_EXT.1.9": 4,
          "FCS_SSHS_EXT.1": 8,
          "FCS_SSHS_EXT.1.1": 3,
          "FCS_SSHS_EXT.1.2": 3,
          "FCS_SSHS_EXT.1.3": 3,
          "FCS_SSHS_EXT.1.4": 3,
          "FCS_SSHS_EXT.1.5": 5,
          "FCS_SSHS_EXT.1.6": 3,
          "FCS_SSHS_EXT.1.7": 3,
          "FCS_SSHS_EXT.1.8": 4,
          "FCS_TLSC_EXT.1": 9,
          "FCS_TLSC_EXT.1.1": 6,
          "FCS_TLSC_EXT.1.2": 3,
          "FCS_TLSC_EXT.1.3": 3,
          "FCS_TLSC_EXT.1.4": 3
        },
        "FIA": {
          "FIA_AFL.1": 9,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_PMG_EXT.1": 8,
          "FIA_PMG_EXT.1.1": 2,
          "FIA_UAU.1": 1,
          "FIA_UAU.7": 8,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_EXT.2": 13,
          "FIA_UAU_EXT.2.1": 1,
          "FIA_UIA_EXT.1": 18,
          "FIA_UIA_EXT.1.1": 1,
          "FIA_UIA_EXT.1.2": 2,
          "FIA_UID.1": 2
        },
        "FMT": {
          "FMT_MOF": 31,
          "FMT_MOF.1": 6,
          "FMT_MTD": 14,
          "FMT_MTD.1": 7,
          "FMT_SMF.1": 21,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 5,
          "FMT_SMR.2": 9,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 2,
          "FMT_SMR.2.3": 3
        },
        "FPT": {
          "FPT_APW_EXT.1": 8,
          "FPT_APW_EXT.1.1": 1,
          "FPT_APW_EXT.1.2": 1,
          "FPT_ITT": 1,
          "FPT_ITT.1": 7,
          "FPT_SKP_EXT.1": 8,
          "FPT_SKP_EXT.1.1": 1,
          "FPT_STM": 2,
          "FPT_STM_EXT.1": 9,
          "FPT_STM_EXT.1.1": 1,
          "FPT_STM_EXT.1.2": 2,
          "FPT_TST_EXT": 2,
          "FPT_TST_EXT.1": 8,
          "FPT_TST_EXT.1.1": 1,
          "FPT_TST_EXT.2": 4,
          "FPT_TUD_EXT": 2,
          "FPT_TUD_EXT.1": 8,
          "FPT_TUD_EXT.1.1": 3,
          "FPT_TUD_EXT.1.2": 3,
          "FPT_TUD_EXT.1.3": 6,
          "FPT_TUD_EXT.2": 4,
          "FPT_TUD_EXT.2.2": 1
        },
        "FTA": {
          "FTA_SSL.3": 9,
          "FTA_SSL.4": 7,
          "FTA_SSL.4.1": 1,
          "FTA_SSL_EXT.1": 9,
          "FTA_SSL_EXT.1.1": 1,
          "FTA_TAB.1": 13
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 27,
          "FTP_ITC.1.1": 7,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 2,
          "FTP_ITC.2": 6,
          "FTP_TRP": 11,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {
        "OutOfScope": {
          "indicated as \u201cREQUIRED\u201d but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. AES128-CBC and AES256-CBC are implemented according": 1,
          "indicated as \u201cREQUIRED\u201d but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. All required algorithms required by RFC 4253 are": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {
        "CTR": {
          "CTR": 2
        },
        "GCM": {
          "GCM": 9
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "IPsec": {
          "IPsec": 6
        },
        "SSH": {
          "SSH": 141
        },
        "TLS": {
          "SSL": {
            "SSL": 2
          },
          "TLS": {
            "TLS": 56,
            "TLS 1.1": 1,
            "TLS 1.2": 1,
            "TLS v1.2": 1,
            "TLS1.1": 1,
            "TLS1.2": 2
          }
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 26
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 11,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-256": 14,
            "SHA-384": 5,
            "SHA-512": 1,
            "SHA256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 8
        },
        "RNG": {
          "RBG": 4,
          "RNG": 3
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS20": 7
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 186-4": 1,
          "FIPS 198-1": 1,
          "FIPS PUB 186-4": 6,
          "FIPS186-4": 1
        },
        "ISO": {
          "ISO/IEC 10118": 2,
          "ISO/IEC 10118-3": 1,
          "ISO/IEC 14888-3": 1,
          "ISO/IEC 18031:2011": 5,
          "ISO/IEC 9796-2": 3,
          "ISO/IEC 9797-2": 1
        },
        "NIST": {
          "NIST SP 800-56A": 1,
          "NIST SP 800-56B": 2,
          "SP 800-131A": 1,
          "SP 800-56B": 1
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 1,
          "PKCS#3": 1
        },
        "RFC": {
          "RFC 1195": 1,
          "RFC 3268": 3,
          "RFC 3526": 2,
          "RFC 4251": 4,
          "RFC 4252": 1,
          "RFC 4253": 11,
          "RFC 4254": 1,
          "RFC 4346": 2,
          "RFC 5246": 4,
          "RFC 5280": 9,
          "RFC 5288": 4,
          "RFC 5647": 8,
          "RFC 5656": 1,
          "RFC 5759": 2,
          "RFC 6125": 4,
          "RFC 6668": 3,
          "RFC3447": 1,
          "RFC3526": 2,
          "RFC4253": 1,
          "RFC5246": 2
        },
        "X509": {
          "X.509": 18
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 18,
            "AES128": 2,
            "AES256": 4
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 3,
            "HMAC-SHA-256": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_128_GCM_SHA256": 2,
          "TLS_RSA_WITH_AES_256_GCM_SHA384": 2
        }
      },
      "vendor": {
        "Huawei": {
          "Huawei": 14,
          "Huawei Technologies Co": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Huawei Technologies Co. Ltd.",
      "/Company": "Huawei Technologies Co. Ltd.",
      "/CreationDate": "D:20181023102025+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2013",
      "/Keywords": "Huawei; Security Target Lite; Common Criteria; NE40E; VRP; Router",
      "/ModDate": "D:20181023102808+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2013",
      "/Subject": "Huawei NE40E Series Software Consisting of VRP and the Underlying OS, Security Target Lite",
      "/Title": "Huawei NE40E Series Software Consisting of VRP and the Underlying OS, Security Target Lite",
      "pdf_file_size_bytes": 1790079,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://support.huawei.com/hdx/pages/DOC100020474631189120/02/DOC100020474631189120/02/resources/vrp/dc_vrp_mac_cfg_0001.html?ft=99\u0026id=dc_vrp_mac_cfg_0001\u0026keyword=mac%2520address%2520table\u0026text=Overview\u0026docid=DOC1000204746#dc_vrp_mac_cfg_0001__tab_dc_vrp_mac_cfg_000101",
          "http://www.rfc-editor.org/info/rfc3526"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 87
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/CPP_ND_V2.0E.pdf",
        "pp_name": "collaborative Protection Profile for Network Devices v2.0 + Errata 20180314"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/1053a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/1053b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "93617722f9726ead858d55aabdd0d65f150ac7e81c608df9c496d1f34904c9f0",
    "report_txt_hash": "5fe87248ffe4381902ece61f60ab6432e6a3662097dd6e33780a4ebc01469411",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "9aa1f2ee24b8effbdeb433ed0e61f130d603c771b1c61a8c73bf06ded1e4c39c",
    "st_txt_hash": "ba48ef8caf068d71362310688de54f58ec442aac55fb40169e656b9cc107a046"
  },
  "status": "active"
}