This page was not yet optimized for use on mobile devices.
HPE Aruba Networking Orchestrator and EdgeConnect Release 9.4.2
CSV information
Status | active |
---|---|
Valid from | 07.03.2025 |
Valid until | 07.03.2030 |
Scheme | 🇦🇺 AU |
Manufacturer | Hewlett Packard Enterprise |
Category | Network and Network-Related Devices and Systems |
Security level | |
Protection profiles |
Heuristics summary
Certificate ID: Certificate Number: 2025/158
Certificate
Extracted keywords
Protocols
VPNCertificates
Certificate Number: 2025/158File metadata
Creation date | D:20250428135623+10'00' |
---|---|
Modification date | D:20250428135623+10'00' |
Pages | 1 |
Certification report
Extracted keywords
Protocols
SSH, TLS, IPsec, VPNEvaluation facilities
Teron LabsStandards
SP 800-90BFile metadata
Creation date | D:20250319000359+05'30' |
---|---|
Modification date | D:20250319000359+05'30' |
Pages | 18 |
Security target
Extracted keywords
Symmetric Algorithms
AES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
ECDHE, ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA384, SHA256Schemes
MAC, Key Exchange, Key AgreementProtocols
SSH, SSL, SSL 2.0, SSL 3.0, TLS, TLS 1.2, TLS 1.0, TLS 1.1, DTLS, IKE, IKEv2, IPsec, VPNRandomness
DRBG, RBGLibraries
Crypto Library 2021, Crypto Library 2024Elliptic Curves
P-256, P-384, P-521, secp256r1, secp384r1, secp521r1Block cipher modes
CBC, CTR, GCMTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256Claims
O.RESIDUAL_INFOR, O.STATEFUL_TRAFFI, O.ADDRESS_FILTERI, O.AUTHENTICATION, O.CRYPTOGRAPHIC, O.FAIL_SECURE, O.PORT_FILTERING, O.SYSTEM_MONITO, O.TOE_ADMINISTRA, T.UNAUTHORIZED_, T.WEAK_, T.UNTRUSTED_, T.UPDATE_, T.UNDETECTED_, T.SECURITY_, T.PASSWORD_, T.DATA_INTEGRITY, T.NETWORK_ACCES, T.NETWORK_DISCL, T.NETWORK_MISUS, T.REPLAY_ATTACK, T.MALICIOUS_TRAFF, T.UNAUTHORIZED_ADMINIS, T.UNDETECTED_ACTIVITY, T.PASSWORD_CRACKING, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_COMMUNICATION_CHANNELS, T.UNTRUSTED_COMMUNI, T.WEAK_AUTHENTICATIO, T.UPDATE_COMPROMISE, T.SECURITY_FUNCTIONAL, T.NETWORK_ACCESS, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.WEAK_AUTHENTICATION_ENDPOINTS, T.MALICIOUS_TRAFFIC, A.PHYSICAL_, A.LIMITED_, A.NO_THRU_, A.TRUSTED_, A.REGULAR_, A.ADMIN_, A.COMPONENTS_RU, A.RESIDUAL_, A.VS_TRUSTED_AD, A.VS_REGULAR_UP, A.VS_ISOLATON, A.VS_CORRECT_CO, A.CONNECTIONS, OE.PHYSICAL, OE.NO_GENERAL_, OE.NO_THRU_, OE.TRUSTED_ADMIN, OE.UPDATES, OE.ADMIN_, OE.COMPONENTS_R, OE.RESIDUAL_, OE.VM_CONFIGURA, OE.NO_THRU_TRAFFIC_PROTECTION, OE.CONNECTIONSSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN, FAU_GEN.2, FAU_GEN_EXT.1, FAU_STG_EXT.1, FAU_STG_EXT.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_GEN_EXT.1.1, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.1.3, FAU_STG_EXT.4.1, FAU_STG.1, FCO_CPC_EXT.1, FCO_CPC_EXT.1.1, FCO_CPC_EXT.1.2, FCO_CPC_EXT.1.3, FCS_NTP_EXT.1.4, FCS_TLSC_EXT.2.3, FCS_TLSS_EXT.1, FCS_SSHC_EXT.1, FCS_TLSC_EXT.1, FCS_CKM.1, FCS_CKM, FCS_CKM.2, FCS_CKM.4, FCS_COP, FCS_NTP_EXT.1, FCS_RBG_EXT.1, FCS_SSHS_EXT.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1, FCS_NTP_EXT.1.1, FCS_NTP_EXT.1.2, FCS_NTP_EXT.1.3, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SSHS_EXT.1.1, FCS_SSHS_EXT.1.2, FCS_SSHS_EXT.1.3, FCS_SSHS_EXT.1.4, FCS_SSHS_EXT.1.5, FCS_SSHS_EXT.1.6, FCS_SSHS_EXT.1.7, FCS_SSHS_EXT.1.8, FCS_TLSC_EXT.1.1, FCS_TLSC_EXT.1.2, FCS_TLSC_EXT.1.3, FCS_TLSC_EXT.1.4, FCS_TLSS_EXT.1.1, FCS_TLSS_EXT.1.2, FCS_TLSS_EXT.1.3, FCS_TLSS_EXT.1.4, FCS_RGB_EXT.1, FCS_CMK.1, FDP_RIP.2, FDP_RIP.2.1, FIA_AFL.1, FIA_PSK_EXT.3, FIA_PMG_EXT.1, FIA_PSK_EXT.1.1, FIA_UIA_EXT.1, FIA_UAU_EXT.2, FIA_UAU.7, FIA_AFL.1.1, FIA_AFL.1.2, FIA_PMG_EXT.1.1, FIA_PSK_EXT.1, FIA_PSK_EXT.1.2, FIA_PSK_EXT.2, FIA_PSK_EXT.2.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.2.1, FIA_UAU.7.1, FMT_MOF, FMT_MTD, FMT_SMF.1, FMT_SMF, FMT_SMR.2, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_ITT.1, FPT_SKP_EXT.1, FPT_APW_EXT.1, FPT_FLS, FPT_TST_EXT.1, FPT_TST_EXT.3, FPT_TUD_EXT.1, FPT_STM_EXT.1, FPT_ITT.1.1, FPT_SKP_EXT.1.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_FLS.1, FPT_TST_EXT.1.1, FPT_TST_EXT.3.1, FPT_TST_EXT.3.2, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_STM_EXT.1.1, FPT_STM_EXT.1.2, FTA_SSL_EXT.1, FTA_SSL.3, FTA_SSL.4, FTA_TAB.1, FTA_SSL_EXT.1.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC.1, FTP_ITC, FTP_TRP, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1, FTP_TRP.1.2, FTP_TRP.1.3Standards
FIPS PUB 186-4, FIPS 140-2, FIPS 186-4, NIST SP 800-56A, PKCS #1, RFC 5077, RFC 3526, RFC 7919, RFC 3447, RFC 2818, RFC 4301, RFC 4303, RFC 3602, RFC 4106, RFC 5996, RFC 4868, RFC 5282, RFC 5114, RFC 4945, RFC 8784, RFC 5905, RFC 4253, RFC 5246, RFC 3268, RFC 4492, RFC 5288, RFC 5289, RFC 6125, RFC 5735, RFC 3513, RFC 5280, RFC 6960, RFC 2986, RFC 791, RFC 8200, RFC 793, RFC 768, RFC 792, RFC 4443, RFC 2460, ISO/IEC 9796-2, ISO/IEC 14888-3, ISO/IEC 18031:2011, X.509File metadata
Title | HPE Aruba Networking |
---|---|
Subject | HPE Aruba Networking Orchestrator and EdgeConnect Release 9.4.2 |
Author | Juan Gonzalez |
Creation date | D:20250314014158+00'00' |
Modification date | D:20250314014158+00'00' |
Pages | 87 |
Creator | Microsoft Word |
Heuristics
Certificate ID: Certificate Number: 2025/158
Extracted SARs
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1, ATE_IND.1, AVA_VAN.1References
No references are available for this certificate.
Updates
-
28.04.2025 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2025_158_EFT-T049_HPE%20Aruba%20Networking_os.pdf
.
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '25d20414e0fc28879cd119502ca44fc1460f0648b267d7a3b169bbae3053730a', 'txt_hash': 'ecd3d426a9bf4f909a347bfd54bcda55a4aaa05a2798e63a9fddb2e3bace4d96'}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
{'pdf_file_size_bytes': 146647, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20250428135623+10'00'", '/ModDate': "D:20250428135623+10'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_keywords property was set to
{'cc_cert_id': {'AU': {'Certificate Number: 2025/158': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_filename property was set to
AISEP_Certificate_2025_158_EFT-T049_HPE Aruba Networking_os.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
Certificate Number: 2025/158
.
- The new value is
-
03.04.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name HPE Aruba Networking Orchestrator and EdgeConnect Release 9.4.2 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2025_158_EFT-T049_HPE%20Aruba%20Networking_os.pdf",
"dgst": "d82488c216167e98",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "Certificate Number: 2025/158",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL1",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"9.4.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"e2ad7e4a892e3703",
"89f2a255423f4a20",
"bde3d7587cf42e78"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Hewlett Packard Enterprise",
"manufacturer_web": "https://www.hpe.com/",
"name": "HPE Aruba Networking Orchestrator and EdgeConnect Release 9.4.2",
"not_valid_after": "2030-03-07",
"not_valid_before": "2025-03-07",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "AISEP_Certificate_2025_158_EFT-T049_HPE Aruba Networking_os.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"AU": {
"Certificate Number: 2025/158": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20250428135623+10\u002700\u0027",
"/ModDate": "D:20250428135623+10\u002700\u0027",
"pdf_file_size_bytes": 146647,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "AISEP-CC-CR-2025-EFT-T049-CR-V1.1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 3
},
"SSH": {
"SSH": 4
},
"TLS": {
"TLS": {
"TLS": 8
}
},
"VPN": {
"VPN": 21
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Teron": {
"Teron Labs": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"NIST": {
"SP 800-90B": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20250319000359+05\u002730\u0027",
"/ModDate": "D:20250319000359+05\u002730\u0027",
"pdf_file_size_bytes": 1309218,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.cyber.gov.au/ism",
"https://www.cyber.gov.au/sites/default/files/2019-03/AISEP_Policy_Manual.pdf",
"https://www.hpe.com/",
"https://www.arubanetworks.com/techdocs/sdwan/",
"https://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "TL_Aruba Orchestrator and EdgeConnect ST_1.16 20250314 - clean.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 5
},
"ECDH": {
"ECDH": 3,
"ECDHE": 3
},
"ECDSA": {
"ECDSA": 21
}
},
"FF": {
"DH": {
"DH": 23,
"Diffie-Hellman": 4
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN_": 1,
"A.COMPONENTS_RU": 1,
"A.CONNECTIONS": 1,
"A.LIMITED_": 1,
"A.NO_THRU_": 1,
"A.PHYSICAL_": 1,
"A.REGULAR_": 1,
"A.RESIDUAL_": 1,
"A.TRUSTED_": 1,
"A.VS_CORRECT_CO": 1,
"A.VS_ISOLATON": 1,
"A.VS_REGULAR_UP": 1,
"A.VS_TRUSTED_AD": 1
},
"O": {
"O.ADDRESS_FILTERI": 1,
"O.AUTHENTICATION": 1,
"O.CRYPTOGRAPHIC": 1,
"O.FAIL_SECURE": 1,
"O.PORT_FILTERING": 1,
"O.RESIDUAL_INFOR": 1,
"O.STATEFUL_TRAFFI": 1,
"O.SYSTEM_MONITO": 1,
"O.TOE_ADMINISTRA": 1
},
"OE": {
"OE.ADMIN_": 1,
"OE.COMPONENTS_R": 1,
"OE.CONNECTIONS": 1,
"OE.NO_GENERAL_": 1,
"OE.NO_THRU_": 1,
"OE.NO_THRU_TRAFFIC_PROTECTION": 1,
"OE.PHYSICAL": 1,
"OE.RESIDUAL_": 1,
"OE.TRUSTED_ADMIN": 1,
"OE.UPDATES": 1,
"OE.VM_CONFIGURA": 1
},
"T": {
"T.DATA_INTEGRITY": 2,
"T.MALICIOUS_TRAFF": 1,
"T.MALICIOUS_TRAFFIC": 1,
"T.NETWORK_ACCES": 2,
"T.NETWORK_ACCESS": 2,
"T.NETWORK_DISCL": 2,
"T.NETWORK_DISCLOSURE": 2,
"T.NETWORK_MISUS": 2,
"T.NETWORK_MISUSE": 2,
"T.PASSWORD_": 1,
"T.PASSWORD_CRACKING": 3,
"T.REPLAY_ATTACK": 2,
"T.SECURITY_": 2,
"T.SECURITY_FUNCTIONAL": 2,
"T.UNAUTHORIZED_": 1,
"T.UNAUTHORIZED_ADMINIS": 1,
"T.UNDETECTED_": 1,
"T.UNDETECTED_ACTIVITY": 2,
"T.UNTRUSTED_": 1,
"T.UNTRUSTED_COMMUNI": 1,
"T.UNTRUSTED_COMMUNICATION_CHANNELS": 6,
"T.UPDATE_": 1,
"T.UPDATE_COMPROMISE": 1,
"T.WEAK_": 2,
"T.WEAK_AUTHENTICATIO": 1,
"T.WEAK_AUTHENTICATION_ENDPOINTS": 1,
"T.WEAK_CRYPTOGRAPHY": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 6,
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_GEN_EXT.1": 4,
"FAU_GEN_EXT.1.1": 1,
"FAU_STG.1": 1,
"FAU_STG_EXT.1": 5,
"FAU_STG_EXT.1.1": 1,
"FAU_STG_EXT.1.2": 1,
"FAU_STG_EXT.1.3": 1,
"FAU_STG_EXT.4": 4,
"FAU_STG_EXT.4.1": 1
},
"FCO": {
"FCO_CPC_EXT.1": 7,
"FCO_CPC_EXT.1.1": 1,
"FCO_CPC_EXT.1.2": 1,
"FCO_CPC_EXT.1.3": 1
},
"FCS": {
"FCS_CKM": 5,
"FCS_CKM.1": 7,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 6,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 5,
"FCS_CKM.4.1": 1,
"FCS_CMK.1": 1,
"FCS_COP": 27,
"FCS_COP.1": 4,
"FCS_NTP_EXT.1": 7,
"FCS_NTP_EXT.1.1": 1,
"FCS_NTP_EXT.1.2": 1,
"FCS_NTP_EXT.1.3": 1,
"FCS_NTP_EXT.1.4": 2,
"FCS_RBG_EXT.1": 8,
"FCS_RBG_EXT.1.1": 1,
"FCS_RBG_EXT.1.2": 1,
"FCS_RGB_EXT.1": 1,
"FCS_SSHC_EXT.1": 1,
"FCS_SSHS_EXT.1": 14,
"FCS_SSHS_EXT.1.1": 1,
"FCS_SSHS_EXT.1.2": 1,
"FCS_SSHS_EXT.1.3": 1,
"FCS_SSHS_EXT.1.4": 1,
"FCS_SSHS_EXT.1.5": 1,
"FCS_SSHS_EXT.1.6": 1,
"FCS_SSHS_EXT.1.7": 1,
"FCS_SSHS_EXT.1.8": 1,
"FCS_TLSC_EXT.1": 17,
"FCS_TLSC_EXT.1.1": 1,
"FCS_TLSC_EXT.1.2": 1,
"FCS_TLSC_EXT.1.3": 1,
"FCS_TLSC_EXT.1.4": 1,
"FCS_TLSC_EXT.2.3": 1,
"FCS_TLSS_EXT.1": 18,
"FCS_TLSS_EXT.1.1": 1,
"FCS_TLSS_EXT.1.2": 1,
"FCS_TLSS_EXT.1.3": 1,
"FCS_TLSS_EXT.1.4": 1
},
"FDP": {
"FDP_RIP.2": 5,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_AFL.1": 10,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_PMG_EXT.1": 6,
"FIA_PMG_EXT.1.1": 1,
"FIA_PSK_EXT.1": 2,
"FIA_PSK_EXT.1.1": 2,
"FIA_PSK_EXT.1.2": 1,
"FIA_PSK_EXT.2": 2,
"FIA_PSK_EXT.2.1": 1,
"FIA_PSK_EXT.3": 4,
"FIA_UAU.7": 5,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT.2": 6,
"FIA_UAU_EXT.2.1": 1,
"FIA_UIA_EXT.1": 6,
"FIA_UIA_EXT.1.1": 1,
"FIA_UIA_EXT.1.2": 1
},
"FMT": {
"FMT_MOF": 15,
"FMT_MOF.1": 4,
"FMT_MTD": 12,
"FMT_MTD.1": 2,
"FMT_SMF": 19,
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1,
"FMT_SMR.2": 5,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_APW_EXT.1": 5,
"FPT_APW_EXT.1.1": 1,
"FPT_APW_EXT.1.2": 1,
"FPT_FLS": 4,
"FPT_FLS.1": 1,
"FPT_ITT.1": 11,
"FPT_ITT.1.1": 1,
"FPT_SKP_EXT.1": 5,
"FPT_SKP_EXT.1.1": 1,
"FPT_STM_EXT.1": 8,
"FPT_STM_EXT.1.1": 1,
"FPT_STM_EXT.1.2": 1,
"FPT_TST_EXT.1": 5,
"FPT_TST_EXT.1.1": 1,
"FPT_TST_EXT.3": 4,
"FPT_TST_EXT.3.1": 1,
"FPT_TST_EXT.3.2": 1,
"FPT_TUD_EXT.1": 8,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 1,
"FPT_TUD_EXT.1.3": 1
},
"FTA": {
"FTA_SSL.3": 7,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 6,
"FTA_SSL.4.1": 1,
"FTA_SSL_EXT.1": 7,
"FTA_SSL_EXT.1.1": 1,
"FTA_TAB.1": 8,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC": 5,
"FTP_ITC.1": 17,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP": 7,
"FTP_TRP.1": 2,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CTR": {
"CTR": 5
},
"GCM": {
"GCM": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Generic": {
"Crypto Library 2021": 2,
"Crypto Library 2024": 9
}
},
"crypto_protocol": {
"IKE": {
"IKE": 13,
"IKEv2": 17
},
"IPsec": {
"IPsec": 27
},
"SSH": {
"SSH": 65
},
"TLS": {
"DTLS": {
"DTLS": 1
},
"SSL": {
"SSL": 4,
"SSL 2.0": 2,
"SSL 3.0": 2
},
"TLS": {
"TLS": 75,
"TLS 1.0": 2,
"TLS 1.1": 2,
"TLS 1.2": 4
}
},
"VPN": {
"VPN": 41
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 3
},
"KEX": {
"Key Exchange": 2
},
"MAC": {
"MAC": 5
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 8,
"P-384": 12,
"P-521": 12,
"secp256r1": 6,
"secp384r1": 6,
"secp521r1": 6
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 7
},
"SHA2": {
"SHA-256": 6,
"SHA-384": 6,
"SHA-512": 7,
"SHA256": 8,
"SHA384": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 8
},
"RNG": {
"RBG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 2,
"FIPS 186-4": 7,
"FIPS PUB 186-4": 6
},
"ISO": {
"ISO/IEC 14888-3": 1,
"ISO/IEC 18031:2011": 2,
"ISO/IEC 9796-2": 1
},
"NIST": {
"NIST SP 800-56A": 1
},
"PKCS": {
"PKCS #1": 1
},
"RFC": {
"RFC 2460": 2,
"RFC 2818": 5,
"RFC 2986": 1,
"RFC 3268": 4,
"RFC 3447": 2,
"RFC 3513": 2,
"RFC 3526": 16,
"RFC 3602": 2,
"RFC 4106": 1,
"RFC 4253": 1,
"RFC 4301": 2,
"RFC 4303": 2,
"RFC 4443": 1,
"RFC 4492": 4,
"RFC 4868": 2,
"RFC 4945": 2,
"RFC 5077": 3,
"RFC 5114": 2,
"RFC 5246": 9,
"RFC 5280": 3,
"RFC 5282": 1,
"RFC 5288": 6,
"RFC 5289": 12,
"RFC 5735": 2,
"RFC 5905": 2,
"RFC 5996": 4,
"RFC 6125": 5,
"RFC 6960": 4,
"RFC 768": 2,
"RFC 791": 3,
"RFC 7919": 2,
"RFC 792": 1,
"RFC 793": 2,
"RFC 8200": 1,
"RFC 8784": 1
},
"X509": {
"X.509": 9
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 14
}
},
"constructions": {
"MAC": {
"HMAC": 5,
"HMAC-SHA-256": 6,
"HMAC-SHA-384": 4,
"HMAC-SHA-512": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 2,
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 3,
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 6,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 2,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 3,
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 6,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 2,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 3,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 3,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 3,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 3,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 2,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 6,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 6,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 2,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 6,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 6,
"TLS_RSA_WITH_AES_128_CBC_SHA": 2,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_RSA_WITH_AES_256_CBC_SHA": 2,
"TLS_RSA_WITH_AES_256_GCM_SHA384": 2
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Juan Gonzalez",
"/CreationDate": "D:20250314014158+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20250314014158+00\u002700\u0027",
"/Subject": "HPE Aruba Networking Orchestrator and EdgeConnect Release 9.4.2",
"/Title": "HPE Aruba Networking",
"pdf_file_size_bytes": 999351,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37859",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37394",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37943",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37944",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37942"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 87
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPNGW_v1.3.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.4e.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2025-EFT-T049-CR-V1.1.pdf",
"scheme": "AU",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TL_Aruba%20Orchestrator%20and%20EdgeConnect%20ST_1.16%2020250314%20-%20clean.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "25d20414e0fc28879cd119502ca44fc1460f0648b267d7a3b169bbae3053730a",
"txt_hash": "ecd3d426a9bf4f909a347bfd54bcda55a4aaa05a2798e63a9fddb2e3bace4d96"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "deb01eefa9d6045b43896baf67e7d656da0b668d3c2dcb6c0a892701af083fd3",
"txt_hash": "0c3b03830fb701e808b3d6aea6acd50a302b646852523a6921fefa1b5fcb3fee"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d73957329f9f73dfb8e10c9593189097f320b4b01a25bc824a0f040d571bd561",
"txt_hash": "7db278955935cd2545d2e57aa7499114cfdbf9edae4cf7ddc4116fc3e6be3aa1"
}
},
"status": "active"
}