Palo Alto Networks M-100, M-200, M-500, and M-600 Hardware, and Virtual Appliances all running Panorama 8.1.10

CSV information ?

Status archived
Valid from 12.11.2019
Valid until 12.11.2021
Scheme 🇺🇸 US
Manufacturer Palo Alto Networks, Inc.
Category Network and Network-Related Devices and Systems
Security level

Heuristics summary ?

Certificate ID: CCEVS-VR-VID-10980-2019

Certificate ?

Extracted keywords

Certificates
CCEVS-VR-VID10980-2019
Evaluation facilities
Leidos

File metadata

Creation date D:20191119111952-05'00'
Modification date D:20191119111952-05'00'
Pages 1
Producer iText 2.1.0 (by lowagie.com)

Certification report ?

Extracted keywords

Protocols
SSH, SSHv2, TLS, IPsec, VPN
Randomness
RBG

Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
Certificates
CCEVS-VR-VID10980-2019
Evaluation facilities
Leidos

Certification process
out of scope, e., stateful inspection filtering, IPsec VPN gateway, IPS/IDS threat prevention) are not evaluated (out of scope). Only the secure communication channels from Panorama to firewalls and Wildfires are claimed, protocol and can be used to build a management interface. This feature is not tested and is out of scope. Stateful inspection filtering, VPN gateway, IPS/IDS threat prevention, URL filtering (PAN- DB

Standards
FIPS 140-2

File metadata

Creation date D:20191119084910-05'00'
Modification date D:20191119084910-05'00'
Pages 20

Frontpage

Certificate ID CCEVS-VR-VID10980-2019
Certified item for Palo Alto Networks Panorama v8.1.10
Certification lab US NIAP

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-256, 3DES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
RSA 2048, RSA-2048, ECDH, ECDHE, ECDSA, ECC, DH, Diffie-Hellman, DHE, DSA
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA256
Schemes
MAC
Protocols
SSH, SSHv2, SSL, SSL 2.0, SSL 3.0, TLS1.1, TLS1.2, TLS, TLS 1.2, TLS 1.1, TLS 1.0, TLSv1.2, TLSv1.1, IKE, IPsec, VPN
Randomness
DRBG, RNG, RBG
Elliptic Curves
P-256, P-384, P-521, secp256r1, secp384r1, secp521r1
Block cipher modes
CBC, CTR, GCM, CCM
TLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

Vendor
Broadcom, Microsoft

Claims
A.PHYSICAL_PROTECTION, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.NO_THRU_TRAFFIC_PROTECTION, OE.UPDATES, OE.ADMIN_CREDENTIALS_SECURE, OE.TRUSTED_ADMIN, OE.RESIDUAL_INFORMATION
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN, FAU_STG_EXT, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_STG_EXT.1, FAU_GEN.2.1, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.1.3, FCS_SSHS_EXT.1.5, FCS_SSHC_EXT.1.5, FCS_CKM.2, FCS_TLSC_EXT.1.1, FCS_COP, FCS_CKM.1, FCS_RBG_EXT.1, FCS_CKM, FCS_RBG_EXT, FCS_SSHS_EXT, FCS_TLSC_EXT, FCS_TLSS_EXT, FCS_CKM.4, FCS_SSHS_EXT.1, FCS_TLSC_EXT.1, FCS_TLSC_EXT.2, FCS_TLSS_EXT.1, FCS_TLSS_EXT.2, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SSHS_EXT.1.1, FCS_SSHS_EXT.1.2, FCS_SSHS_EXT.1.3, FCS_SSHS_EXT.1.4, FCS_SSHS_EXT.1.6, FCS_SSHS_EXT.1.7, FCS_SSHS_EXT.1.8, FCS_TLSC_EXT.1.2, FCS_TLSC_EXT.1.3, FCS_TLSC_EXT.1.4, FCS_TLSC_EXT.2.1, FCS_TLSC_EXT.2.2, FCS_TLSC_EXT.2.3, FCS_TLSC_EXT.2.4, FCS_TLSC_EXT.2.5, FCS_TLSS_EXT.1.1, FCS_TLSS_EXT.1.2, FCS_TLSS_EXT.1.3, FCS_TLSS_EXT.2.1, FCS_TLSS_EXT.2.2, FCS_TLSS_EXT.2.3, FCS_TLSS_EXT.2.4, FCS_TLSS_EXT.2.5, FCS_TLSS_EXT.2.6, FIA_AFL.1, FIA_AFL, FIA_PMG_EXT, FIA_UIA_EXT, FIA_UAU_EXT, FIA_UAU, FIA_PMG_EXT.1, FIA_UIA_EXT.1, FIA_UAU_EXT.2, FIA_UAU.7, FIA_AFL.1.1, FIA_AFL.1.2, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.2.1, FIA_UAU.7.1, FMT_MOF, FMT_MTD, FMT_SMF, FMT_SMR, FMT_SMF.1, FMT_SMR.2, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_SKP_EXT, FPT_APW_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_STM_EXT, FPT_SKP_EXT.1, FPT_APW_EXT.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_STM_EXT.1, FPT_SKP_EXT.1.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_STM_EXT.1.1, FPT_STM_EXT.1.2, FTA_SSL_EXT, FTA_SSL, FTA_TAB, FTA_SSL_EXT.1, FTA_SSL.3, FTA_SSL.4, FTA_TAB.1, FTA_SSL_EXT.1.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1

Certification process
out of scope, e., stateful inspection filtering, IPsec VPN gateway, IPS/IDS threat prevention) are not evaluated (out of scope). Only the secure communication channels from Panorama to firewalls and Wildfires are claimed. The, extent specified by the security functional requirements: TLS, HTTPS, SSH. The features below are out of scope. Table 2 Excluded Features Feature Description Telnet and HTTP Management Protocols Telnet and HTTP, protocol and can be used to build a management interface. This feature is not tested and is out of scope. Stateful inspection filtering, VPN gateway, IPS/IDS threat prevention, URL filtering (PAN- DB

Standards
FIPS 186-4, FIPS 140-2, FIPS PUB 186-4, SP 800-90A, NIST SP 800-56A, PKCS #1, PKCS#12, RFC 3526, RFC 8017, RFC 2818, RFC 4253, RFC 5246, RFC 3268, RFC 4492, RFC 5289, RFC 6125, RFC 4346, RFC 5280, RFC 6960, RFC 5759, RFC 2986, ISO/IEC 9796-2, ISO/IEC 14888-3, ISO/IEC 14888-, ISO/IEC 18031:2011, X.509

File metadata

Creation date D:20191119084329-05'00'
Modification date D:20191119084329-05'00'
Pages 56

Heuristics ?

Certificate ID: CCEVS-VR-VID-10980-2019

Extracted SARs

ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1

Scheme data ?

Product Palo Alto Networks M-100, M-200, M-500, and M-600 Hardware, and Virtual Appliances all running Panorama 8.1.10
Id CCEVS-VR-VID10980
Url https://www.niap-ccevs.org/product/10980
Certification Date 12.11.2019
Expiration Date 12.11.2021
Category Network Device
Vendor Palo Alto Networks, Inc.
Evaluation Facility Leidos Common Criteria Testing Laboratory
Scheme US

References ?

No references are available for this certificate.

Updates ?

  • 03.04.2025 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'crypto_protocol': {'__update__': {'SSH': {'__insert__': {'SSHv2': 1}}}}} data.
    • The st_keywords property was updated, with the {'crypto_protocol': {'__update__': {'SSH': {'__insert__': {'SSHv2': 7}}}}} data.
  • 10.02.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Palo Alto Networks M-100, M-200, M-500, and M-600 Hardware, and Virtual Appliances all running Panorama 8.1.10', 'id': 'CCEVS-VR-VID10980', 'url': 'https://www.niap-ccevs.org/product/10980', 'certification_date': '2019-11-12', 'expiration_date': '2021-11-12', 'category': 'Network Device', 'vendor': 'Palo Alto Networks, Inc.', 'evaluation_facility': 'Leidos Common Criteria Testing Laboratory', 'scheme': 'US'}.
  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': None, 'eal': None}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
    • The scheme_data property was set to None.
  • 06.01.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Palo Alto Networks M-100, M-200, M-500, and M-600 Hardware, and Virtual Appliances all running Panorama 8.1.10', 'id': 'CCEVS-VR-VID10980', 'url': 'https://www.niap-ccevs.org/product/10980', 'certification_date': '2019-11-12', 'expiration_date': '2021-11-12', 'category': 'Network Device', 'vendor': 'Palo Alto Networks, Inc.', 'evaluation_facility': 'Leidos Common Criteria Testing Laboratory', 'scheme': 'US'}.
  • 30.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Palo Alto Networks M-100, M-200, M-500, and M-600 Hardware, and Virtual Appliances all running Panorama 8.1.10', 'id': 'CCEVS-VR-VID10980', 'url': 'https://www.niap-ccevs.org/product/10980', 'certification_date': '2019-11-12', 'expiration_date': '2021-11-12', 'category': 'Network Device', 'vendor': 'Palo Alto Networks, Inc.', 'evaluation_facility': 'Leidos Common Criteria Testing Laboratory', 'scheme': 'US'}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2019-11-12', 'expiration_date': '2021-11-12'} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'de2ba1f8d4a8307507a85e600cff5731be671fcaf5aa842f84aef29a1cf24a7e', 'txt_hash': 'a0190b2ab7efca9ce3eca743da1e055c613d4da1a0a2a2bdcfa627f29fc0abf6'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'aaa06b2261c10c597bbf120a1181c16d9ed63ccf12e9dda1130b016d3e31ebb6', 'txt_hash': '8502ba556c045bfb91ae2139ff772a958e9e4cd7dc536d5e387bf3b616fe078a'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c014c9a30c717f4f42cc8c0084efbb44a3de7177991d2089152e71bebcd9730e', 'txt_hash': '389180ee45b49fc89f3504562e9a779c2d2f30aa5ee6c6ace5352c3977c133e5'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 584095, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 20, '/CreationDate': "D:20191119084910-05'00'", '/ModDate': "D:20191119084910-05'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1492668, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 56, '/CreationDate': "D:20191119084329-05'00'", '/ModDate': "D:20191119084329-05'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=412', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=418', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=407', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=405', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=421', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=435', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=422', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=406', 'file:///C:/Users/beaverg/Desktop/CCTL%20Projects/Palo%20Alto%20Panorama/Received%20from%20Vendor/updates.paloaltonetworks.com', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=409', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=420', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=408', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=433', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=417', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=411', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=410', 'https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/technical-documentation/81/vm-series/vm-series-deployment/vm-series-deployment.pdf', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=419', 'https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=434', 'https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/technical-documentation/81/panorama/panorama-admin/panorama-admin.pdf']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 180256, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/ModDate': "D:20191119111952-05'00'", '/CreationDate': "D:20191119111952-05'00'", '/Producer': 'iText 2.1.0 (by lowagie.com)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-VID10980-2019', 'cert_item': 'for Palo Alto Networks Panorama v8.1.10', 'cert_lab': 'US NIAP'}}.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID10980-2019': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.1': 1, 'ALC_CMS.1': 1}, 'ATE': {'ATE_IND.1': 1}, 'AVA': {'AVA_VAN.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Leidos': {'Leidos': 6}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 7}, 'TLS': {'TLS': {'TLS': 9}}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 3}}, 'randomness': {'RNG': {'RBG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'e., stateful inspection filtering, IPsec VPN gateway, IPS/IDS threat prevention) are not evaluated (out of scope). Only the secure communication channels from Panorama to firewalls and Wildfires are claimed': 1, 'protocol and can be used to build a management interface. This feature is not tested and is out of scope. Stateful inspection filtering, VPN gateway, IPS/IDS threat prevention, URL filtering (PAN- DB': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.1': 1, 'ALC_CMS.1': 1}, 'ATE': {'ATE_IND.1': 1}, 'AVA': {'AVA_VAN.1': 1}, 'ASE': {'ASE_INT': 1, 'ASE_CCL': 1, 'ASE_SPD': 1, 'ASE_OBJ': 1, 'ASE_ECD': 1, 'ASE_REQ': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 4, 'FAU_GEN': 2, 'FAU_STG_EXT': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 3, 'FAU_STG_EXT.1': 3, 'FAU_GEN.2.1': 1, 'FAU_STG_EXT.1.1': 1, 'FAU_STG_EXT.1.2': 1, 'FAU_STG_EXT.1.3': 1}, 'FCS': {'FCS_SSHS_EXT.1.5': 2, 'FCS_SSHC_EXT.1.5': 1, 'FCS_CKM.2': 6, 'FCS_TLSC_EXT.1.1': 2, 'FCS_COP': 19, 'FCS_CKM.1': 5, 'FCS_RBG_EXT.1': 5, 'FCS_CKM': 3, 'FCS_RBG_EXT': 1, 'FCS_SSHS_EXT': 1, 'FCS_TLSC_EXT': 2, 'FCS_TLSS_EXT': 2, 'FCS_CKM.4': 3, 'FCS_SSHS_EXT.1': 3, 'FCS_TLSC_EXT.1': 3, 'FCS_TLSC_EXT.2': 2, 'FCS_TLSS_EXT.1': 3, 'FCS_TLSS_EXT.2': 2, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 4, 'FCS_RBG_EXT.1.1': 1, 'FCS_RBG_EXT.1.2': 1, 'FCS_SSHS_EXT.1.1': 1, 'FCS_SSHS_EXT.1.2': 1, 'FCS_SSHS_EXT.1.3': 1, 'FCS_SSHS_EXT.1.4': 1, 'FCS_SSHS_EXT.1.6': 1, 'FCS_SSHS_EXT.1.7': 1, 'FCS_SSHS_EXT.1.8': 1, 'FCS_TLSC_EXT.1.2': 1, 'FCS_TLSC_EXT.1.3': 1, 'FCS_TLSC_EXT.1.4': 1, 'FCS_TLSC_EXT.2.1': 1, 'FCS_TLSC_EXT.2.2': 1, 'FCS_TLSC_EXT.2.3': 1, 'FCS_TLSC_EXT.2.4': 1, 'FCS_TLSC_EXT.2.5': 1, 'FCS_TLSS_EXT.1.1': 1, 'FCS_TLSS_EXT.1.2': 1, 'FCS_TLSS_EXT.1.3': 1, 'FCS_TLSS_EXT.2.1': 1, 'FCS_TLSS_EXT.2.2': 1, 'FCS_TLSS_EXT.2.3': 1, 'FCS_TLSS_EXT.2.4': 1, 'FCS_TLSS_EXT.2.5': 1, 'FCS_TLSS_EXT.2.6': 1}, 'FIA': {'FIA_AFL.1': 6, 'FIA_AFL': 1, 'FIA_PMG_EXT': 1, 'FIA_UIA_EXT': 1, 'FIA_UAU_EXT': 1, 'FIA_UAU': 1, 'FIA_PMG_EXT.1': 3, 'FIA_UIA_EXT.1': 5, 'FIA_UAU_EXT.2': 2, 'FIA_UAU.7': 3, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_PMG_EXT.1.1': 1, 'FIA_UIA_EXT.1.1': 1, 'FIA_UIA_EXT.1.2': 1, 'FIA_UAU_EXT.2.1': 1, 'FIA_UAU.7.1': 1}, 'FMT': {'FMT_MOF': 4, 'FMT_MTD': 4, 'FMT_SMF': 1, 'FMT_SMR': 1, 'FMT_SMF.1': 3, 'FMT_SMR.2': 3, 'FMT_MOF.1': 1, 'FMT_MTD.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1}, 'FPT': {'FPT_SKP_EXT': 1, 'FPT_APW_EXT': 1, 'FPT_TST_EXT': 1, 'FPT_TUD_EXT': 1, 'FPT_STM_EXT': 1, 'FPT_SKP_EXT.1': 3, 'FPT_APW_EXT.1': 3, 'FPT_TST_EXT.1': 2, 'FPT_TUD_EXT.1': 3, 'FPT_STM_EXT.1': 4, 'FPT_SKP_EXT.1.1': 1, 'FPT_APW_EXT.1.1': 1, 'FPT_APW_EXT.1.2': 1, 'FPT_TST_EXT.1.1': 1, 'FPT_TUD_EXT.1.1': 1, 'FPT_TUD_EXT.1.2': 1, 'FPT_TUD_EXT.1.3': 1, 'FPT_STM_EXT.1.1': 1, 'FPT_STM_EXT.1.2': 1}, 'FTA': {'FTA_SSL_EXT': 1, 'FTA_SSL': 2, 'FTA_TAB': 1, 'FTA_SSL_EXT.1': 3, 'FTA_SSL.3': 3, 'FTA_SSL.4': 2, 'FTA_TAB.1': 4, 'FTA_SSL_EXT.1.1': 1, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC': 1, 'FTP_TRP': 4, 'FTP_ITC.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 3}}, 'cc_claims': {'A': {'A.PHYSICAL_PROTECTION': 1}, 'OE': {'OE.PHYSICAL': 1, 'OE.NO_GENERAL_PURPOSE': 1, 'OE.NO_THRU_TRAFFIC_PROTECTION': 1, 'OE.UPDATES': 1, 'OE.ADMIN_CREDENTIALS_SECURE': 1, 'OE.TRUSTED_ADMIN': 1, 'OE.RESIDUAL_INFORMATION': 1}}, 'vendor': {'Broadcom': {'Broadcom': 2}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 33, 'AES-256': 5}}, 'DES': {'3DES': {'3DES': 1}}, 'constructions': {'MAC': {'HMAC': 9, 'HMAC-SHA-256': 7, 'HMAC-SHA-384': 4, 'HMAC-SHA-512': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 2, 'RSA-2048': 1}, 'ECC': {'ECDH': {'ECDH': 2, 'ECDHE': 1}, 'ECDSA': {'ECDSA': 21}, 'ECC': {'ECC': 6}}, 'FF': {'DH': {'DH': 7, 'Diffie-Hellman': 8, 'DHE': 1}, 'DSA': {'DSA': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-256': 6, 'SHA-384': 4, 'SHA-512': 4, 'SHA256': 17}}}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {'SSH': {'SSH': 44}, 'TLS': {'SSL': {'SSL': 5, 'SSL 2.0': 4, 'SSL 3.0': 4}, 'TLS': {'TLS1.1': 1, 'TLS1.2': 1, 'TLS': 78, 'TLS 1.2': 6, 'TLS 1.1': 4, 'TLS 1.0': 4, 'TLSv1.2': 6, 'TLSv1.1': 3}}, 'IKE': {'IKE': 1}, 'IPsec': {'IPsec': 3}, 'VPN': {'VPN': 4}}, 'randomness': {'PRNG': {'DRBG': 14}, 'RNG': {'RNG': 6, 'RBG': 4}}, 'cipher_mode': {'CBC': {'CBC': 8}, 'CTR': {'CTR': 7}, 'GCM': {'GCM': 12}, 'CCM': {'CCM': 4}}, 'ecc_curve': {'NIST': {'P-256': 18, 'P-384': 12, 'P-521': 10, 'secp256r1': 7, 'secp384r1': 7, 'secp521r1': 3}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 7, 'TLS_RSA_WITH_AES_256_CBC_SHA': 7, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 7, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 7, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 5, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 5, 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 7, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 7, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 7, 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256': 5, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384': 5, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 7, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 7, 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256': 5, 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384': 5, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256': 5, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384': 5}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-4': 3, 'FIPS 140-2': 2, 'FIPS PUB 186-4': 18}, 'NIST': {'SP 800-90A': 2, 'NIST SP 800-56A': 2}, 'PKCS': {'PKCS #1': 2, 'PKCS#12': 2}, 'RFC': {'RFC 3526': 3, 'RFC 8017': 2, 'RFC 2818': 3, 'RFC 4253': 2, 'RFC 5246': 30, 'RFC 3268': 28, 'RFC 4492': 24, 'RFC 5289': 44, 'RFC 6125': 3, 'RFC 4346': 4, 'RFC 5280': 5, 'RFC 6960': 1, 'RFC 5759': 1, 'RFC 2986': 2}, 'ISO': {'ISO/IEC 9796-2': 2, 'ISO/IEC 14888-3': 1, 'ISO/IEC 14888-': 1, 'ISO/IEC 18031:2011': 4}, 'X509': {'X.509': 8}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 3, 'e., stateful inspection filtering, IPsec VPN gateway, IPS/IDS threat prevention) are not evaluated (out of scope). Only the secure communication channels from Panorama to firewalls and Wildfires are claimed. The': 1, 'extent specified by the security functional requirements: TLS, HTTPS, SSH. The features below are out of scope. Table 2 Excluded Features Feature Description Telnet and HTTP Management Protocols Telnet and HTTP': 1, 'protocol and can be used to build a management interface. This feature is not tested and is out of scope. Stateful inspection filtering, VPN gateway, IPS/IDS threat prevention, URL filtering (PAN- DB': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID10980-2019': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Leidos': {'Leidos': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to st_vid10980-vr.pdf.
    • The st_filename property was set to st_vid10980-st.pdf.
    • The cert_filename property was set to st_vid10980-ci.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
    • The cert_id property was set to CCEVS-VR-VID-10980-2019.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10980-vr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10980-st.pdf.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Palo Alto Networks M-100, M-200, M-500, and M-600 Hardware, and Virtual Appliances all running Panorama 8.1.10 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10980-ci.pdf",
  "dgst": "a8e03915b8738eb7",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10980-2019",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "8.1.10"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Network Device",
      "certification_date": "2019-11-12",
      "evaluation_facility": "Leidos Common Criteria Testing Laboratory",
      "expiration_date": "2021-11-12",
      "id": "CCEVS-VR-VID10980",
      "product": "Palo Alto Networks M-100, M-200, M-500, and M-600 Hardware, and Virtual Appliances all running Panorama 8.1.10",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/product/10980",
      "vendor": "Palo Alto Networks, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Palo Alto Networks, Inc.",
  "manufacturer_web": "https://www.paloaltonetworks.com/",
  "name": "Palo Alto Networks M-100, M-200, M-500, and M-600 Hardware, and Virtual Appliances all running Panorama 8.1.10",
  "not_valid_after": "2021-11-12",
  "not_valid_before": "2019-11-12",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "st_vid10980-ci.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10980-2019": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Leidos": {
          "Leidos": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20191119111952-05\u002700\u0027",
      "/ModDate": "D:20191119111952-05\u002700\u0027",
      "/Producer": "iText 2.1.0 (by lowagie.com)",
      "pdf_file_size_bytes": 180256,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "st_vid10980-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10980-2019",
        "cert_item": "for Palo Alto Networks Panorama v8.1.10",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10980-2019": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "e., stateful inspection filtering, IPsec VPN gateway, IPS/IDS threat prevention) are not evaluated (out of scope). Only the secure communication channels from Panorama to firewalls and Wildfires are claimed": 1,
          "out of scope": 2,
          "protocol and can be used to build a management interface. This feature is not tested and is out of scope.  Stateful inspection filtering, VPN gateway, IPS/IDS threat prevention, URL filtering (PAN- DB": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "SSH": {
          "SSH": 7,
          "SSHv2": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 9
          }
        },
        "VPN": {
          "VPN": 3
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Leidos": {
          "Leidos": 6
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RBG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20191119084910-05\u002700\u0027",
      "/ModDate": "D:20191119084910-05\u002700\u0027",
      "pdf_file_size_bytes": 584095,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 20
    },
    "st_filename": "st_vid10980-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 6
          },
          "ECDH": {
            "ECDH": 2,
            "ECDHE": 1
          },
          "ECDSA": {
            "ECDSA": 21
          }
        },
        "FF": {
          "DH": {
            "DH": 7,
            "DHE": 1,
            "Diffie-Hellman": 8
          },
          "DSA": {
            "DSA": 4
          }
        },
        "RSA": {
          "RSA 2048": 2,
          "RSA-2048": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.PHYSICAL_PROTECTION": 1
        },
        "OE": {
          "OE.ADMIN_CREDENTIALS_SECURE": 1,
          "OE.NO_GENERAL_PURPOSE": 1,
          "OE.NO_THRU_TRAFFIC_PROTECTION": 1,
          "OE.PHYSICAL": 1,
          "OE.RESIDUAL_INFORMATION": 1,
          "OE.TRUSTED_ADMIN": 1,
          "OE.UPDATES": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 2,
          "FAU_GEN.1": 4,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 3,
          "FAU_GEN.2.1": 1,
          "FAU_STG_EXT": 1,
          "FAU_STG_EXT.1": 3,
          "FAU_STG_EXT.1.1": 1,
          "FAU_STG_EXT.1.2": 1,
          "FAU_STG_EXT.1.3": 1
        },
        "FCS": {
          "FCS_CKM": 3,
          "FCS_CKM.1": 5,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 6,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 3,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 19,
          "FCS_COP.1": 4,
          "FCS_RBG_EXT": 1,
          "FCS_RBG_EXT.1": 5,
          "FCS_RBG_EXT.1.1": 1,
          "FCS_RBG_EXT.1.2": 1,
          "FCS_SSHC_EXT.1.5": 1,
          "FCS_SSHS_EXT": 1,
          "FCS_SSHS_EXT.1": 3,
          "FCS_SSHS_EXT.1.1": 1,
          "FCS_SSHS_EXT.1.2": 1,
          "FCS_SSHS_EXT.1.3": 1,
          "FCS_SSHS_EXT.1.4": 1,
          "FCS_SSHS_EXT.1.5": 2,
          "FCS_SSHS_EXT.1.6": 1,
          "FCS_SSHS_EXT.1.7": 1,
          "FCS_SSHS_EXT.1.8": 1,
          "FCS_TLSC_EXT": 2,
          "FCS_TLSC_EXT.1": 3,
          "FCS_TLSC_EXT.1.1": 2,
          "FCS_TLSC_EXT.1.2": 1,
          "FCS_TLSC_EXT.1.3": 1,
          "FCS_TLSC_EXT.1.4": 1,
          "FCS_TLSC_EXT.2": 2,
          "FCS_TLSC_EXT.2.1": 1,
          "FCS_TLSC_EXT.2.2": 1,
          "FCS_TLSC_EXT.2.3": 1,
          "FCS_TLSC_EXT.2.4": 1,
          "FCS_TLSC_EXT.2.5": 1,
          "FCS_TLSS_EXT": 2,
          "FCS_TLSS_EXT.1": 3,
          "FCS_TLSS_EXT.1.1": 1,
          "FCS_TLSS_EXT.1.2": 1,
          "FCS_TLSS_EXT.1.3": 1,
          "FCS_TLSS_EXT.2": 2,
          "FCS_TLSS_EXT.2.1": 1,
          "FCS_TLSS_EXT.2.2": 1,
          "FCS_TLSS_EXT.2.3": 1,
          "FCS_TLSS_EXT.2.4": 1,
          "FCS_TLSS_EXT.2.5": 1,
          "FCS_TLSS_EXT.2.6": 1
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_PMG_EXT": 1,
          "FIA_PMG_EXT.1": 3,
          "FIA_PMG_EXT.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.7": 3,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_EXT": 1,
          "FIA_UAU_EXT.2": 2,
          "FIA_UAU_EXT.2.1": 1,
          "FIA_UIA_EXT": 1,
          "FIA_UIA_EXT.1": 5,
          "FIA_UIA_EXT.1.1": 1,
          "FIA_UIA_EXT.1.2": 1
        },
        "FMT": {
          "FMT_MOF": 4,
          "FMT_MOF.1": 1,
          "FMT_MTD": 4,
          "FMT_MTD.1": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 3,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.2": 3,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_APW_EXT": 1,
          "FPT_APW_EXT.1": 3,
          "FPT_APW_EXT.1.1": 1,
          "FPT_APW_EXT.1.2": 1,
          "FPT_SKP_EXT": 1,
          "FPT_SKP_EXT.1": 3,
          "FPT_SKP_EXT.1.1": 1,
          "FPT_STM_EXT": 1,
          "FPT_STM_EXT.1": 4,
          "FPT_STM_EXT.1.1": 1,
          "FPT_STM_EXT.1.2": 1,
          "FPT_TST_EXT": 1,
          "FPT_TST_EXT.1": 2,
          "FPT_TST_EXT.1.1": 1,
          "FPT_TUD_EXT": 1,
          "FPT_TUD_EXT.1": 3,
          "FPT_TUD_EXT.1.1": 1,
          "FPT_TUD_EXT.1.2": 1,
          "FPT_TUD_EXT.1.3": 1
        },
        "FTA": {
          "FTA_SSL": 2,
          "FTA_SSL.3": 3,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 2,
          "FTA_SSL.4.1": 1,
          "FTA_SSL_EXT": 1,
          "FTA_SSL_EXT.1": 3,
          "FTA_SSL_EXT.1.1": 1,
          "FTA_TAB": 1,
          "FTA_TAB.1": 4,
          "FTA_TAB.1.1": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 4,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP": 4,
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {
        "OutOfScope": {
          "e., stateful inspection filtering, IPsec VPN gateway, IPS/IDS threat prevention) are not evaluated (out of scope). Only the secure communication channels from Panorama to firewalls and Wildfires are claimed. The": 1,
          "extent specified by the security functional requirements: TLS, HTTPS, SSH. The features below are out of scope. Table 2 Excluded Features Feature Description Telnet and HTTP Management Protocols Telnet and HTTP": 1,
          "out of scope": 3,
          "protocol and can be used to build a management interface. This feature is not tested and is out of scope. Stateful inspection filtering, VPN gateway, IPS/IDS threat prevention, URL filtering (PAN- DB": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 8
        },
        "CCM": {
          "CCM": 4
        },
        "CTR": {
          "CTR": 7
        },
        "GCM": {
          "GCM": 12
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "IPsec": {
          "IPsec": 3
        },
        "SSH": {
          "SSH": 44,
          "SSHv2": 7
        },
        "TLS": {
          "SSL": {
            "SSL": 5,
            "SSL 2.0": 4,
            "SSL 3.0": 4
          },
          "TLS": {
            "TLS": 78,
            "TLS 1.0": 4,
            "TLS 1.1": 4,
            "TLS 1.2": 6,
            "TLS1.1": 1,
            "TLS1.2": 1,
            "TLSv1.1": 3,
            "TLSv1.2": 6
          }
        },
        "VPN": {
          "VPN": 4
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 18,
          "P-384": 12,
          "P-521": 10,
          "secp256r1": 7,
          "secp384r1": 7,
          "secp521r1": 3
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-256": 6,
            "SHA-384": 4,
            "SHA-512": 4,
            "SHA256": 17
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 14
        },
        "RNG": {
          "RBG": 4,
          "RNG": 6
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 2,
          "FIPS 186-4": 3,
          "FIPS PUB 186-4": 18
        },
        "ISO": {
          "ISO/IEC 14888-": 1,
          "ISO/IEC 14888-3": 1,
          "ISO/IEC 18031:2011": 4,
          "ISO/IEC 9796-2": 2
        },
        "NIST": {
          "NIST SP 800-56A": 2,
          "SP 800-90A": 2
        },
        "PKCS": {
          "PKCS #1": 2,
          "PKCS#12": 2
        },
        "RFC": {
          "RFC 2818": 3,
          "RFC 2986": 2,
          "RFC 3268": 28,
          "RFC 3526": 3,
          "RFC 4253": 2,
          "RFC 4346": 4,
          "RFC 4492": 24,
          "RFC 5246": 30,
          "RFC 5280": 5,
          "RFC 5289": 44,
          "RFC 5759": 1,
          "RFC 6125": 3,
          "RFC 6960": 1,
          "RFC 8017": 2
        },
        "X509": {
          "X.509": 8
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 33,
            "AES-256": 5
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 9,
            "HMAC-SHA-256": 7,
            "HMAC-SHA-384": 4,
            "HMAC-SHA-512": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 7,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 7,
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 7,
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 5,
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 7,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 7,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 5,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 7,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 5,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 5,
          "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 5,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 5,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 5,
          "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 5,
          "TLS_RSA_WITH_AES_128_CBC_SHA": 7,
          "TLS_RSA_WITH_AES_128_CBC_SHA256": 7,
          "TLS_RSA_WITH_AES_256_CBC_SHA": 7
        }
      },
      "vendor": {
        "Broadcom": {
          "Broadcom": 2
        },
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20191119084329-05\u002700\u0027",
      "/ModDate": "D:20191119084329-05\u002700\u0027",
      "pdf_file_size_bytes": 1492668,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=419",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=417",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=421",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=408",
          "https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/technical-documentation/81/panorama/panorama-admin/panorama-admin.pdf",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=420",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=411",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=435",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=407",
          "https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/technical-documentation/81/vm-series/vm-series-deployment/vm-series-deployment.pdf",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=410",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=406",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=434",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=409",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=418",
          "file:///C:/Users/beaverg/Desktop/CCTL%20Projects/Palo%20Alto%20Panorama/Received%20from%20Vendor/updates.paloaltonetworks.com",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=422",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=405",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=433",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD_ID=412"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 56
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10980-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10980-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c014c9a30c717f4f42cc8c0084efbb44a3de7177991d2089152e71bebcd9730e",
      "txt_hash": "389180ee45b49fc89f3504562e9a779c2d2f30aa5ee6c6ace5352c3977c133e5"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "de2ba1f8d4a8307507a85e600cff5731be671fcaf5aa842f84aef29a1cf24a7e",
      "txt_hash": "a0190b2ab7efca9ce3eca743da1e055c613d4da1a0a2a2bdcfa627f29fc0abf6"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "aaa06b2261c10c597bbf120a1181c16d9ed63ccf12e9dda1130b016d3e31ebb6",
      "txt_hash": "8502ba556c045bfb91ae2139ff772a958e9e4cd7dc536d5e387bf3b616fe078a"
    }
  },
  "status": "archived"
}