This page was not yet optimized for use on mobile
devices.
PP-Module for Virtual Private Network (VPN) Gateways, Version 1.1
Web information
| Status | archived |
|---|---|
| Valid from | 01.07.2020 |
| Valid until | 30.09.2022 |
| Scheme | 🇺🇸 US |
| Category | Network and Network-Related Devices and Systems |
| Security level | EAL1 |
Certification report
Extracted keywords
Symmetric Algorithms
AESProtocols
IKE, IPsec, VPNVendor
CiscoClaims
O.ADDRESS_FILTERING, O.AUTHENTICATION, O.CRYPTOGRAPHIC_FUNCTIONS, O.FAIL_SECURE, O.PORT_FILTERING, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, T.PASSWORD_CRACKING, T.SECURITY_FUNCTIONALITY_COM, T.SECURITY_FUNCTIONALITY_FAIL, T.UNAUTHORIZED_ADMINISTRATO, T.UNDETECTED_ACTIVITY, T.UNTRUSTED_COMMUNICATION_, T.UPDATE_COMPROMISE, T.WEAK_AUTHENTICATION_ENDPO, T.WEAK_CRYPTOGRAPHY, T.DATA_INTEGRITY, T.NETWORK_ACCESS, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.REPLAY_ATTACK, A.ADMIN_CREDENTIALS_SECURE, A.COMPONENTS_RUNNING, A.LIMITED_FUNCTIONALITY, A.NO_THRU_TRAFFIC_PROTECTION, A.PHYSICAL_PROTECTION, A.REGULAR_UPDATES, A.RESIDUAL_INFORMATION, A.TRUSTED_ADMINISTRATOR, A.VS_TRUSTED_ADMINISTRATOR, A.VS_REGULAR_UPDATES, A.VS_ISOLATION, A.VS_CORRECT_CONFIGURATION, A.CONNECTIONS, OE.ADMIN_CREDENTIALS_SECURE, OE.COMPONENTS_RUNNING, OE.NO_GENERAL_PURPOSE, OE.NO_THRU_TRAFFIC_PROTECTIO, OE.PHYSICAL, OE.RESIDUAL_INFORMATION, OE.TRUSTED_ADMIN, OE.UPDATES, OE.VM_CONFIGURATION, OE.CONNECTIONS, OE.NO_THRU_TRAFFIC_PROTECTIONSecurity Assurance Requirements (SAR)
ACE_REQ, ACE_INT.1, ACE_CCL.1, ACE_SPD.1, ACE_OBJ.2, ACE_ECD.1, ACE_REQ.2, ACE_MCO.1, ACE_CCO.1Security Functional Requirements (SFR)
FAU_GEN, FCS_COP, FCS_CKM, FIA_PSK_EXT, FMT_MTD, FMT_SMF, FPT_TST_EXT, FPT_TUD_EXT, FPT_FLS, FTA_SSL, FTA_TSE, FTA_VCM_EXT, FTP_ITCEvaluation facilities
Gossamer SecurityStandards
X.509File metadata
| Creation date | D:20210721131015-04'00' |
|---|---|
| Modification date | D:20210721131015-04'00' |
| Pages | 21 |
Protection Profile
Extracted keywords
Symmetric Algorithms
AES, AES-, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
ECDSA, DHHash functions
SHA-256, SHA-512Schemes
Key ExchangeProtocols
SSH, TLS, DTLS, IKE, IPsec, VPNElliptic Curves
P-256, P-384Block cipher modes
CBC, CTR, GCMClaims
O.ADDRESS_FILTERING, O.AUTHENTICATION, O.CRYPTOGRAPHIC_FUNCTIONS, O.FAIL_SECURE, O.PORT_FILTERING, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.CRYPTOGRAPHIC_FUNCTIO, O.ADDRESS_FILTERIN, O.CRYPTOGRAPHIC_F, O.SYSTEM_MONITOR, O.TOE_ADMINISTRAT, T.DATA_INTEGRITY, T.NETWORK_ACCESS, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.REPLAY_ATTACK, T.SECURITY_FUNCTIONALITY_, T.UNDETECTED_ACTIVITY, T.UNAUTHORIZED_ADMINISTR, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_COMMUNICATION_CHANNELS, T.NETWORK_DISCOSURE, T.WEAK_AUTHENTICATION_ENDPOINTS, A.CONNECTIONS, A.NO_THRU_TRAFFIC_PROTECTION, OE.CONNECTIONS, OE.NO_THRU_TRAFFIC_PROTECTIONSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN, FCS_COP, FCS_CKM, FCS_COP.1, FCS_CKM.1, FCS_RBG_EXT.1, FIA_PSK_EXT.1, FIA_AFL.1, FIA_UIA_EXT.1, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1.2, FIA_PSK_EXT.1.3, FIA_PSK_EXT.1.4, FIA_PSK_EXT, FMT_MTD, FMT_SMF.1, FMT_SMF, FMT_MTD.1, FMT_SMF.1.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_FLS, FPT_TST_EXT.3, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.3, FPT_TUD_EXT.2, FPT_FLS.1, FPT_TST_EXT.3.1, FPT_TST_EXT.3.2, FPT_TST_EXT, FTA_VCM_EXT.1, FTA_SSL, FTA_TSE.1, FTA_SSL.3, FTA_TSE.1.1, FTA_VCM_EXT.1.1, FTA_VCM_EXT, FTP_ITC, FTP_ITC.1, FTP_TRP.1Standards
FIPS PUB 186-4, RFC4301, RFC 4303, RFC 3602, RFC 4106, RFC 5114, RFC 3526, RFC 5280, RFC 7919, RFC 791, RFC 2460, RFC 793, RFC 768, RFC792, X.509, CCMB-2070-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Creation date | D:20200701101729-04'00' |
|---|---|
| Modification date | D:20200701101729-04'00' |
| Pages | 42 |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "27e82aaf21b02155",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "27e82aaf21b02155",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "mod_vpngw_v1.1.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"DH": 3
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIONS": 1,
"A.NO_THRU_TRAFFIC_PROTECTION": 1
},
"O": {
"O.ADDRESS_FILTERIN": 1,
"O.ADDRESS_FILTERING": 2,
"O.AUTHENTICATION": 3,
"O.CRYPTOGRAPHIC_F": 1,
"O.CRYPTOGRAPHIC_FUNCTIO": 1,
"O.CRYPTOGRAPHIC_FUNCTIONS": 1,
"O.FAIL_SECURE": 3,
"O.PORT_FILTERING": 3,
"O.SYSTEM_MONITOR": 1,
"O.SYSTEM_MONITORING": 2,
"O.TOE_ADMINISTRAT": 1,
"O.TOE_ADMINISTRATION": 2
},
"OE": {
"OE.CONNECTIONS": 2,
"OE.NO_THRU_TRAFFIC_PROTECTION": 1
},
"T": {
"T.DATA_INTEGRITY": 6,
"T.NETWORK_ACCESS": 6,
"T.NETWORK_DISCLOSURE": 4,
"T.NETWORK_DISCOSURE": 1,
"T.NETWORK_MISUSE": 6,
"T.REPLAY_ATTACK": 4,
"T.SECURITY_FUNCTIONALITY_": 1,
"T.UNAUTHORIZED_ADMINISTR": 1,
"T.UNDETECTED_ACTIVITY": 1,
"T.UNTRUSTED_COMMUNICATION_CHANNELS": 4,
"T.WEAK_AUTHENTICATION_ENDPOINTS": 1,
"T.WEAK_CRYPTOGRAPHY": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 4,
"FAU_GEN.1.1": 1
},
"FCS": {
"FCS_CKM": 4,
"FCS_CKM.1": 2,
"FCS_COP": 5,
"FCS_COP.1": 2,
"FCS_RBG_EXT.1": 3
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_PSK_EXT": 3,
"FIA_PSK_EXT.1": 9,
"FIA_PSK_EXT.1.1": 2,
"FIA_PSK_EXT.1.2": 2,
"FIA_PSK_EXT.1.3": 2,
"FIA_PSK_EXT.1.4": 2,
"FIA_UIA_EXT.1": 1
},
"FMT": {
"FMT_MTD": 4,
"FMT_MTD.1": 1,
"FMT_SMF": 5,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1
},
"FPT": {
"FPT_FLS": 4,
"FPT_FLS.1": 1,
"FPT_TST_EXT": 2,
"FPT_TST_EXT.1": 5,
"FPT_TST_EXT.1.1": 1,
"FPT_TST_EXT.3": 9,
"FPT_TST_EXT.3.1": 2,
"FPT_TST_EXT.3.2": 2,
"FPT_TUD_EXT.1": 4,
"FPT_TUD_EXT.1.3": 1,
"FPT_TUD_EXT.2": 1
},
"FTA": {
"FTA_SSL": 4,
"FTA_SSL.3": 1,
"FTA_TSE.1": 4,
"FTA_TSE.1.1": 1,
"FTA_VCM_EXT": 3,
"FTA_VCM_EXT.1": 8,
"FTA_VCM_EXT.1.1": 2
},
"FTP": {
"FTP_ITC": 4,
"FTP_ITC.1": 5,
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CTR": {
"CTR": 2
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 8
},
"IPsec": {
"IPsec": 26
},
"SSH": {
"SSH": 2
},
"TLS": {
"DTLS": {
"DTLS": 1
},
"TLS": {
"TLS": 1
}
},
"VPN": {
"VPN": 89
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 2,
"P-384": 2
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 2,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2070-04-001": 1
},
"FIPS": {
"FIPS PUB 186-4": 2
},
"RFC": {
"RFC 2460": 2,
"RFC 3526": 2,
"RFC 3602": 3,
"RFC 4106": 3,
"RFC 4303": 1,
"RFC 5114": 2,
"RFC 5280": 1,
"RFC 768": 2,
"RFC 791": 2,
"RFC 7919": 1,
"RFC 793": 2,
"RFC4301": 1,
"RFC792": 1
},
"X509": {
"X.509": 15
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4,
"AES-": 1
}
},
"constructions": {
"MAC": {
"HMAC": 5,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20200701101729-04\u002700\u0027",
"/ModDate": "D:20200701101729-04\u002700\u0027",
"pdf_file_size_bytes": 1341523,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 42
},
"report_filename": "CFG_NDcPP-VPNGW_V1.1_VR.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_SECURE": 1,
"A.COMPONENTS_RUNNING": 1,
"A.CONNECTIONS": 1,
"A.LIMITED_FUNCTIONALITY": 1,
"A.NO_THRU_TRAFFIC_PROTECTION": 2,
"A.PHYSICAL_PROTECTION": 1,
"A.REGULAR_UPDATES": 1,
"A.RESIDUAL_INFORMATION": 1,
"A.TRUSTED_ADMINISTRATOR": 1,
"A.VS_CORRECT_CONFIGURATION": 1,
"A.VS_ISOLATION": 1,
"A.VS_REGULAR_UPDATES": 1,
"A.VS_TRUSTED_ADMINISTRATOR": 1
},
"O": {
"O.ADDRESS_FILTERING": 1,
"O.AUTHENTICATION": 1,
"O.CRYPTOGRAPHIC_FUNCTIONS": 1,
"O.FAIL_SECURE": 1,
"O.PORT_FILTERING": 1,
"O.SYSTEM_MONITORING": 1,
"O.TOE_ADMINISTRATION": 1
},
"OE": {
"OE.ADMIN_CREDENTIALS_SECURE": 1,
"OE.COMPONENTS_RUNNING": 1,
"OE.CONNECTIONS": 1,
"OE.NO_GENERAL_PURPOSE": 1,
"OE.NO_THRU_TRAFFIC_PROTECTIO": 1,
"OE.NO_THRU_TRAFFIC_PROTECTION": 1,
"OE.PHYSICAL": 1,
"OE.RESIDUAL_INFORMATION": 1,
"OE.TRUSTED_ADMIN": 1,
"OE.UPDATES": 1,
"OE.VM_CONFIGURATION": 1
},
"T": {
"T.DATA_INTEGRITY": 1,
"T.NETWORK_ACCESS": 1,
"T.NETWORK_DISCLOSURE": 1,
"T.NETWORK_MISUSE": 1,
"T.PASSWORD_CRACKING": 1,
"T.REPLAY_ATTACK": 1,
"T.SECURITY_FUNCTIONALITY_COM": 1,
"T.SECURITY_FUNCTIONALITY_FAIL": 1,
"T.UNAUTHORIZED_ADMINISTRATO": 1,
"T.UNDETECTED_ACTIVITY": 1,
"T.UNTRUSTED_COMMUNICATION_": 1,
"T.UPDATE_COMPROMISE": 1,
"T.WEAK_AUTHENTICATION_ENDPO": 1,
"T.WEAK_CRYPTOGRAPHY": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACE": {
"ACE_CCL.1": 1,
"ACE_CCO.1": 1,
"ACE_ECD.1": 1,
"ACE_INT.1": 1,
"ACE_MCO.1": 1,
"ACE_OBJ.2": 1,
"ACE_REQ": 1,
"ACE_REQ.2": 1,
"ACE_SPD.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_COP": 1
},
"FIA": {
"FIA_PSK_EXT": 1
},
"FMT": {
"FMT_MTD": 1,
"FMT_SMF": 2
},
"FPT": {
"FPT_FLS": 1,
"FPT_TST_EXT": 2,
"FPT_TUD_EXT": 1
},
"FTA": {
"FTA_SSL": 1,
"FTA_TSE": 1,
"FTA_VCM_EXT": 1
},
"FTP": {
"FTP_ITC": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1
},
"IPsec": {
"IPsec": 2
},
"VPN": {
"VPN": 51
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"X509": {
"X.509": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 22
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20210721131015-04\u002700\u0027",
"/ModDate": "D:20210721131015-04\u002700\u0027",
"pdf_file_size_bytes": 504083,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "490ae45b6f7ee416ff6b868f99dafb72db5239911214949be36660ccd7cb304f",
"txt_hash": "8b7dccc4729b83675271555811d59ad1021f68a653d6310bf9a0d5709c2608b6"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "fe9ea3025d33279a7f0f3120dc180a75fc2f20a536796d6c8e52fe51b8a3a85d",
"txt_hash": "506d46858906aa3de89ff9bd9ff86d73b38283104092d9c3d7eec6b99ac3598f"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Network and Network-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "PP-Module for Virtual Private Network (VPN) Gateways, Version 1.1",
"not_valid_after": "2022-09-30",
"not_valid_before": "2020-07-01",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpngw_v1.1.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CFG_NDcPP-VPNGW_V1.1_VR.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "archived",
"version": "1.1"
}
}