This page was not yet optimized for use on mobile devices.
Protection Profile
Web information ?
Status: archivedCertification date: 2018-03-14
Archived date: 2022-01-11
Scheme: ❌
Category: Network and Network-Related Devices and Systems
Security level: None
Certification report ?
Profile ?
References ?
- Aruba, a Hewlett Packard Enterprise Company 2930F, 2930M, 3810M, and 5400R Switch Series running ArubaOS version 16.04 archived
- Aruba, a Hewlett Packard Enterprise Company 8320 and 8400 Switch Series archived
- Binary Armor SCADA Network Guard archived
- Ciena Carrier Ethernet Solutions (CES) 3900 series and 5100 series archived
- Ciena Waveserver Ai Rel 1.3 archived
- Cisco Aggregation Services Router 1004 (ASR1K) running IOS-XE 16.9 archived
- Cisco Catalyst 2960 and 3560 Wired Access Switches running IOS 15.2 archived
- Cisco Catalyst 3650 and 3850 Series Switches running IOS-XE 16.9 archived
- Cisco Catalyst 4500 Series Wired Access Switches running IOS-XE 3.10 archived
- Cisco Catalyst 9200L and 9400 Series Switches running IOS-XE 16.9 archived
- Cisco Catalyst 9400 Series Switches running IOS-XE 16.6 archived
- Cisco Expressway X12.5 archived
- Cisco Expressway X12.5 archived
- Cisco IoT Industrial Ethernet and Connected Grid Switches running IOS 15.2 archived
- Citrix ADC (formerly NetScaler) Platinum Edition Version 11.1 archived
- Exabeam Security Management Platform archived
- Extreme Networks, Inc. VDX Product Series operating with NOS version 7.3.0aa archived
- Fidelis Network v9.0.3 archived
- FireEye HX Appliances, Version 4.0 archived
- Forescout v8.1 archived
- Fortinet FortiMail 6.0 archived
- Fortinet FortiProxy v1.0 archived
- Huawei NE40E Series Software Consisting of VRP and the Underlying OS V800R010C00SPC200, V800R010SPH220T archived
- Juniper Junos OS 18.1R2 for QFX10002, QFX10008 and QFX10016 archived
- Junos OS 18.1R1 for QFX5100 and EX4600 Ethernet Switches archived
- Junos OS 18.1R3 for MX series and EX9200 series archived
- Junos OS 18.1R3-S2.1 for EX4300 Series Ethernet switches archived
- NETSCOUT Arbor Edge Defense and APS Systems (AED/APS) archived
- NIKSUN NetDetector/NetVCR 10440 archived
- NetApp E-Series & EF-Series with SANtricity OS 11.50 archived
- Ruckus Solution archived
- Siemens RUGGEDCOM ROS v4.2.2.F running on the M969F, RS900F, RS900GF, RS900GPF, RS940GF, M2100F, RSG2100F, RSG2100PF, M2200F, RSG2200F, RSG2300F, RSG2300PF, RS400F, RS416F, RS416PF, RSG2488F switches archived
- Trend Micro TippingPoint Threat Protection System version 5.1.0 archived
- Virtual Instruments VirtualWisdom Platform Appliance v5.7 archived
- Voyager TDC 10G Switch - V2.0 archived
Updates ?
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection Profile was processed.
Raw data
{
"_id": "48ac4778e4272298",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "48ac4778e4272298",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "CPP_ND_V2.0E.pdf",
"pp_keywords": null,
"pp_metadata": null,
"report_filename": "cpp_nd_v2.0-vr.pdf",
"report_keywords": null,
"report_metadata": null
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": false,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7",
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": false,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7",
"txt_hash": null
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Network and Network-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile",
"not_valid_after": "2022-01-11",
"not_valid_before": "2018-03-14",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/cpp_nd_v2.0-vr.pdf",
"scheme": null,
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "archived",
"version": "2.0E"
}
}