This page was not yet optimized for use on mobile
devices.
PP-Module for Intrusion Prevention Systems (IPS), Version 1.0
Web information
| Status | active |
|---|---|
| Valid from | 11.05.2021 |
| Scheme | 🇺🇸 US |
| Category | Boundary Protection Devices and Systems |
| Security level | EAL1 |
Certification report
Extracted keywords
Protocols
VPNSecurity Assurance Requirements (SAR)
ACE_INT, ACE_CCL, ACE_SPD, ACE_OBJ, ACE_ECD, ACE_REQ, ACE_MCO, ACE_CCO.1, APE_INT.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2, APE_INT, APE_SPD, APE_OBJ, APE_ECD, APE_REQEvaluation facilities
Lightship SecurityStandards
ISO/IEC 17025File metadata
| Creation date | D:20211222153509-05'00' |
|---|---|
| Modification date | D:20211222153558-05'00' |
| Pages | 10 |
| Producer | Foxit PDF Editor Printer Version 11.0.1.4344 |
Protection Profile
Extracted keywords
Schemes
MACProtocols
VPNClaims
O.IPS_ANALYZE, O.IPS_REACT, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, T.NETWORK_ACCESS, T.NETWORK_DISCLOSURE, T.NETWORK_DOS, T.NETWORK_MISUSE, T.UNAUTHORIZED_ADMINISTRATOR_ACCESS, A.NO_THRU_TRAFFIC_PROTECTION, A.CONNECTIONS, OE.NO_THRU_TRAFFIC_PROTECTION, OE.CONNECTIONSSecurity Functional Requirements (SFR)
FAU_GEN, FAU_STG, FAU_STG.4, FAU_ARP.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_STG_EXT.1, FAU_GEN.1, FAU_STG.1, FAU_STG.4.1, FAU_ARP.1.1, FAU_ARP, FAU_SAA, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SAA.1, FCO_CPC_EXT.1, FMT_SMF, FMT_SMF.1, FMT_SMR.2, FMT_SMR.1, FPT_FLS.1, FPT_ITT.1, FPT_FLS.1.1, FPT_STM.1, FPT_STM_EXT.1, FRU_RSA.1, FRU_RSA, FRU_RSA.1.1, FTP_ITC, FTP_TRP, FTP_ITC.1.3, FTP_ITC.1Standards
RFC 791, RFC 2460, RFC 792, RFC 2463, RFC 793, RFC 768, CCMB-2070-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Author | Patin, Pascal B. [US-US] |
|---|---|
| Creation date | D:20210517142009-04'00' |
| Modification date | D:20210517142009-04'00' |
| Pages | 46 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- Berryville Holdings, LLC Warden v1.2 active
- Cisco FTD (NGFW) 7.0 on ASA 5500 and ISA 3000 and FTDv with FMC/FMCv archived
- Cisco FTD (NGFW) 7.0 on Firepower 1000 and 2100 Series with FMC/FMCv archived
- Cisco FTD (NGFW) 7.0 on Firepower 4100 and 9300 Series with FMC/FMCv archived
- Cisco FTD 7.4 on Cisco Secure Firewall 3100 Series with FMC/FMCv active
- Cisco FTD 7.4 on Cisco Secure Firewall 4200 Series with FMC/FMCv active
- Cisco FTD 7.4 on Firepower 1000 Series with FMC/FMCv active
- Cisco FTD 7.4 on Firepower 2100 Series with FMC/FMCv active
- Cisco FTD 7.4 on Firepower 4100 and 9300 Series with FMC/FMCv active
- Cisco NGIPSv 7.0 with FMC/FMCv 7.0 archived
- Cisco Secure Firewall Threat Defense Virtual 7.4 with FMC/FMCv active
- FortiGate/FortiOS Version 6.2.7 active
- Juniper Junos OS 23.4R1 for SRX1600 active
- Juniper vSRX3.0 with Junos OS 22.2R2 active
- Junos OS 20.3R3 for NFX350 archived
- Junos OS 22.2R1 for SRX Series active
- Junos OS 22.2R1 for SRX380 active
- SonicWall SonicOS/X v7.0.1 with VPN and IPS on NSsp 15700 active
- Sonicwall SonicOS/X v7.0.1 with VPN and IPS on TZ, NSa, NSsp, and NSv Appliances active
- Trellix Intrusion Prevention System Sensor and Manager Appliances version 11.1 active
- Versa Networks Versa Secure SD-WAN Versa Operating System (VOS) 22.1 running on CSG1500, CSG2500, CSG3500, CSG5000, Dell PowerEdge R7515, and Dell VEP4600, Versa Director 22.1, and Versa Analytics 22.1 active
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "6448a1802bb874d8",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "6448a1802bb874d8",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "MOD_IPS_v1.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIONS": 3,
"A.NO_THRU_TRAFFIC_PROTECTION": 1
},
"O": {
"O.IPS_ANALYZE": 3,
"O.IPS_REACT": 3,
"O.SYSTEM_MONITORING": 3,
"O.TOE_ADMINISTRATION": 3
},
"OE": {
"OE.CONNECTIONS": 3,
"OE.NO_THRU_TRAFFIC_PROTECTION": 1
},
"T": {
"T.NETWORK_ACCESS": 2,
"T.NETWORK_DISCLOSURE": 5,
"T.NETWORK_DOS": 5,
"T.NETWORK_MISUSE": 5,
"T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_ARP": 2,
"FAU_ARP.1": 12,
"FAU_ARP.1.1": 1,
"FAU_GEN": 15,
"FAU_GEN.1": 6,
"FAU_SAA": 2,
"FAU_SAA.1": 2,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 5,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 1,
"FAU_STG": 5,
"FAU_STG.1": 2,
"FAU_STG.4": 6,
"FAU_STG.4.1": 1,
"FAU_STG_EXT.1": 3
},
"FCO": {
"FCO_CPC_EXT.1": 1
},
"FMT": {
"FMT_SMF": 6,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1,
"FMT_SMR.2": 2
},
"FPT": {
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 1,
"FPT_STM.1": 2,
"FPT_STM_EXT.1": 1
},
"FRU": {
"FRU_RSA": 1,
"FRU_RSA.1": 8,
"FRU_RSA.1.1": 1
},
"FTP": {
"FTP_ITC": 1,
"FTP_ITC.1": 3,
"FTP_ITC.1.3": 1,
"FTP_TRP": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2070-04-001": 1
},
"RFC": {
"RFC 2460": 1,
"RFC 2463": 1,
"RFC 768": 1,
"RFC 791": 1,
"RFC 792": 1,
"RFC 793": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "Patin, Pascal B. [US-US]",
"/CreationDate": "D:20210517142009-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20210517142009-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 714602,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
},
"report_filename": "CCCS-010 PPCR v1.0.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ACE": {
"ACE_CCL": 1,
"ACE_CCO.1": 1,
"ACE_ECD": 1,
"ACE_INT": 1,
"ACE_MCO": 1,
"ACE_OBJ": 1,
"ACE_REQ": 1,
"ACE_SPD": 1
},
"APE": {
"APE_ECD": 1,
"APE_ECD.1": 1,
"APE_INT": 1,
"APE_INT.1": 1,
"APE_OBJ": 1,
"APE_OBJ.2": 1,
"APE_REQ": 1,
"APE_REQ.2": 1,
"APE_SPD": 1,
"APE_SPD.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"VPN": {
"VPN": 24
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Lightship": {
"Lightship Security": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "D:20211222153509-05\u002700\u0027",
"/Creator": "",
"/Keywords": "",
"/ModDate": "D:20211222153558-05\u002700\u0027",
"/Producer": "Foxit PDF Editor Printer Version 11.0.1.4344",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 374831,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 10
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e8014c84cb419bbac326fc0775e251cf5e93ab0361f3fd862fcf7bdadb68b86e",
"txt_hash": "f8d50ff23bdd05628e758556507a0cf36e00777bb55ee9bd5b9909d301c82a3c"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "916718b27962379e4862f67b858a3505a5c070a1a6daa5449985f0d578fd8110",
"txt_hash": "910fc781ec46638439ea1a996655c2d31ded52b4abf96145e14105fb7f40128c"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Boundary Protection Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "PP-Module for Intrusion Prevention Systems (IPS), Version 1.0",
"not_valid_after": null,
"not_valid_before": "2021-05-11",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_IPS_v1.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CCCS-010 PPCR v1.0.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "active",
"version": "1.0"
}
}