This page was not yet optimized for use on mobile devices.
U.S. Government Approved Protection Profile - Network Device Protection Profile (NDPP) Extended Package VPN Gateway
Web information ?
Status: archivedCertification date: 2012-12-12
Archived date: 2012-12-12
Scheme: 🇺🇸
Category: Network and Network-Related Devices and Systems
Security level: None
Certification report ?
Profile ?
Extracted keywords
Symmetric Algorithms
AES, AES-, HMACAsymmetric Algorithms
ECDSA, Diffie-Hellman, DHHash functions
SHA-1, SHA-512Protocols
SSH, TLS, IKE, IKEv1, IKEv2, IPsec, VPNRandomness
RBGElliptic Curves
P-384, P-521, P-256Block cipher modes
CBC, GCMClaims
O.CRYPTOGRAPHIC_FUNCTIONS, O.AUTHENTICATION, O.ADDRESS_FILTERING, O.FAIL_SECURE, O.PORT_FILTERING, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.RELATED_CONNECTION_FILTERING, O.CLIENT_ESTABLISHMENT_CONSTRAINTS, O.REMOTE_SESSION_TERMINATION, O.ASSIGNED_PRIVATE_ADDRESS, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.DATA_INTEGRITY, T.REPLAY_ATTACK, T.TSF_FAILURE, T.UNAUTHORIZED_CONNECTION, T.HIJACKED_SESSION, A.CONNECTIONS, OE.CONNECTIONSSecurity Assurance Requirements (SAR)
AVA_VAN.1Security Functional Requirements (SFR)
FAU_GEN.1, FCS_CKM.1, FCS_COP.1, FCS_RBG_EXT.1, FCS_CKM.1.1, FCS_COP.1.1, FCS_RBG_EXT.1.1, FCS_CKM.1.2, FIA_AFL.1, FIA_PSK_EXT, FIA_PSK_EXT.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1.2, FIA_PSK_EXT.1.3, FIA_PSK_EXT.1.4, FMT_MOF.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1.1, FPT_FLS.1, FPT_TST_EXT.1.2, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_TUD_EXT.1.3, FPT_FLS.1.1, FPT_TST_EXT.1.1, FTA_SSL.3, FTA_TSE.1, FTA_VCM_EXT.1, FTA_SSL.3.1, FTA_TSE.1.1, FTA_VCM_EXT.1.1, FTP_ITC.1, FTP_ITC.1.1Standards
FIPS PUB 197, FIPS PUB 186-3, FIPS 186-3, NIST SP 800-38D, NIST SP 800-38A, NIST SP 800-38B, NIST SP 800-38C, NIST SP 800-38E, NIST SP 800-57, RFC 4301, RFC 4303, RFC 4106, RFC 3602, RFC 4109, RFC 4304, RFC 4868, RFC 6379, RFC 5282, RFC 4945, RFC 791, RFC 2460, RFC 793, RFC 768, RFC792, RFC 5280, RFC 2986, RFC 2560, RFC 5759, RFC 5996, X.509File metadata
Title | NDPP Extended Package VPN Gateway |
---|---|
Author | James Donndelinger |
Creation date | D:20121212115359 |
Modification date | D:20121212115359 |
Pages | 49 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
References ?
No references are available for this protection profile.
Updates ?
-
24.02.2025 The protection profile data changed.
Protection Profile changed
The state of the protection profile object was updated.
- The report property was updated, with the
{'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7'}
data.
- The report property was updated, with the
-
18.02.2025 The protection profile data changed.
Protection Profile changed
The state of the protection profile object was updated.
- The report property was updated, with the
{'pdf_hash': '8a1775a821fb13dc9f297488e0b28c60ef06551befd6e1f84c3e977ecfac3add'}
data.
- The report property was updated, with the
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name U.S. Government Approved Protection Profile - Network Device Protection Profile (NDPP) Extended Package VPN Gateway was processed.
Raw data
{
"_id": "65c2757c97fa03d4",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "65c2757c97fa03d4",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_nd_vpn_gw_ep_v1.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 7
}
},
"FF": {
"DH": {
"DH": 9,
"Diffie-Hellman": 3
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIONS": 2
},
"O": {
"O.ADDRESS_FILTERING": 5,
"O.ASSIGNED_PRIVATE_ADDRESS": 1,
"O.AUTHENTICATION": 2,
"O.CLIENT_ESTABLISHMENT_CONSTRAINTS": 1,
"O.CRYPTOGRAPHIC_FUNCTIONS": 4,
"O.FAIL_SECURE": 3,
"O.PORT_FILTERING": 5,
"O.RELATED_CONNECTION_FILTERING": 1,
"O.REMOTE_SESSION_TERMINATION": 1,
"O.SYSTEM_MONITORING": 3,
"O.TOE_ADMINISTRATION": 2
},
"OE": {
"OE.CONNECTIONS": 2
},
"T": {
"T.DATA_INTEGRITY": 3,
"T.HIJACKED_SESSION": 1,
"T.NETWORK_DISCLOSURE": 3,
"T.NETWORK_MISUSE": 3,
"T.REPLAY_ATTACK": 3,
"T.TSF_FAILURE": 2,
"T.UNAUTHORIZED_CONNECTION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"AVA": {
"AVA_VAN.1": 2
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 6
},
"FCS": {
"FCS_CKM.1": 6,
"FCS_CKM.1.1": 2,
"FCS_CKM.1.2": 2,
"FCS_COP.1": 8,
"FCS_COP.1.1": 3,
"FCS_RBG_EXT.1": 5,
"FCS_RBG_EXT.1.1": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_PSK_EXT": 2,
"FIA_PSK_EXT.1": 2,
"FIA_PSK_EXT.1.1": 1,
"FIA_PSK_EXT.1.2": 2,
"FIA_PSK_EXT.1.3": 2,
"FIA_PSK_EXT.1.4": 1
},
"FMT": {
"FMT_MOF.1": 2,
"FMT_MOF.1.1": 1,
"FMT_SMF.1": 4,
"FMT_SMF.1.1": 1
},
"FPT": {
"FPT_FLS.1": 7,
"FPT_FLS.1.1": 1,
"FPT_TST_EXT.1": 2,
"FPT_TST_EXT.1.1": 1,
"FPT_TST_EXT.1.2": 3,
"FPT_TUD_EXT.1": 1,
"FPT_TUD_EXT.1.3": 1
},
"FTA": {
"FTA_SSL.3": 3,
"FTA_SSL.3.1": 1,
"FTA_TSE.1": 3,
"FTA_TSE.1.1": 1,
"FTA_VCM_EXT.1": 3,
"FTA_VCM_EXT.1.1": 1
},
"FTP": {
"FTP_ITC.1": 2,
"FTP_ITC.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"GCM": {
"GCM": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 23,
"IKEv1": 17,
"IKEv2": 12
},
"IPsec": {
"IPsec": 29
},
"SSH": {
"SSH": 5
},
"TLS": {
"TLS": {
"TLS": 5
}
},
"VPN": {
"VPN": 70
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 4,
"P-384": 6,
"P-521": 6
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 186-3": 3,
"FIPS PUB 186-3": 8,
"FIPS PUB 197": 1
},
"NIST": {
"NIST SP 800-38A": 1,
"NIST SP 800-38B": 1,
"NIST SP 800-38C": 1,
"NIST SP 800-38D": 1,
"NIST SP 800-38E": 1,
"NIST SP 800-57": 2
},
"RFC": {
"RFC 2460": 3,
"RFC 2560": 1,
"RFC 2986": 1,
"RFC 3602": 1,
"RFC 4106": 1,
"RFC 4109": 1,
"RFC 4301": 2,
"RFC 4303": 1,
"RFC 4304": 1,
"RFC 4868": 2,
"RFC 4945": 1,
"RFC 5280": 4,
"RFC 5282": 1,
"RFC 5759": 1,
"RFC 5996": 1,
"RFC 6379": 1,
"RFC 768": 3,
"RFC 791": 3,
"RFC 793": 3,
"RFC792": 1
},
"X509": {
"X.509": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5,
"AES-": 1
}
},
"constructions": {
"MAC": {
"HMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "James Donndelinger",
"/CreationDate": "D:20121212115359",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20121212115359",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "NDPP Extended Package VPN Gateway",
"pdf_file_size_bytes": 981716,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.niap-ccevs.org/pp/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 49
},
"report_filename": "",
"report_keywords": null,
"report_metadata": null
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8b32f09a4704b1850fbb86b26b154c6fdc1c7f27a07fee311539de155ede3e03",
"txt_hash": "339d9acbf2f8f076071ebbc5c59547b0b61d1eb2af7bd4c2364f5611cae3259f"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": false,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7",
"txt_hash": null
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Network and Network-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "U.S. Government Approved Protection Profile - Network Device Protection Profile (NDPP) Extended Package VPN Gateway",
"not_valid_after": "2012-12-12",
"not_valid_before": "2012-12-12",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.0.pdf",
"report_link": "https://www.commoncriteriaportal.org#no_cert",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "archived",
"version": "1.0"
}
}