This page was not yet optimized for use on mobile devices.
Network Device Protection Profile Extended Package VPN Gateway
Web information ?
Status: archivedCertification date: 2013-04-12
Archived date: 2016-02-27
Scheme: 🇺🇸
Category: Network and Network-Related Devices and Systems
Security level: None
Certification report ?
Extracted keywords
Protocols
IPsec, VPNVendor
Cisco, Cisco Systems, Cisco Systems, IncClaims
O.ADDRESS_FILTERING, O.AUTHENTICATION, O.CRYPTOGRAPHIC_FUNCTIONS, O.FAIL_SECURE, O.PORT_FILTERING, O.CLIENT_ESTABLISHMENT_CONSTRAINTS, O.REMOTE_SESSION_TERMINATION, O.ASSIGNED_PRIVATE_ADDRESS, T.NETWORK_DISCLOSURE, T.NETWORK_ACCESS, T.NETWORK_MISUSE, T.TSF_FAILURE, T.REPLAY_ATTACK, T.DATA_INTEGRITY, T.UNAUTHORIZED_CONNECTION, T.HIJACKED_SESSION, T.UNPROTECTED_TRAFFIC, A.CONNECTIONS, OE.CONNECTIONSSecurity Assurance Requirements (SAR)
AVA_VAN.1, AVA_VAN, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_COP.1, FCS_RBG_EXT, FIA_AFL, FIA_PSK_EXT, FMT_MOF, FMT_SMF, FPT_FLS, FPT_TUD_EXT, FTA_SSL, FTA_TSE, FTA_VCM_EXT, FTP_ITCEvaluation facilities
LeidosCertification process
out of scope, written by the Leidos CCTL. Similarly, for materials covered by the Fortress evaluation that were out of scope of the Aruba Networks evaluation, the ETR produced by Leidos was referenced. Additional review ofFile metadata
Creation date | D:20150417144940-04'00' |
---|---|
Modification date | D:20150417162506-04'00' |
Pages | 11 |
Profile ?
Extracted keywords
Symmetric Algorithms
AES, AES-, HMACAsymmetric Algorithms
ECDSA, Diffie-Hellman, DHHash functions
SHA-1, SHA-512Protocols
SSH, TLS, IKE, IKEv1, IKEv2, IPsec, VPNRandomness
RBGElliptic Curves
P-384, P-521, P-256Block cipher modes
CBC, GCMClaims
O.CRYPTOGRAPHIC_FUNCTIONS, O.AUTHENTICATION, O.ADDRESS_FILTERING, O.FAIL_SECURE, O.PORT_FILTERING, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.RELATED_CONNECTION_FILTERING, O.CLIENT_ESTABLISHMENT_CONSTRAINTS, O.REMOTE_SESSION_TERMINATION, O.ASSIGNED_PRIVATE_ADDRESS, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.DATA_INTEGRITY, T.REPLAY_ATTACK, T.TSF_FAILURE, T.UNAUTHORIZED_CONNECTION, T.HIJACKED_SESSION, A.CONNECTIONS, OE.CONNECTIONSSecurity Assurance Requirements (SAR)
AVA_VAN.1Security Functional Requirements (SFR)
FAU_GEN.1, FCS_CKM.1, FCS_COP.1, FCS_RBG_EXT.1, FCS_CKM.1.1, FCS_COP.1.1, FCS_RBG_EXT.1.1, FCS_CKM.1.2, FIA_AFL.1, FIA_PSK_EXT, FIA_PSK_EXT.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1.2, FIA_PSK_EXT.1.3, FIA_PSK_EXT.1.4, FMT_MOF.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1.1, FPT_FLS.1, FPT_TST_EXT.1.2, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_TUD_EXT.1.3, FPT_FLS.1.1, FPT_TST_EXT.1.1, FTA_SSL.3, FTA_TSE.1, FTA_VCM_EXT.1, FTA_SSL.3.1, FTA_TSE.1.1, FTA_VCM_EXT.1.1, FTP_ITC.1, FTP_ITC.1.1Standards
FIPS PUB 197, FIPS PUB 186-3, FIPS 186-3, NIST SP 800-38D, NIST SP 800-38A, NIST SP 800-38B, NIST SP 800-38C, NIST SP 800-38E, NIST SP 800-57, RFC 4301, RFC 4303, RFC 4106, RFC 3602, RFC 4109, RFC 4304, RFC 4868, RFC 6379, RFC 5282, RFC 4945, RFC 791, RFC 2460, RFC 793, RFC 768, RFC792, RFC 5280, RFC 2986, RFC 2560, RFC 5759, RFC 5996, X.509File metadata
Title | NDPP Extended Package VPN Gateway |
---|---|
Author | James Donndelinger |
Creation date | D:20130415102300Z |
Modification date | D:20150417162625-04'00' |
Pages | 51 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
References ?
No references are available for this protection profile.
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Network Device Protection Profile Extended Package VPN Gateway was processed.
Raw data
{
"_id": "763442febf3de19b",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "763442febf3de19b",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_nd_vpn_gw_ep_v1.1.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 7
}
},
"FF": {
"DH": {
"DH": 9,
"Diffie-Hellman": 3
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIONS": 2
},
"O": {
"O.ADDRESS_FILTERING": 5,
"O.ASSIGNED_PRIVATE_ADDRESS": 1,
"O.AUTHENTICATION": 2,
"O.CLIENT_ESTABLISHMENT_CONSTRAINTS": 1,
"O.CRYPTOGRAPHIC_FUNCTIONS": 4,
"O.FAIL_SECURE": 3,
"O.PORT_FILTERING": 5,
"O.RELATED_CONNECTION_FILTERING": 1,
"O.REMOTE_SESSION_TERMINATION": 1,
"O.SYSTEM_MONITORING": 3,
"O.TOE_ADMINISTRATION": 2
},
"OE": {
"OE.CONNECTIONS": 2
},
"T": {
"T.DATA_INTEGRITY": 3,
"T.HIJACKED_SESSION": 1,
"T.NETWORK_DISCLOSURE": 3,
"T.NETWORK_MISUSE": 3,
"T.REPLAY_ATTACK": 3,
"T.TSF_FAILURE": 2,
"T.UNAUTHORIZED_CONNECTION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"AVA": {
"AVA_VAN.1": 2
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 6
},
"FCS": {
"FCS_CKM.1": 6,
"FCS_CKM.1.1": 2,
"FCS_CKM.1.2": 2,
"FCS_COP.1": 8,
"FCS_COP.1.1": 3,
"FCS_RBG_EXT.1": 5,
"FCS_RBG_EXT.1.1": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_PSK_EXT": 2,
"FIA_PSK_EXT.1": 2,
"FIA_PSK_EXT.1.1": 1,
"FIA_PSK_EXT.1.2": 2,
"FIA_PSK_EXT.1.3": 2,
"FIA_PSK_EXT.1.4": 1
},
"FMT": {
"FMT_MOF.1": 2,
"FMT_MOF.1.1": 1,
"FMT_SMF.1": 4,
"FMT_SMF.1.1": 1
},
"FPT": {
"FPT_FLS.1": 7,
"FPT_FLS.1.1": 1,
"FPT_TST_EXT.1": 2,
"FPT_TST_EXT.1.1": 1,
"FPT_TST_EXT.1.2": 3,
"FPT_TUD_EXT.1": 1,
"FPT_TUD_EXT.1.3": 1
},
"FTA": {
"FTA_SSL.3": 3,
"FTA_SSL.3.1": 1,
"FTA_TSE.1": 3,
"FTA_TSE.1.1": 1,
"FTA_VCM_EXT.1": 3,
"FTA_VCM_EXT.1.1": 1
},
"FTP": {
"FTP_ITC.1": 2,
"FTP_ITC.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"GCM": {
"GCM": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 23,
"IKEv1": 17,
"IKEv2": 12
},
"IPsec": {
"IPsec": 29
},
"SSH": {
"SSH": 5
},
"TLS": {
"TLS": {
"TLS": 5
}
},
"VPN": {
"VPN": 70
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 4,
"P-384": 6,
"P-521": 6
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 186-3": 3,
"FIPS PUB 186-3": 8,
"FIPS PUB 197": 1
},
"NIST": {
"NIST SP 800-38A": 1,
"NIST SP 800-38B": 1,
"NIST SP 800-38C": 1,
"NIST SP 800-38D": 1,
"NIST SP 800-38E": 1,
"NIST SP 800-57": 2
},
"RFC": {
"RFC 2460": 3,
"RFC 2560": 1,
"RFC 2986": 1,
"RFC 3602": 1,
"RFC 4106": 1,
"RFC 4109": 1,
"RFC 4301": 2,
"RFC 4303": 1,
"RFC 4304": 1,
"RFC 4868": 2,
"RFC 4945": 1,
"RFC 5280": 1,
"RFC 5282": 1,
"RFC 5759": 1,
"RFC 5996": 1,
"RFC 6379": 1,
"RFC 768": 3,
"RFC 791": 3,
"RFC 793": 3,
"RFC792": 1
},
"X509": {
"X.509": 6
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5,
"AES-": 1
}
},
"constructions": {
"MAC": {
"HMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "James Donndelinger",
"/CreationDate": "D:20130415102300Z",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20150417162625-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "NDPP Extended Package VPN Gateway",
"pdf_file_size_bytes": 1236384,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.niap-ccevs.org/pp/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 51
},
"report_filename": "ep_vpn_gw_v1.1-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIONS": 1
},
"O": {
"O.ADDRESS_FILTERING": 1,
"O.ASSIGNED_PRIVATE_ADDRESS": 1,
"O.AUTHENTICATION": 1,
"O.CLIENT_ESTABLISHMENT_CONSTRAINTS": 1,
"O.CRYPTOGRAPHIC_FUNCTIONS": 1,
"O.FAIL_SECURE": 1,
"O.PORT_FILTERING": 1,
"O.REMOTE_SESSION_TERMINATION": 1
},
"OE": {
"OE.CONNECTIONS": 1
},
"T": {
"T.DATA_INTEGRITY": 1,
"T.HIJACKED_SESSION": 1,
"T.NETWORK_ACCESS": 1,
"T.NETWORK_DISCLOSURE": 1,
"T.NETWORK_MISUSE": 1,
"T.REPLAY_ATTACK": 1,
"T.TSF_FAILURE": 1,
"T.UNAUTHORIZED_CONNECTION": 1,
"T.UNPROTECTED_TRAFFIC": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FCS": {
"FCS_CKM.1": 2,
"FCS_COP.1": 2,
"FCS_RBG_EXT": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_PSK_EXT": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_SMF": 1
},
"FPT": {
"FPT_FLS": 1,
"FPT_TUD_EXT": 1
},
"FTA": {
"FTA_SSL": 1,
"FTA_TSE": 1,
"FTA_VCM_EXT": 1
},
"FTP": {
"FTP_ITC": 1
}
},
"certification_process": {
"OutOfScope": {
" written by the Leidos CCTL. Similarly, for materials covered by the Fortress evaluation that were out of scope of the Aruba Networks evaluation, the ETR produced by Leidos was referenced. Additional review of": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"VPN": {
"VPN": 23
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Leidos": {
"Leidos": 7
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 10,
"Cisco Systems": 1,
"Cisco Systems, Inc": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20150417144940-04\u002700\u0027",
"/ModDate": "D:20150417162506-04\u002700\u0027",
"pdf_file_size_bytes": 408267,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 11
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "80d5b35bd6a05d7f234f97f81aeb04666ca4c0e08859872e862f2a99754f2434",
"txt_hash": "7fb14e39c6819f63124406b4834fe4f4997fdf77ed1f7752d082a9fe69b6fa96"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "eae2e9847d6894984889a36d668f5b5765ecda6d13a811c0c2fbe1ff05ad07bf",
"txt_hash": "477b04c6ddfc4b2ee324edb14be91aeae00993534b17c24f4d0d713fb1e60cc3"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Network and Network-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Network Device Protection Profile Extended Package VPN Gateway",
"not_valid_after": "2016-02-27",
"not_valid_before": "2013-04-12",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ep_vpn_gw_v1.1-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "archived",
"version": "HTTP/1.1"
}
}