This page was not yet optimized for use on mobile devices.
Protection Profile for Network Devices
Web information ?
Status: archivedCertification date: 2012-06-08
Archived date: 2015-08-27
Scheme: 🇺🇸
Category: Network and Network-Related Devices and Systems
Security level: None
Certification report ?
Extracted keywords
Protocols
SSH, TLSClaims
O.PROTECTED_COMMUNICATIONS, O.VERIFIABLE_UPDATES, O.SYSTEM_MONITORING, O.DISPLAY_BANNER, O.TOE_ADMINISTRATION, O.RESIDUAL_INFORMATION_CLEARING, O.SESSION_LOCK, O.TSF_SELF_TEST, T.ADMIN_ERROR, T.TSF_FAILURE, T.UNDETECTED_ACTIONS, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMIN, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2Security Functional Requirements (SFR)
FAU_GEN, FAU_STG_EXT, FCS_CKM, FCS_CKM_EXT, FCS_COP.1, FCS_RBG_EXT, FCS_TLS_EXT, FCS_SSH_EXT, FDP_RIP, FIA_PMG_EXT, FIA_UAU, FIA_UAU_EXT, FIA_UIA_EXT, FMT_MTD, FMT_SMF, FMT_SMR, FPT_APW_EXT, FPT_SKP_EXT, FPT_STM, FPT_TST_EXT, FPT_TUD_EXT, FPT_ITT, FTA_SSL, FTA_SSL_EXT, FTA_TAB, FTP_ITC, FTP_TRPEvaluation facilities
LeidosFile metadata
Title | Validation Report for HP |
---|---|
Author | Tammy Compton |
Creation date | D:20140324151956-04'00' |
Modification date | D:20140324152000-04'00' |
Pages | 12 |
Creator | Acrobat PDFMaker 10.1 for Word |
Producer | Adobe PDF Library 10.0 |
Profile ?
Extracted keywords
Symmetric Algorithms
AES, DES, HMAC, CMACAsymmetric Algorithms
ECDSA, DH, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA256Schemes
MACProtocols
SSH, SSL 2.0, SSL 3.0, TLS, TLS 1.0, TLS 1.1, TLS 1.2, IKEv1, IKEv2, IKE, IPsec, VPNRandomness
RBGElliptic Curves
P-256, P-384, P-521Block cipher modes
GCM, CCMTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256Claims
O.PROTECTED_COMMUNICATIONS, O.VERIFIABLE_UPDATES, O.SYSTEM_MONITORING, O.DISPLAY_BANNER, O.TOE_ADMINISTRATION, O.RESIDUAL_INFORMATION_CLEARING, O.SESSION_LOCK, O.TSF_SELF_TEST, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.ADMIN_ERROR, T.UNDETECTED_ACTIONS, T.USER_DATA_REUSE, T.TSF_FAILURE, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMIN, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE, AGD_OPE.1, AGD_PRE.1, AGD_PRE, ALC_CMC.1, ALC_CMS.1, ALC_CMC.2, ALC_CMS.2, ATE_IND.1, ATE_IND, AVA_VAN.1, AVA_VANSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_STG_EXT.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_STG_EXT.1.1, FCS_CKM.1, FCS_CKM_EXT.4, FCS_COP.1, FCS_RBG_EXT.1, FCS_SSH_EXT.1, FCS_TLS_EXT.1, FCS_CKM.1.1, FCS_CKM_EXT.4.1, FCS_COP.1.1, FCS_RBG_EXT, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_COP, FCS_TLS_EXT.1.1, FCS_SSH_EXT.1.1, FCS_SSH_EXT.1.2, FCS_SSH_EXT.1.5, FCS_SSH_EXT.1.3, FCS_SSH_EXT.1.4, FCS_SSH_EXT.1.6, FCS_SSH_EXT.1.7, FDP_RIP.2, FDP_RIP.2.1, FIA_UIA_EXT.1, FIA_PMG_EXT.1, FIA_UAU.7, FIA_UAU_EXT.2, FIA_PMG_EXT.1.1, FIA_UIA, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.2.1, FIA_UAU.7.1, FMT_MTD.1, FMT_SMF.1, FMT_SFR.1, FMT_SMR.2, FMT_MTD.1.1, FMT_MTD, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_SKP_EXT.1, FPT_ITT.1, FPT_ITT, FPT_TUD_EXT.1, FPT_STM.1, FPT_APW_EXT.1, FPT_TST_EXT.1, FPT_TUD_EXT.1.3, FPT_TST_EXT, FPT_SKP_EXT.1.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_STM.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TST_EXT.1.1, FPT_ITT.1.1, FTA_SSL_EXT.1, FTA_SSL.3, FTA_SSL.4, FTA_TAB.1, FTA_SSL_EXT.1.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Side-channel analysis
malfunctionStandards
FIPS PUB 186-3, FIPS 186-3, FIPS 140-2, FIPS PUB 197, FIPS PUB 186-2, NIST SP 800-38A, NIST SP 800-38B, NIST SP 800-38C, NIST SP 800-38D, NIST SP 800-38E, SP 800-90, NIST SP 800-90, NIST SP 800-63, RFC 4303, RFC 3602, RFC 4106, RFC 4109, RFC 4868, RFC 2409, RFC 2246, RFC 4346, RFC 5246, RFC 5430, RFC 4253, RFC 2818File metadata
Title | NDPPv1.1 DRAFT |
---|---|
Author | NIAP |
Creation date | D:20120718124747 |
Modification date | D:20120718124747 |
Pages | 62 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
References ?
- 3e-636 Series Network Security Devices, hardware version 1.0, firmware version 5.1 archived
- ARUBA NETWORKS VIRTUAL MOBILITY CONTROLLER (HARDENED CHASSIS RUNNING VMWARE ESXI) WITH ARUBAOS 6.4.2.0 - 1.3 FIPS archived
- AlienVault USM for Government v4.12 and RT Logic CyberC4: Alert v4.12 archived
- Apriva MESA VPN, v1.0 archived
- Arista 7050X, 7250X, 7300X, 7500E Series archived
- Arista 7150 Series archived
- Aruba 2920 Switch Series, Version 5.011 WB_15_18_0011I archived
- Aruba Networks Mobility Controller Version: ArubaOS 6.3 Components: Aruba appliance models: 600, 3000, 6000,7000 series Processor: Revision C4 archived
- Aruba Networks Mobility Controller v6.4.3.4-FIPS archived
- Blue Coat ProxySG S400 and S500 running SGOS v6.5 archived
- Blue Coat ProxySG SG600, SG900, SG9000 running SGOS v6.5 archived
- Brocade Communications Systems, Inc. Brocade Directors and Switches operating with Fabric OS version 7.3.0 archived
- Brocade Communications Systems, Inc. Brocade FastIron SX, ICX, and FCX Series Switch/Router 08.0.10 archived
- Brocade Communications Systems, Inc. Brocade FastIron SX, ICX, and FCX Series Switch/Router 8.0.20 archived
- Brocade Communications Systems, Inc. Brocade MLXe and NetIron Family Devices with Multi-Service IronWare R05.8.00 archived
- Brocade Communications Systems, Inc. Brocade MLXe® and NetIron®Family Devices with Multi-Service IronWare R05.5.00 archived
- Brocade Communications Systems, Inc. FastIron SX, FastIron FCX and ICX 6610 Series Switch/Router, with IronWare OS 7.3 archived
- Brocade Communications Systems, Inc. FastIron SX, FastIron FCX and ICX Series Switch/Router, with IronWare OS 8.0.01 archived
- Brocade Communications Systems, Inc. MLX and NetIron CER 2000 Series Router archived
- Brocade Communications Systems, Inc. MLXe® and NetIron® Family Devices with Multi-Service IronWare R05.6.00 archived
- Brocade MLXe and NetIron Family Devices with Multi-Service IronWare R05.9 archived
- Brocade VDX 6700 and 8700 Series products with NOS 3.0 archived
- Brocade VDX 6700 and 8700 Series products with NOS v5.0 archived
- CISCO ADAPTIVE SECURITY APPLIANCES (ASA) AND CISCO ADAPTIVE SECURITY APPLIANCES VIRTUAL (ASAV) Version: ASA 9.4(1.13), ASAv 9.4(1.240) ASDM 7.4Components: ASA 5500 Series (5506-X, 5506-H, 5506-W, 5508-X, 5516-X) and ASAv running on VM ESXi 5.1 and 5.5 on the Unified Computing System (UCS) EN120E, EN120S M2, E140S M1, E140S M2, E140D M1, E160D M2, E160D M1, E180D M2, E140DP M1, E160DP M1, C22 M3, C24 M3, C220 M3, C220 M4, C240 M3, C240 M4, C260 M2, C420 M3, C460 M2, and C460 M4 archived
- Check Point Software Technologies Ltd. Security Appliances R77.30 archived
- Ciena 5400 Series Packet Optical Platform archived
- Ciena Carrier Ethernet Solutions (CES) 3900 series and 5100 series with SAOS archived
- Cisco 5915 and 5940 Embedded Services Router archived
- Cisco Adaptive Security Appliances (ASA) Firewall and Virtual Private Network (VPN) Platform, version 9.4(1) archived
- Cisco Adaptive Security Appliances Version: ASA software version 9.1(2) Components: ASA 5500 (5505, 5510, 5520, 5540, 5550, 5580-20-40), ASA 5500-X Series (5512-X, 5515-X, 5525-X, 5545-X, 5555-X), ASA 5585-X (5585-10, 5585-20, 5585-40, 5585-60), ASA Services Module (ASA-SM) archived
- Cisco Aggregation Service Router (ASR) 900 Series (902, 903, and 920) running IOS-XE 3.13.(1)S archived
- Cisco Aggregation Service Router (ASR) 901 Series running IOS 15.5(1)S1 archived
- Cisco Aggregation Services Router (ASR) 1000 Series archived
- Cisco Aggregation Services Router (ASR) 1000 Series, IOS XE 3.13 archived
- Cisco Catalyst 2960C, 2960S, 2960SF, 2960X, 2960XR running IOS 15.2(2a)E1 and 3560C, 3560X, 3750X running IOS 15.2(2)E1 archived
- Cisco Catalyst 2960CX and 3560CX Series Compact Switches running IOS 15.2(3)E1 archived
- Cisco Catalyst 3650, 3850, 4500E (Sup7E, Sup7LE, Sup8E), 4500X, 4500XF running IOS-XE 3.6.1S archived
- Cisco Catalyst 6K Series Switches archived
- Cisco Catalyst Switches (2960S, 2960C, 3560V2 and 3750V2) running IOS 15.0(2)SE4 archived
- Cisco Email Security Appliance (ESA) archived
- Cisco Email Security Appliance v9.1 archived
- Cisco Embedded Services Router 5900 Series (ESR 5900), Integrated Services Router 800 Series (ISR-800), Integrated Services Router 800M Series (ISR-800M) & Industrial Router 800 Series (IR-800) archived
- Cisco Identity Services Engine (ISE) v1.2 archived
- Cisco Integrated Service Routers Generation 2 (ISR G2) archived
- Cisco Integrated Services Router (ISR) 800 Series archived
- Cisco Integrated Services Router 4400 Series (ISR-4400), IOS XE 3.13.0 archived
- Cisco Integrated Services Router Generation 2 (ISR G2), Integrated Services Router 800 Series (ISR-800) and Connected Grid Router 2010 archived
- Cisco Integrated Services Routers (ISR) 4000 Family v3.13.2 archived
- Cisco Integrated Services Routers Series (ISR-4400), IOS XE 3.10.2tS archived
- Cisco Intrusion Prevention System Version: Software Version 7.2(1) Components: IPS 4300 and 4500 series sensors (4345, 4360, 4510, and 4520); IPS hardware modules for ASA 5585-X (IPS SSP-10, SSP-20, SSP-40, and SSP-60); and IPS software modules on ASA 5500-X (ASA 5512-X, 5515-X, 5525-X, 5545-X, and 5555-X). archived
- Cisco Optical Networking Solution (ONS) and Network Convergence System (NCS) 2000 Series archived
- Cisco Optical Networking Solution 9.8.1.2 archived
- Cisco Unified Communications Manager 11.0 archived
- Cisco X-ES Xpedite5205 Embedded Services Router archived
- Citrix NetScaler Platinum Edition Load Balancer v10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS and MPX 15500-FIPS appliances archived
- Dell Networking Switches: S4810, S4820T, S5000, S6000, Z9000, Z9500 running Dell Networking OS v9.6.0.0 P6 archived
- Fidelis XPS version 8.0 archived
- FireEye CM, FX, EX, and NX Series Appliances archived
- FireEye HX Series Appliances archived
- FireEye MX Series Appliances archived
- FireSphere 14600_FIPS and FireSphere 7960_FIPS archived
- FortiAnalyzer™ Centralized Reporting Appliances running Firmware 5.2.4 archived
- FortiGate™ UTM appliances running FortiOS™ 5.0 Patch Release 10 archived
- FortiMail Appliances running FortiMail Firmware Version 5.2.6 archived
- FortiManager Appliances running Firmware 5.2.4 archived
- FortiSwitch blade appliances with FortiTRNG running FortiOS 5.0 Patch Release 7 archived
- Fortigate UTM appliances running FortiOS 5.0 Patch Release 10 archived
- Fortress Mesh Point ES210, ES520, ES820, ES2440 archived
- Forum Sentry v8.1.641 archived
- GigaVUE version 4.4 archived
- HPE 5400R zl2 Switch Series Version 5.011, KB_15_18_0008p01 archived
- HPE Moonshot-180XGc, 45XGc, 45Gc switch archived
- Hewlett Packard Enterprise 5900 Series, 5920 Series, 5930 Series, 10500 Series, 12500 Series, and 12900 Series with Comware 7 archived
- Hewlett Packard Enterprise 7900 Series, 7500 Series, 5700 Series, 5130 EI Series, 5130 HI Series and 5510 HI Series Switches with Comware 7 archived
- Hewlett Packard Enterprise MSR 1000 Series, 2000 Series, 3000 Series, and 4000 Series Routers with Comware V7.1 archived
- Hewlett-Packard 10500 Series and 5830AF Series Switches with Comware version 5.2 archived
- Hewlett-Packard 6125G & 6125G/XG Ethernet Blade Switch Series archived
- Hewlett-Packard 6125XLG Ethernet Blade Switch archived
- Hewlett-Packard Company 5900 Series, 5920 Series, 10500 Series and 12500 Series Switches with Comware Version 7.1.045 archived
- Hewlett-Packard Networking A-Series Switches: 12500, 9500, 7500, 5820, 5800, 5500, and 5120 archived
- IAS Router Series: IAS STEW, IAS KG-RU, IAS Router MICRO archived
- IBM BigFix Endpoint Manager Version 9.2 archived
- Imperva SecureSphere v11.5 archived
- Infoblox Trinzic Appliances with NIOS v7.1 archived
- JUNIPER NETWORKS, INC JUNOS 15.1X49-D60 archived
- JUNOS 12.3 X48-D30 FOR SRX PLATFORMSComponents: SRX100, SRX110, SRX210, SRX220, SRX240, SRX550 and SRX650; SRX5400, SRX5400E SRX5600, SRX5600E, SRX5800 and SRX5800E with SPC-4-15-320 archived
- JUNOS 12.3X48-D30 FOR SRX XLR PLATFORMSComponents: Hardware Platforms: SRX1400, SRX3400 and SRX3600; SRX5400, SRX5400E, SRX5600, SRX5600E, SRX5800 and SRX5800E with SPC-2-10-20 archived
- Juniper EX4300 with JUNOS 14.1X53d30 archived
- Juniper EX4600 and QFX5100 with JUNOS 14.1X53d30 archived
- Juniper MX240 MX480, MX960, MX2010, MX2020, EX9204, EX9208, EX9214, PTX3000, PTX5000 with JUNOS 14.2R3 archived
- Juniper Networks M,T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8 and Juniper QFX and EX Switches Running Junos OS 13.2X50-D19 and 13.2X51-D20 archived
- Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5 archived
- Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320. archived
- Juniper Networks, Inc. Junos 12.1 X46 D20 for SRX Series Platforms archived
- Juniper Networks, Inc. Junos 12.1 X46 D20 for SRX Series and LN Series Platforms archived
- Lancope StealthWatch v6.3.5 archived
- LogRhythm Integrated Solution 6.3.4 archived
- Lumeta IPsonar 5.5C archived
- Makito and Barracuda Video Encoders with firmware version 2.1.1-3; Appliances: S-280E-SDI, S-290E-HDSDI, S-290E-DVI, S-290E-DVI-S, S-290E-AIR; Blades: B-290E-DVI, B-290E-DVI-S, B-290E-HDSDI, B-280E-SDI; Chassis: F-280-1, F-290-1DH, F-290-1, F-MB6B-RAC, F-MB6X-RAC, F-MB6B-DC, F-MB6B-MED, F-MB21B-R; Firmware Options: SW-290E-KLV, FCO-SV-SW-CONFIG archived
- McAfee Advanced Threat Defense archived
- McAfee Network Security Platform M-series and NS-Series Sensors archived
- McAfee® Email Gateway (MEG) software v7.0.1, running on appliance models 4000-B, 4500-B, 5000(B, C & C-2U), 5500(B & C), and the Content Security Blade Server archived
- McAfee® Email Gateway (MEG) software v7.0.1, running on appliance models 4000-B, 4500-B, 5000(B, C & C-2U), 5500(B & C), and the Content Security Blade Server archived
- NetScout nGeniusONE™ Unified Performance Management Platform V5.2.1 and nGenius® InfiniStream® V5.2.1 archived
- NetScout nGenius® 3900 Series Packet Flow Switch archived
- Palo Alto Networks PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series, PA-7000 Series, VM Series, Next-Generation Firewall with PAN-OS 7.0.1-h4 archived
- Pulse Connect Secure 8.0 R13 archived
- Pulse Policy Secure 5.0 R13 archived
- Pure Storage FA-400 Series and FlashArray //m Appliances version 4.7 archived
- SCS-100 & SCS-200 archived
- SevOne Network Management System 5.5.0.1 archived
- SonicWALL SonicOS Enhanced v5.9.0 on NSA Series and TZ Series Appliances archived
- Sourcefire 3D System Version 5.2.0.1 archived
- Stonesoft Next Generation Firewall (NGFW) archived
- Symantec SSL Visibility Appliance v3.10.2.1-21-FIPS140 archived
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection Profile for Network Devices was processed.
Raw data
{
"_id": "ac9abe3d5c5a31f0",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "ac9abe3d5c5a31f0",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_nd_v1.1.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 3
}
},
"FF": {
"DH": {
"DH": 12
},
"DSA": {
"DSA": 3
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_GENERAL_PURPOSE": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_ADMIN": 1
},
"O": {
"O.DISPLAY_BANNER": 1,
"O.PROTECTED_COMMUNICATIONS": 1,
"O.RESIDUAL_INFORMATION_CLEARING": 1,
"O.SESSION_LOCK": 1,
"O.SYSTEM_MONITORING": 1,
"O.TOE_ADMINISTRATION": 1,
"O.TSF_SELF_TEST": 1,
"O.VERIFIABLE_UPDATES": 1
},
"OE": {
"OE.NO_GENERAL_PURPOSE": 1,
"OE.PHYSICAL": 1,
"OE.TRUSTED_ADMIN": 1
},
"T": {
"T.ADMIN_ERROR": 2,
"T.TSF_FAILURE": 2,
"T.UNAUTHORIZED_ACCESS": 4,
"T.UNAUTHORIZED_UPDATE": 2,
"T.UNDETECTED_ACTIONS": 2,
"T.USER_DATA_REUSE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 9
},
"AGD": {
"AGD_OPE": 6,
"AGD_OPE.1": 12,
"AGD_PRE": 1,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC.1": 6,
"ALC_CMC.2": 1,
"ALC_CMS.1": 2,
"ALC_CMS.2": 4
},
"ATE": {
"ATE_IND": 4,
"ATE_IND.1": 6
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.1": 7
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 8,
"FAU_GEN.1.1": 3,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 4,
"FAU_GEN.2.1": 1,
"FAU_STG_EXT.1": 3,
"FAU_STG_EXT.1.1": 1
},
"FCS": {
"FCS_CKM.1": 5,
"FCS_CKM.1.1": 1,
"FCS_CKM_EXT.4": 4,
"FCS_CKM_EXT.4.1": 1,
"FCS_COP": 2,
"FCS_COP.1": 20,
"FCS_COP.1.1": 4,
"FCS_RBG_EXT": 1,
"FCS_RBG_EXT.1": 3,
"FCS_RBG_EXT.1.1": 3,
"FCS_RBG_EXT.1.2": 2,
"FCS_SSH_EXT.1": 6,
"FCS_SSH_EXT.1.1": 1,
"FCS_SSH_EXT.1.2": 1,
"FCS_SSH_EXT.1.3": 1,
"FCS_SSH_EXT.1.4": 2,
"FCS_SSH_EXT.1.5": 2,
"FCS_SSH_EXT.1.6": 1,
"FCS_SSH_EXT.1.7": 1,
"FCS_TLS_EXT.1": 6,
"FCS_TLS_EXT.1.1": 1
},
"FDP": {
"FDP_RIP.2": 4,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_PMG_EXT.1": 4,
"FIA_PMG_EXT.1.1": 1,
"FIA_UAU.7": 4,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT.2": 2,
"FIA_UAU_EXT.2.1": 1,
"FIA_UIA": 1,
"FIA_UIA_EXT.1": 9,
"FIA_UIA_EXT.1.1": 1,
"FIA_UIA_EXT.1.2": 1
},
"FMT": {
"FMT_MTD": 2,
"FMT_MTD.1": 5,
"FMT_MTD.1.1": 1,
"FMT_SFR.1": 1,
"FMT_SMF.1": 5,
"FMT_SMF.1.1": 1,
"FMT_SMR.2": 2,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 2,
"FMT_SMR.2.3": 2
},
"FPT": {
"FPT_APW_EXT.1": 3,
"FPT_APW_EXT.1.1": 1,
"FPT_APW_EXT.1.2": 1,
"FPT_ITT": 2,
"FPT_ITT.1": 7,
"FPT_ITT.1.1": 1,
"FPT_SKP_EXT.1": 3,
"FPT_SKP_EXT.1.1": 1,
"FPT_STM.1": 4,
"FPT_STM.1.1": 1,
"FPT_TST_EXT": 2,
"FPT_TST_EXT.1": 3,
"FPT_TST_EXT.1.1": 1,
"FPT_TUD_EXT.1": 4,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 1,
"FPT_TUD_EXT.1.3": 2
},
"FTA": {
"FTA_SSL.3": 4,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 2,
"FTA_SSL.4.1": 1,
"FTA_SSL_EXT.1": 4,
"FTA_SSL_EXT.1.1": 1,
"FTA_TAB.1": 4,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC": 1,
"FTP_ITC.1": 8,
"FTP_ITC.1.1": 2,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP": 1,
"FTP_TRP.1": 6,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CCM": {
"CCM": 1
},
"GCM": {
"GCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 5,
"IKEv1": 13,
"IKEv2": 6
},
"IPsec": {
"IPsec": 18
},
"SSH": {
"SSH": 33
},
"TLS": {
"SSL": {
"SSL 2.0": 1,
"SSL 3.0": 1
},
"TLS": {
"TLS": 20,
"TLS 1.0": 1,
"TLS 1.1": 1,
"TLS 1.2": 4
}
},
"VPN": {
"VPN": 2
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 4,
"P-384": 4,
"P-521": 4
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 6
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 3,
"SHA-384": 3,
"SHA-512": 3,
"SHA256": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 13
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 2,
"FIPS 186-3": 2,
"FIPS PUB 186-2": 2,
"FIPS PUB 186-3": 6,
"FIPS PUB 197": 1
},
"NIST": {
"NIST SP 800-38A": 1,
"NIST SP 800-38B": 1,
"NIST SP 800-38C": 1,
"NIST SP 800-38D": 1,
"NIST SP 800-38E": 1,
"NIST SP 800-63": 1,
"NIST SP 800-90": 1,
"SP 800-90": 1
},
"RFC": {
"RFC 2246": 1,
"RFC 2409": 1,
"RFC 2818": 1,
"RFC 3602": 1,
"RFC 4106": 1,
"RFC 4109": 2,
"RFC 4253": 4,
"RFC 4303": 1,
"RFC 4346": 1,
"RFC 4868": 3,
"RFC 5246": 2,
"RFC 5430": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 12
}
},
"DES": {
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 1
}
},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "NIAP",
"/CreationDate": "D:20120718124747",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20120718124747",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "NDPPv1.1 DRAFT",
"pdf_file_size_bytes": 1011244,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 62
},
"report_filename": "pp_nd_v1.1-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_GENERAL_PURPOSE": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_ADMIN": 1
},
"O": {
"O.DISPLAY_BANNER": 1,
"O.PROTECTED_COMMUNICATIONS": 1,
"O.RESIDUAL_INFORMATION_CLEARING": 1,
"O.SESSION_LOCK": 1,
"O.SYSTEM_MONITORING": 1,
"O.TOE_ADMINISTRATION": 1,
"O.TSF_SELF_TEST": 1,
"O.VERIFIABLE_UPDATES": 1
},
"OE": {
"OE.NO_GENERAL_PURPOSE": 1,
"OE.PHYSICAL": 1,
"OE.TRUSTED_ADMIN": 1
},
"T": {
"T.ADMIN_ERROR": 1,
"T.TSF_FAILURE": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNAUTHORIZED_UPDATE": 1,
"T.UNDETECTED_ACTIONS": 1,
"T.USER_DATA_REUSE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ": 1,
"APE_REQ.2": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_STG_EXT": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM_EXT": 1,
"FCS_COP.1": 4,
"FCS_RBG_EXT": 1,
"FCS_SSH_EXT": 1,
"FCS_TLS_EXT": 1
},
"FDP": {
"FDP_RIP": 1
},
"FIA": {
"FIA_PMG_EXT": 1,
"FIA_UAU": 1,
"FIA_UAU_EXT": 1,
"FIA_UIA_EXT": 1
},
"FMT": {
"FMT_MTD": 1,
"FMT_SMF": 1,
"FMT_SMR": 1
},
"FPT": {
"FPT_APW_EXT": 1,
"FPT_ITT": 1,
"FPT_SKP_EXT": 1,
"FPT_STM": 1,
"FPT_TST_EXT": 1,
"FPT_TUD_EXT": 1
},
"FTA": {
"FTA_SSL": 2,
"FTA_SSL_EXT": 1,
"FTA_TAB": 1
},
"FTP": {
"FTP_ITC": 1,
"FTP_TRP": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 1
},
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Leidos": {
"Leidos": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Tammy Compton",
"/Company": "SAIC",
"/CreationDate": "D:20140324151956-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 10.1 for Word",
"/Keywords": "",
"/ModDate": "D:20140324152000-04\u002700\u0027",
"/Producer": "Adobe PDF Library 10.0",
"/SourceModified": "D:20140324191125",
"/Subject": "",
"/Title": "Validation Report for HP",
"/_NewReviewCycle": "",
"pdf_file_size_bytes": 122939,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "21d6565ba009ba95fa585f0644ffbbdb5cb47d86479cc0ccf6c3a3d9f6b2a580",
"txt_hash": "01f305b9cb93e1b5702610b3c2ccf7808845e4c57e5b8436338bce39caf662f6"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "bafc23a7d0ae12801c736709a04a1ad2dd95050e1c19ae443083b6bab95c2da4",
"txt_hash": "89a2d04ed344f97c56e0a819801b2d70d8a02b88db26f218453edce0ff1a25b8"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Network and Network-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile for Network Devices",
"not_valid_after": "2015-08-27",
"not_valid_before": "2012-06-08",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "archived",
"version": "1.1"
}
}