Network Device Protection Profile Extended Package VPN Gateway

Web information

Status: archived
Certification date: 2013-04-12
Archived date: 2016-02-27
Scheme: 🇺🇸
Category: Boundary Protection Devices and Systems
Security level: None

Certification report

Extracted keywords

Protocols
IPsec, VPN

Vendor
Cisco, Cisco Systems, Cisco Systems, Inc

Claims
O.ADDRESS_FILTERING, O.AUTHENTICATION, O.CRYPTOGRAPHIC_FUNCTIONS, O.FAIL_SECURE, O.PORT_FILTERING, O.CLIENT_ESTABLISHMENT_CONSTRAINTS, O.REMOTE_SESSION_TERMINATION, O.ASSIGNED_PRIVATE_ADDRESS, T.NETWORK_DISCLOSURE, T.NETWORK_ACCESS, T.NETWORK_MISUSE, T.TSF_FAILURE, T.REPLAY_ATTACK, T.DATA_INTEGRITY, T.UNAUTHORIZED_CONNECTION, T.HIJACKED_SESSION, T.UNPROTECTED_TRAFFIC, A.CONNECTIONS, OE.CONNECTIONS
Security Assurance Requirements (SAR)
AVA_VAN.1, AVA_VAN, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.1
Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_COP.1, FCS_RBG_EXT, FIA_AFL, FIA_PSK_EXT, FMT_MOF, FMT_SMF, FPT_FLS, FPT_TUD_EXT, FTA_SSL, FTA_TSE, FTA_VCM_EXT, FTP_ITC
Evaluation facilities
Leidos

Certification process
out of scope, written by the Leidos CCTL. Similarly, for materials covered by the Fortress evaluation that were out of scope of the Aruba Networks evaluation, the ETR produced by Leidos was referenced. Additional review of

File metadata

Creation date D:20150417144940-04'00'
Modification date D:20150417162506-04'00'
Pages 11

Profile

Extracted keywords

Symmetric Algorithms
AES, AES-, HMAC
Asymmetric Algorithms
ECDSA, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-512
Protocols
SSH, TLS, IKE, IKEv1, IKEv2, IPsec, VPN
Randomness
RBG
Elliptic Curves
P-384, P-521, P-256
Block cipher modes
CBC, GCM

Claims
O.CRYPTOGRAPHIC_FUNCTIONS, O.AUTHENTICATION, O.ADDRESS_FILTERING, O.FAIL_SECURE, O.PORT_FILTERING, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.RELATED_CONNECTION_FILTERING, O.CLIENT_ESTABLISHMENT_CONSTRAINTS, O.REMOTE_SESSION_TERMINATION, O.ASSIGNED_PRIVATE_ADDRESS, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.DATA_INTEGRITY, T.REPLAY_ATTACK, T.TSF_FAILURE, T.UNAUTHORIZED_CONNECTION, T.HIJACKED_SESSION, A.CONNECTIONS, OE.CONNECTIONS
Security Assurance Requirements (SAR)
AVA_VAN.1
Security Functional Requirements (SFR)
FAU_GEN.1, FCS_CKM.1, FCS_COP.1, FCS_RBG_EXT.1, FCS_CKM.1.1, FCS_COP.1.1, FCS_RBG_EXT.1.1, FCS_CKM.1.2, FIA_AFL.1, FIA_PSK_EXT, FIA_PSK_EXT.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1.2, FIA_PSK_EXT.1.3, FIA_PSK_EXT.1.4, FMT_MOF.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1.1, FPT_FLS.1, FPT_TST_EXT.1.2, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_TUD_EXT.1.3, FPT_FLS.1.1, FPT_TST_EXT.1.1, FTA_SSL.3, FTA_TSE.1, FTA_VCM_EXT.1, FTA_SSL.3.1, FTA_TSE.1.1, FTA_VCM_EXT.1.1, FTP_ITC.1, FTP_ITC.1.1

Standards
FIPS PUB 197, FIPS PUB 186-3, FIPS 186-3, NIST SP 800-38D, NIST SP 800-38A, NIST SP 800-38B, NIST SP 800-38C, NIST SP 800-38E, NIST SP 800-57, RFC 4301, RFC 4303, RFC 4106, RFC 3602, RFC 4109, RFC 4304, RFC 4868, RFC 6379, RFC 5282, RFC 4945, RFC 791, RFC 2460, RFC 793, RFC 768, RFC792, RFC 5280, RFC 2986, RFC 2560, RFC 5759, RFC 5996, X.509

File metadata

Title NDPP Extended Package VPN Gateway
Author James Donndelinger
Creation date D:20130415102300Z
Modification date D:20150417162625-04'00'
Pages 51
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

References

Updates

  • 22.04.2025 The protection profile data changed.
    Protection Profile changed

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 408267, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 11, '/CreationDate': "D:20150417144940-04'00'", '/ModDate': "D:20150417162506-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The pp_metadata property was set to {'pdf_file_size_bytes': 1236384, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 51, '/Author': 'James Donndelinger', '/CreationDate': 'D:20130415102300Z', '/Creator': 'Microsoft® Office Word 2007', '/ModDate': "D:20150417162625-04'00'", '/Producer': 'Microsoft® Office Word 2007', '/Title': 'NDPP Extended Package VPN Gateway', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.niap-ccevs.org/pp/']}}.
    • The report_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'AVA': {'AVA_VAN.1': 1, 'AVA_VAN': 1}, 'APE': {'APE_CCL.1': 1, 'APE_ECD.1': 1, 'APE_INT.1': 1, 'APE_OBJ.2': 1, 'APE_REQ.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 2, 'FCS_COP.1': 2, 'FCS_RBG_EXT': 1}, 'FIA': {'FIA_AFL': 1, 'FIA_PSK_EXT': 1}, 'FMT': {'FMT_MOF': 1, 'FMT_SMF': 1}, 'FPT': {'FPT_FLS': 1, 'FPT_TUD_EXT': 1}, 'FTA': {'FTA_SSL': 1, 'FTA_TSE': 1, 'FTA_VCM_EXT': 1}, 'FTP': {'FTP_ITC': 1}}, 'cc_claims': {'O': {'O.ADDRESS_FILTERING': 1, 'O.AUTHENTICATION': 1, 'O.CRYPTOGRAPHIC_FUNCTIONS': 1, 'O.FAIL_SECURE': 1, 'O.PORT_FILTERING': 1, 'O.CLIENT_ESTABLISHMENT_CONSTRAINTS': 1, 'O.REMOTE_SESSION_TERMINATION': 1, 'O.ASSIGNED_PRIVATE_ADDRESS': 1}, 'T': {'T.NETWORK_DISCLOSURE': 1, 'T.NETWORK_ACCESS': 1, 'T.NETWORK_MISUSE': 1, 'T.TSF_FAILURE': 1, 'T.REPLAY_ATTACK': 1, 'T.DATA_INTEGRITY': 1, 'T.UNAUTHORIZED_CONNECTION': 1, 'T.HIJACKED_SESSION': 1, 'T.UNPROTECTED_TRAFFIC': 1}, 'A': {'A.CONNECTIONS': 1}, 'OE': {'OE.CONNECTIONS': 1}}, 'vendor': {'Cisco': {'Cisco': 10, 'Cisco Systems': 1, 'Cisco Systems, Inc': 1}}, 'eval_facility': {'Leidos': {'Leidos': 7}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 23}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, ' written by the Leidos CCTL. Similarly, for materials covered by the Fortress evaluation that were out of scope of the Aruba Networks evaluation, the ETR produced by Leidos was referenced. Additional review of': 1}}}.
    • The pp_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'AVA': {'AVA_VAN.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 6}, 'FCS': {'FCS_CKM.1': 6, 'FCS_COP.1': 8, 'FCS_RBG_EXT.1': 5, 'FCS_CKM.1.1': 2, 'FCS_COP.1.1': 3, 'FCS_RBG_EXT.1.1': 1, 'FCS_CKM.1.2': 2}, 'FIA': {'FIA_AFL.1': 5, 'FIA_PSK_EXT': 2, 'FIA_PSK_EXT.1': 2, 'FIA_AFL': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_PSK_EXT.1.1': 1, 'FIA_PSK_EXT.1.2': 2, 'FIA_PSK_EXT.1.3': 2, 'FIA_PSK_EXT.1.4': 1}, 'FMT': {'FMT_MOF.1': 2, 'FMT_SMF.1': 4, 'FMT_SMF.1.1': 1, 'FMT_MOF.1.1': 1}, 'FPT': {'FPT_FLS.1': 7, 'FPT_TST_EXT.1.2': 3, 'FPT_TST_EXT.1': 2, 'FPT_TUD_EXT.1': 1, 'FPT_TUD_EXT.1.3': 1, 'FPT_FLS.1.1': 1, 'FPT_TST_EXT.1.1': 1}, 'FTA': {'FTA_SSL.3': 3, 'FTA_TSE.1': 3, 'FTA_VCM_EXT.1': 3, 'FTA_SSL.3.1': 1, 'FTA_TSE.1.1': 1, 'FTA_VCM_EXT.1.1': 1}, 'FTP': {'FTP_ITC.1': 2, 'FTP_ITC.1.1': 1}}, 'cc_claims': {'O': {'O.CRYPTOGRAPHIC_FUNCTIONS': 4, 'O.AUTHENTICATION': 2, 'O.ADDRESS_FILTERING': 5, 'O.FAIL_SECURE': 3, 'O.PORT_FILTERING': 5, 'O.SYSTEM_MONITORING': 3, 'O.TOE_ADMINISTRATION': 2, 'O.RELATED_CONNECTION_FILTERING': 1, 'O.CLIENT_ESTABLISHMENT_CONSTRAINTS': 1, 'O.REMOTE_SESSION_TERMINATION': 1, 'O.ASSIGNED_PRIVATE_ADDRESS': 1}, 'T': {'T.NETWORK_DISCLOSURE': 3, 'T.NETWORK_MISUSE': 3, 'T.DATA_INTEGRITY': 3, 'T.REPLAY_ATTACK': 3, 'T.TSF_FAILURE': 2, 'T.UNAUTHORIZED_CONNECTION': 1, 'T.HIJACKED_SESSION': 1}, 'A': {'A.CONNECTIONS': 2}, 'OE': {'OE.CONNECTIONS': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5, 'AES-': 1}}, 'constructions': {'MAC': {'HMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 7}}, 'FF': {'DH': {'Diffie-Hellman': 3, 'DH': 9}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-512': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 5}, 'TLS': {'TLS': {'TLS': 5}}, 'IKE': {'IKE': 23, 'IKEv1': 17, 'IKEv2': 12}, 'IPsec': {'IPsec': 29}, 'VPN': {'VPN': 70}}, 'randomness': {'RNG': {'RBG': 2}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'GCM': {'GCM': 2}}, 'ecc_curve': {'NIST': {'P-384': 6, 'P-521': 6, 'P-256': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1, 'FIPS PUB 186-3': 8, 'FIPS 186-3': 3}, 'NIST': {'NIST SP 800-38D': 1, 'NIST SP 800-38A': 1, 'NIST SP 800-38B': 1, 'NIST SP 800-38C': 1, 'NIST SP 800-38E': 1, 'NIST SP 800-57': 2}, 'RFC': {'RFC 4301': 2, 'RFC 4303': 1, 'RFC 4106': 1, 'RFC 3602': 1, 'RFC 4109': 1, 'RFC 4304': 1, 'RFC 4868': 2, 'RFC 6379': 1, 'RFC 5282': 1, 'RFC 4945': 1, 'RFC 791': 3, 'RFC 2460': 3, 'RFC 793': 3, 'RFC 768': 3, 'RFC792': 1, 'RFC 5280': 1, 'RFC 2986': 1, 'RFC 2560': 1, 'RFC 5759': 1, 'RFC 5996': 1}, 'X509': {'X.509': 6}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The state of the protection profile object was updated.

    • The pp property was updated, with the {'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '80d5b35bd6a05d7f234f97f81aeb04666ca4c0e08859872e862f2a99754f2434', 'txt_hash': '7fb14e39c6819f63124406b4834fe4f4997fdf77ed1f7752d082a9fe69b6fa96'} data.
    • The report property was updated, with the {'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'eae2e9847d6894984889a36d668f5b5765ecda6d13a811c0c2fbe1ff05ad07bf', 'txt_hash': '477b04c6ddfc4b2ee324edb14be91aeae00993534b17c24f4d0d713fb1e60cc3'} data.
  • 14.04.2025 The protection profile data changed.
    Protection Profile changed

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The pp_metadata property was set to None.
    • The report_keywords property was set to None.
    • The pp_keywords property was set to None.

    The state of the protection profile object was updated.

    • The pp property was updated, with the {'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None} data.
    • The report property was updated, with the {'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None} data.
  • 04.02.2025 The protection profile was first processed.
    New Protection Profile

    A new Protection Profile with the name Network Device Protection Profile Extended Package VPN Gateway was processed.

Raw data

{
  "_id": "bb67fb1b4f10e7a5",
  "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
  "dgst": "bb67fb1b4f10e7a5",
  "heuristics": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
  },
  "pdf_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
    "pp_filename": "pp_nd_vpn_gw_ep_v1.1.pdf",
    "pp_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 7
          }
        },
        "FF": {
          "DH": {
            "DH": 9,
            "Diffie-Hellman": 3
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONNECTIONS": 2
        },
        "O": {
          "O.ADDRESS_FILTERING": 5,
          "O.ASSIGNED_PRIVATE_ADDRESS": 1,
          "O.AUTHENTICATION": 2,
          "O.CLIENT_ESTABLISHMENT_CONSTRAINTS": 1,
          "O.CRYPTOGRAPHIC_FUNCTIONS": 4,
          "O.FAIL_SECURE": 3,
          "O.PORT_FILTERING": 5,
          "O.RELATED_CONNECTION_FILTERING": 1,
          "O.REMOTE_SESSION_TERMINATION": 1,
          "O.SYSTEM_MONITORING": 3,
          "O.TOE_ADMINISTRATION": 2
        },
        "OE": {
          "OE.CONNECTIONS": 2
        },
        "T": {
          "T.DATA_INTEGRITY": 3,
          "T.HIJACKED_SESSION": 1,
          "T.NETWORK_DISCLOSURE": 3,
          "T.NETWORK_MISUSE": 3,
          "T.REPLAY_ATTACK": 3,
          "T.TSF_FAILURE": 2,
          "T.UNAUTHORIZED_CONNECTION": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "AVA": {
          "AVA_VAN.1": 2
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 6
        },
        "FCS": {
          "FCS_CKM.1": 6,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.1.2": 2,
          "FCS_COP.1": 8,
          "FCS_COP.1.1": 3,
          "FCS_RBG_EXT.1": 5,
          "FCS_RBG_EXT.1.1": 1
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_PSK_EXT": 2,
          "FIA_PSK_EXT.1": 2,
          "FIA_PSK_EXT.1.1": 1,
          "FIA_PSK_EXT.1.2": 2,
          "FIA_PSK_EXT.1.3": 2,
          "FIA_PSK_EXT.1.4": 1
        },
        "FMT": {
          "FMT_MOF.1": 2,
          "FMT_MOF.1.1": 1,
          "FMT_SMF.1": 4,
          "FMT_SMF.1.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 7,
          "FPT_FLS.1.1": 1,
          "FPT_TST_EXT.1": 2,
          "FPT_TST_EXT.1.1": 1,
          "FPT_TST_EXT.1.2": 3,
          "FPT_TUD_EXT.1": 1,
          "FPT_TUD_EXT.1.3": 1
        },
        "FTA": {
          "FTA_SSL.3": 3,
          "FTA_SSL.3.1": 1,
          "FTA_TSE.1": 3,
          "FTA_TSE.1.1": 1,
          "FTA_VCM_EXT.1": 3,
          "FTA_VCM_EXT.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 2,
          "FTP_ITC.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 23,
          "IKEv1": 17,
          "IKEv2": 12
        },
        "IPsec": {
          "IPsec": 29
        },
        "SSH": {
          "SSH": 5
        },
        "TLS": {
          "TLS": {
            "TLS": 5
          }
        },
        "VPN": {
          "VPN": 70
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 4,
          "P-384": 6,
          "P-521": 6
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RBG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 186-3": 3,
          "FIPS PUB 186-3": 8,
          "FIPS PUB 197": 1
        },
        "NIST": {
          "NIST SP 800-38A": 1,
          "NIST SP 800-38B": 1,
          "NIST SP 800-38C": 1,
          "NIST SP 800-38D": 1,
          "NIST SP 800-38E": 1,
          "NIST SP 800-57": 2
        },
        "RFC": {
          "RFC 2460": 3,
          "RFC 2560": 1,
          "RFC 2986": 1,
          "RFC 3602": 1,
          "RFC 4106": 1,
          "RFC 4109": 1,
          "RFC 4301": 2,
          "RFC 4303": 1,
          "RFC 4304": 1,
          "RFC 4868": 2,
          "RFC 4945": 1,
          "RFC 5280": 1,
          "RFC 5282": 1,
          "RFC 5759": 1,
          "RFC 5996": 1,
          "RFC 6379": 1,
          "RFC 768": 3,
          "RFC 791": 3,
          "RFC 793": 3,
          "RFC792": 1
        },
        "X509": {
          "X.509": 6
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5,
            "AES-": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "pp_metadata": {
      "/Author": "James Donndelinger",
      "/CreationDate": "D:20130415102300Z",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20150417162625-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "NDPP Extended Package VPN Gateway",
      "pdf_file_size_bytes": 1236384,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.niap-ccevs.org/pp/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 51
    },
    "report_filename": "ep_vpn_gw_v1.1-vr.pdf",
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONNECTIONS": 1
        },
        "O": {
          "O.ADDRESS_FILTERING": 1,
          "O.ASSIGNED_PRIVATE_ADDRESS": 1,
          "O.AUTHENTICATION": 1,
          "O.CLIENT_ESTABLISHMENT_CONSTRAINTS": 1,
          "O.CRYPTOGRAPHIC_FUNCTIONS": 1,
          "O.FAIL_SECURE": 1,
          "O.PORT_FILTERING": 1,
          "O.REMOTE_SESSION_TERMINATION": 1
        },
        "OE": {
          "OE.CONNECTIONS": 1
        },
        "T": {
          "T.DATA_INTEGRITY": 1,
          "T.HIJACKED_SESSION": 1,
          "T.NETWORK_ACCESS": 1,
          "T.NETWORK_DISCLOSURE": 1,
          "T.NETWORK_MISUSE": 1,
          "T.REPLAY_ATTACK": 1,
          "T.TSF_FAILURE": 1,
          "T.UNAUTHORIZED_CONNECTION": 1,
          "T.UNPROTECTED_TRAFFIC": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CKM.1": 2,
          "FCS_COP.1": 2,
          "FCS_RBG_EXT": 1
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_PSK_EXT": 1
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_SMF": 1
        },
        "FPT": {
          "FPT_FLS": 1,
          "FPT_TUD_EXT": 1
        },
        "FTA": {
          "FTA_SSL": 1,
          "FTA_TSE": 1,
          "FTA_VCM_EXT": 1
        },
        "FTP": {
          "FTP_ITC": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          " written by the Leidos CCTL. Similarly, for materials covered by the Fortress evaluation that were out of scope of the Aruba Networks evaluation, the ETR produced by Leidos was referenced. Additional review of": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "VPN": {
          "VPN": 23
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Leidos": {
          "Leidos": 7
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 10,
          "Cisco Systems": 1,
          "Cisco Systems, Inc": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20150417144940-04\u002700\u0027",
      "/ModDate": "D:20150417162506-04\u002700\u0027",
      "pdf_file_size_bytes": 408267,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 11
    }
  },
  "state": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
    "pp": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "80d5b35bd6a05d7f234f97f81aeb04666ca4c0e08859872e862f2a99754f2434",
      "txt_hash": "7fb14e39c6819f63124406b4834fe4f4997fdf77ed1f7752d082a9fe69b6fa96"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "eae2e9847d6894984889a36d668f5b5765ecda6d13a811c0c2fbe1ff05ad07bf",
      "txt_hash": "477b04c6ddfc4b2ee324edb14be91aeae00993534b17c24f4d0d713fb1e60cc3"
    }
  },
  "web_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
    "category": "Boundary Protection Devices and Systems",
    "is_collaborative": false,
    "maintenances": [],
    "name": "Network Device Protection Profile Extended Package VPN Gateway",
    "not_valid_after": "2016-02-27",
    "not_valid_before": "2013-04-12",
    "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf",
    "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ep_vpn_gw_v1.1-vr.pdf",
    "scheme": "US",
    "security_level": {
      "_type": "Set",
      "elements": [
        "None"
      ]
    },
    "status": "archived",
    "version": "HTTP/1.1"
  }
}