Network Device Protection Profile Extended Package VPN Gateway

Web information ?

Status: archived
Certification date: 2013-04-12
Archived date: 2016-02-27
Scheme: 🇺🇸
Category: Boundary Protection Devices and Systems
Security level: None

Certification report ?

Extracted keywords

Protocols
IPsec, VPN

Vendor
Cisco, Cisco Systems, Cisco Systems, Inc

Claims
O.ADDRESS_FILTERING, O.AUTHENTICATION, O.CRYPTOGRAPHIC_FUNCTIONS, O.FAIL_SECURE, O.PORT_FILTERING, O.CLIENT_ESTABLISHMENT_CONSTRAINTS, O.REMOTE_SESSION_TERMINATION, O.ASSIGNED_PRIVATE_ADDRESS, T.NETWORK_DISCLOSURE, T.NETWORK_ACCESS, T.NETWORK_MISUSE, T.TSF_FAILURE, T.REPLAY_ATTACK, T.DATA_INTEGRITY, T.UNAUTHORIZED_CONNECTION, T.HIJACKED_SESSION, T.UNPROTECTED_TRAFFIC, A.CONNECTIONS, OE.CONNECTIONS
Security Assurance Requirements (SAR)
AVA_VAN.1, AVA_VAN, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.1
Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_COP.1, FCS_RBG_EXT, FIA_AFL, FIA_PSK_EXT, FMT_MOF, FMT_SMF, FPT_FLS, FPT_TUD_EXT, FTA_SSL, FTA_TSE, FTA_VCM_EXT, FTP_ITC
Evaluation facilities
Leidos

Certification process
out of scope, written by the Leidos CCTL. Similarly, for materials covered by the Fortress evaluation that were out of scope of the Aruba Networks evaluation, the ETR produced by Leidos was referenced. Additional review of

File metadata

Creation date D:20150417144940-04'00'
Modification date D:20150417162506-04'00'
Pages 11

Profile ?

Extracted keywords

Symmetric Algorithms
AES, AES-, HMAC
Asymmetric Algorithms
ECDSA, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-512
Protocols
SSH, TLS, IKE, IKEv1, IKEv2, IPsec, VPN
Randomness
RBG
Elliptic Curves
P-384, P-521, P-256
Block cipher modes
CBC, GCM

Claims
O.CRYPTOGRAPHIC_FUNCTIONS, O.AUTHENTICATION, O.ADDRESS_FILTERING, O.FAIL_SECURE, O.PORT_FILTERING, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.RELATED_CONNECTION_FILTERING, O.CLIENT_ESTABLISHMENT_CONSTRAINTS, O.REMOTE_SESSION_TERMINATION, O.ASSIGNED_PRIVATE_ADDRESS, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.DATA_INTEGRITY, T.REPLAY_ATTACK, T.TSF_FAILURE, T.UNAUTHORIZED_CONNECTION, T.HIJACKED_SESSION, A.CONNECTIONS, OE.CONNECTIONS
Security Assurance Requirements (SAR)
AVA_VAN.1
Security Functional Requirements (SFR)
FAU_GEN.1, FCS_CKM.1, FCS_COP.1, FCS_RBG_EXT.1, FCS_CKM.1.1, FCS_COP.1.1, FCS_RBG_EXT.1.1, FCS_CKM.1.2, FIA_AFL.1, FIA_PSK_EXT, FIA_PSK_EXT.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1.2, FIA_PSK_EXT.1.3, FIA_PSK_EXT.1.4, FMT_MOF.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1.1, FPT_FLS.1, FPT_TST_EXT.1.2, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_TUD_EXT.1.3, FPT_FLS.1.1, FPT_TST_EXT.1.1, FTA_SSL.3, FTA_TSE.1, FTA_VCM_EXT.1, FTA_SSL.3.1, FTA_TSE.1.1, FTA_VCM_EXT.1.1, FTP_ITC.1, FTP_ITC.1.1

Standards
FIPS PUB 197, FIPS PUB 186-3, FIPS 186-3, NIST SP 800-38D, NIST SP 800-38A, NIST SP 800-38B, NIST SP 800-38C, NIST SP 800-38E, NIST SP 800-57, RFC 4301, RFC 4303, RFC 4106, RFC 3602, RFC 4109, RFC 4304, RFC 4868, RFC 6379, RFC 5282, RFC 4945, RFC 791, RFC 2460, RFC 793, RFC 768, RFC792, RFC 5280, RFC 2986, RFC 2560, RFC 5759, RFC 5996, X.509

File metadata

Title NDPP Extended Package VPN Gateway
Author James Donndelinger
Creation date D:20130415102300Z
Modification date D:20150417162625-04'00'
Pages 51
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

References ?

Updates ?

  • 04.02.2025 The protection profile was first processed.
    New Protection Profile

    A new Protection Profile with the name Network Device Protection Profile Extended Package VPN Gateway was processed.

Raw data

{
  "_id": "bb67fb1b4f10e7a5",
  "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
  "dgst": "bb67fb1b4f10e7a5",
  "heuristics": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
  },
  "pdf_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
    "pp_filename": "pp_nd_vpn_gw_ep_v1.1.pdf",
    "pp_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 7
          }
        },
        "FF": {
          "DH": {
            "DH": 9,
            "Diffie-Hellman": 3
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONNECTIONS": 2
        },
        "O": {
          "O.ADDRESS_FILTERING": 5,
          "O.ASSIGNED_PRIVATE_ADDRESS": 1,
          "O.AUTHENTICATION": 2,
          "O.CLIENT_ESTABLISHMENT_CONSTRAINTS": 1,
          "O.CRYPTOGRAPHIC_FUNCTIONS": 4,
          "O.FAIL_SECURE": 3,
          "O.PORT_FILTERING": 5,
          "O.RELATED_CONNECTION_FILTERING": 1,
          "O.REMOTE_SESSION_TERMINATION": 1,
          "O.SYSTEM_MONITORING": 3,
          "O.TOE_ADMINISTRATION": 2
        },
        "OE": {
          "OE.CONNECTIONS": 2
        },
        "T": {
          "T.DATA_INTEGRITY": 3,
          "T.HIJACKED_SESSION": 1,
          "T.NETWORK_DISCLOSURE": 3,
          "T.NETWORK_MISUSE": 3,
          "T.REPLAY_ATTACK": 3,
          "T.TSF_FAILURE": 2,
          "T.UNAUTHORIZED_CONNECTION": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "AVA": {
          "AVA_VAN.1": 2
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 6
        },
        "FCS": {
          "FCS_CKM.1": 6,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.1.2": 2,
          "FCS_COP.1": 8,
          "FCS_COP.1.1": 3,
          "FCS_RBG_EXT.1": 5,
          "FCS_RBG_EXT.1.1": 1
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_PSK_EXT": 2,
          "FIA_PSK_EXT.1": 2,
          "FIA_PSK_EXT.1.1": 1,
          "FIA_PSK_EXT.1.2": 2,
          "FIA_PSK_EXT.1.3": 2,
          "FIA_PSK_EXT.1.4": 1
        },
        "FMT": {
          "FMT_MOF.1": 2,
          "FMT_MOF.1.1": 1,
          "FMT_SMF.1": 4,
          "FMT_SMF.1.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 7,
          "FPT_FLS.1.1": 1,
          "FPT_TST_EXT.1": 2,
          "FPT_TST_EXT.1.1": 1,
          "FPT_TST_EXT.1.2": 3,
          "FPT_TUD_EXT.1": 1,
          "FPT_TUD_EXT.1.3": 1
        },
        "FTA": {
          "FTA_SSL.3": 3,
          "FTA_SSL.3.1": 1,
          "FTA_TSE.1": 3,
          "FTA_TSE.1.1": 1,
          "FTA_VCM_EXT.1": 3,
          "FTA_VCM_EXT.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 2,
          "FTP_ITC.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 23,
          "IKEv1": 17,
          "IKEv2": 12
        },
        "IPsec": {
          "IPsec": 29
        },
        "SSH": {
          "SSH": 5
        },
        "TLS": {
          "TLS": {
            "TLS": 5
          }
        },
        "VPN": {
          "VPN": 70
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 4,
          "P-384": 6,
          "P-521": 6
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RBG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 186-3": 3,
          "FIPS PUB 186-3": 8,
          "FIPS PUB 197": 1
        },
        "NIST": {
          "NIST SP 800-38A": 1,
          "NIST SP 800-38B": 1,
          "NIST SP 800-38C": 1,
          "NIST SP 800-38D": 1,
          "NIST SP 800-38E": 1,
          "NIST SP 800-57": 2
        },
        "RFC": {
          "RFC 2460": 3,
          "RFC 2560": 1,
          "RFC 2986": 1,
          "RFC 3602": 1,
          "RFC 4106": 1,
          "RFC 4109": 1,
          "RFC 4301": 2,
          "RFC 4303": 1,
          "RFC 4304": 1,
          "RFC 4868": 2,
          "RFC 4945": 1,
          "RFC 5280": 1,
          "RFC 5282": 1,
          "RFC 5759": 1,
          "RFC 5996": 1,
          "RFC 6379": 1,
          "RFC 768": 3,
          "RFC 791": 3,
          "RFC 793": 3,
          "RFC792": 1
        },
        "X509": {
          "X.509": 6
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5,
            "AES-": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "pp_metadata": {
      "/Author": "James Donndelinger",
      "/CreationDate": "D:20130415102300Z",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20150417162625-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "NDPP Extended Package VPN Gateway",
      "pdf_file_size_bytes": 1236384,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.niap-ccevs.org/pp/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 51
    },
    "report_filename": "ep_vpn_gw_v1.1-vr.pdf",
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONNECTIONS": 1
        },
        "O": {
          "O.ADDRESS_FILTERING": 1,
          "O.ASSIGNED_PRIVATE_ADDRESS": 1,
          "O.AUTHENTICATION": 1,
          "O.CLIENT_ESTABLISHMENT_CONSTRAINTS": 1,
          "O.CRYPTOGRAPHIC_FUNCTIONS": 1,
          "O.FAIL_SECURE": 1,
          "O.PORT_FILTERING": 1,
          "O.REMOTE_SESSION_TERMINATION": 1
        },
        "OE": {
          "OE.CONNECTIONS": 1
        },
        "T": {
          "T.DATA_INTEGRITY": 1,
          "T.HIJACKED_SESSION": 1,
          "T.NETWORK_ACCESS": 1,
          "T.NETWORK_DISCLOSURE": 1,
          "T.NETWORK_MISUSE": 1,
          "T.REPLAY_ATTACK": 1,
          "T.TSF_FAILURE": 1,
          "T.UNAUTHORIZED_CONNECTION": 1,
          "T.UNPROTECTED_TRAFFIC": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CKM.1": 2,
          "FCS_COP.1": 2,
          "FCS_RBG_EXT": 1
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_PSK_EXT": 1
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_SMF": 1
        },
        "FPT": {
          "FPT_FLS": 1,
          "FPT_TUD_EXT": 1
        },
        "FTA": {
          "FTA_SSL": 1,
          "FTA_TSE": 1,
          "FTA_VCM_EXT": 1
        },
        "FTP": {
          "FTP_ITC": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          " written by the Leidos CCTL. Similarly, for materials covered by the Fortress evaluation that were out of scope of the Aruba Networks evaluation, the ETR produced by Leidos was referenced. Additional review of": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "VPN": {
          "VPN": 23
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Leidos": {
          "Leidos": 7
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 10,
          "Cisco Systems": 1,
          "Cisco Systems, Inc": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20150417144940-04\u002700\u0027",
      "/ModDate": "D:20150417162506-04\u002700\u0027",
      "pdf_file_size_bytes": 408267,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 11
    }
  },
  "state": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
    "pp": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "80d5b35bd6a05d7f234f97f81aeb04666ca4c0e08859872e862f2a99754f2434",
      "txt_hash": "7fb14e39c6819f63124406b4834fe4f4997fdf77ed1f7752d082a9fe69b6fa96"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "eae2e9847d6894984889a36d668f5b5765ecda6d13a811c0c2fbe1ff05ad07bf",
      "txt_hash": "477b04c6ddfc4b2ee324edb14be91aeae00993534b17c24f4d0d713fb1e60cc3"
    }
  },
  "web_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
    "category": "Boundary Protection Devices and Systems",
    "is_collaborative": false,
    "maintenances": [],
    "name": "Network Device Protection Profile Extended Package VPN Gateway",
    "not_valid_after": "2016-02-27",
    "not_valid_before": "2013-04-12",
    "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf",
    "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ep_vpn_gw_v1.1-vr.pdf",
    "scheme": "US",
    "security_level": {
      "_type": "Set",
      "elements": [
        "None"
      ]
    },
    "status": "archived",
    "version": "HTTP/1.1"
  }
}