This page was not yet optimized for use on mobile
devices.
collaborative Protection Profile Module for Stateful Traffic Filter Firewalls v1.4 + Errata 20200625
Web information
| Status | active |
|---|---|
| Valid from | 25.06.2020 |
| Scheme | ❌ None |
| Category | Boundary Protection Devices and Systems |
| Security level | None |
Certification report
Extracted keywords
Security Assurance Requirements (SAR)
ACE_INT.1, ACE_CCL.1, ACE_SPD.1, ACE_OBJ.1, ACE_ECD.1, ACE_REQ.1, ACE_MCO.1, ACE_CCO.1, APE_INT.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2Certificates
CSEC 2020017, CSEC2020017Evaluation facilities
atsecStandards
ISO/IEC 17025, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Title | Certification Report - PP-Configuration ND/FW |
|---|---|
| Subject | 20FMV3531-13:1 |
| Author | Jerry Johansson |
| Creation date | D:20210205165533+01'00' |
| Modification date | D:20210207205309+01'00' |
| Pages | 10 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Protection Profile
Extracted keywords
Claims
O.RESIDUAL_INFORMATION, O.STATEFUL_TRAFFIC_FILTERING, T.NETWORK_DISCLOSURE, T.NETWORK_ACCESS, T.NETWORK_MISUSE, T.MALICIOUS_TRAFFIC, A.NO_THRU_TRAFFIC_PROTECTION, A.PHYSICAL_PROTECTION, A.LIMITED_FUNCTIONALITY, A.TRUSTED_ADMINISTRATOR, A.REGULAR_UPDATES, A.ADMIN_CREDENTIALS_SECURE, A.COMPONENTS_RUNNING, A.RESIDUAL_INFORMATION, OE.NO_THRU_TRAFFIC_PROTECTION, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.TRUSTED_ADMIN, OE.UPDATES, OE.ADMIN_CREDENTIALS_SECURE, OE.COMPONENTS_RUNNING, OE.RESIDUAL_INFORMATIONSecurity Assurance Requirements (SAR)
AVA_VAN.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FDP_RIP, FDP_RIP.2, FDP_RIP.2.1, FMT_SMF, FMT_SMF.1, FMT_SMF.1.1Standards
RFC 2460, RFC 5735, RFC 3513, RFC 793, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Title | Microsoft Word - MOD_CPP_FW_v1.4e.docx |
|---|---|
| Creation date | D:20200701144758Z00'00' |
| Modification date | D:20200701144758Z00'00' |
| Pages | 41 |
| Creator | Word |
| Producer | macOS Version 10.15.4 (Build 19E287) Quartz PDFContext |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- Berryville Holdings, LLC Warden v1.2 active
- Check Point Software Technologies Ltd. Security Gateway and Maestro Hyperscale Appliances R81.00 archived
- Cisco ASA 9.16 on Firepower 4100 and 9300 Security Appliances archived
- Cisco ASA 9.20 on Cisco Secure Firewall 3100 Series active
- Cisco ASA 9.20 on Cisco Secure Firewall 4200 Series active
- Cisco ASA 9.20 on Firepower 1000 Series active
- Cisco ASA 9.20 on Firepower 2100 Series active
- Cisco ASA 9.20 on Firepower 4100 and 9300 Security Appliances active
- Cisco Adaptive Security Appliances (ASA) 5500-X, Industrial Security Appliances (ISA) 3000 and Adaptive Security Appliances Virtual (ASAv) Version 9.16 archived
- Cisco Adaptive Security Appliances (ASA) 9.16 on Firepower 1000 and 2100 Series archived
- Cisco FTD (NGFW) 6.4 on Firepower 4100 and 9300 Series with FMC/FMCv archived
- Cisco FTD (NGFW) 7.0 on ASA 5500 and ISA 3000 and FTDv with FMC/FMCv archived
- Cisco FTD (NGFW) 7.0 on Firepower 1000 and 2100 Series with FMC/FMCv archived
- Cisco FTD (NGFW) 7.0 on Firepower 4100 and 9300 Series with FMC/FMCv archived
- Cisco FTD 7.4 on Cisco Secure Firewall 3100 Series with FMC/FMCv active
- Cisco FTD 7.4 on Cisco Secure Firewall 4200 Series with FMC/FMCv active
- Cisco FTD 7.4 on Firepower 1000 Series with FMC/FMCv active
- Cisco FTD 7.4 on Firepower 2100 Series with FMC/FMCv active
- Cisco FTD 7.4 on Firepower 4100 and 9300 Series with FMC/FMCv active
- Cisco Secure Firewall ASA Virtual 9.20 active
- Cisco Secure Firewall Threat Defense Virtual 7.4 with FMC/FMCv active
- F5 BIG-IP 17.1.0.1 including AFM active
- Forcepoint NGFW 6.10 archived
- Forcepoint NGFW 6.10.9 archived
- FortiGate/FortiOS 6.4 archived
- FortiGate/FortiOS 7.2 active
- FortiGate/FortiOS Version 6.2.7 active
- Fortinet FortiGate/FortiOS 7.0 active
- HPE Aruba Networking Orchestrator and EdgeConnect Release 9.4.2 active
- ID Technologies GoSilent Cube + GoSilent Server v25.01 archived
- Juniper Junos OS 23.4R1 for SRX1600 active
- Juniper NFX series Network Services Platform with Junos OS 23.4R1 active
- Juniper SSR Software v6.2.5-5r2 on Juniper SSR120, SSR130, SSR1200, SSR1300, SSR1400 and SSR1500 active
- Juniper vSRX3.0 with Junos OS 22.2R2 active
- Junos OS 20.3R3 for NFX350 archived
- Junos OS 22.2R1 for SRX Series active
- Junos OS 22.2R1 for SRX380 active
- KlasOS Keel 5.4.0 active
- Palo Alto Networks PA-220 Series, PA-400 Series, PA-800 Series, PA-3200 Series, PA-5200 Series, PA-5450, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 10.1 archived
- Quantum Force R81.20 active
- SonicWall SonicOS/X v7.0.1 with VPN and IPS on NSsp 15700 active
- Sonicwall SonicOS/X v7.0.1 with VPN and IPS on TZ, NSa, NSsp, and NSv Appliances active
- Versa Networks Versa Secure SD-WAN Versa Operating System (VOS) 22.1 running on CSG1500, CSG2500, CSG3500, CSG5000, Dell PowerEdge R7515, and Dell VEP4600, Versa Director 22.1, and Versa Analytics 22.1 active
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "bde3d7587cf42e78",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "bde3d7587cf42e78",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "MOD_CPP_FW_v1.4e.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_SECURE": 2,
"A.COMPONENTS_RUNNING": 2,
"A.LIMITED_FUNCTIONALITY": 2,
"A.NO_THRU_TRAFFIC_PROTECTION": 2,
"A.PHYSICAL_PROTECTION": 2,
"A.REGULAR_UPDATES": 2,
"A.RESIDUAL_INFORMATION": 2,
"A.TRUSTED_ADMINISTRATOR": 2
},
"O": {
"O.RESIDUAL_INFORMATION": 6,
"O.STATEFUL_TRAFFIC_FILTERING": 11
},
"OE": {
"OE.ADMIN_CREDENTIALS_SECURE": 2,
"OE.COMPONENTS_RUNNING": 2,
"OE.NO_GENERAL_PURPOSE": 2,
"OE.NO_THRU_TRAFFIC_PROTECTION": 1,
"OE.PHYSICAL": 2,
"OE.RESIDUAL_INFORMATION": 2,
"OE.TRUSTED_ADMIN": 2,
"OE.UPDATES": 2
},
"T": {
"T.MALICIOUS_TRAFFIC": 4,
"T.NETWORK_ACCESS": 4,
"T.NETWORK_DISCLOSURE": 4,
"T.NETWORK_MISUSE": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ASE": {
"ASE_TSS.1": 2
},
"AVA": {
"AVA_VAN.1": 2
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4,
"FAU_GEN.1": 3
},
"FDP": {
"FDP_RIP": 2,
"FDP_RIP.2": 12,
"FDP_RIP.2.1": 1
},
"FMT": {
"FMT_SMF": 14,
"FMT_SMF.1": 3,
"FMT_SMF.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"RFC": {
"RFC 2460": 1,
"RFC 3513": 1,
"RFC 5735": 1,
"RFC 793": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20200701144758Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20200701144758Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.4 (Build 19E287) Quartz PDFContext",
"/Title": "Microsoft Word - MOD_CPP_FW_v1.4e.docx",
"pdf_file_size_bytes": 438498,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 41
},
"report_filename": "certification-report---protection-profile-configuration-for-network.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"SE": {
"CSEC 2020017": 10,
"CSEC2020017": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ACE": {
"ACE_CCL.1": 1,
"ACE_CCO.1": 1,
"ACE_ECD.1": 1,
"ACE_INT.1": 1,
"ACE_MCO.1": 1,
"ACE_OBJ.1": 1,
"ACE_REQ.1": 1,
"ACE_SPD.1": 1
},
"APE": {
"APE_ECD.1": 3,
"APE_INT.1": 3,
"APE_OBJ.2": 3,
"APE_REQ.2": 3,
"APE_SPD.1": 3
}
},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Jerry Johansson",
"/CreationDate": "D:20210205165533+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20210207205309+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "20FMV3531-13:1",
"/Title": "Certification Report - PP-Configuration ND/FW",
"pdf_file_size_bytes": 361340,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 10
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "94e4cb18cae92d08899e51d7d7f2c01a86da4f2d8b77fc19659facdebcb9aa6e",
"txt_hash": "54ea19d4b283d56a1565c7f4b86c27c62954dd1f2cf30f8439ec39bc7a80a1d8"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "5b7393353c92c0649638ea05d3a83b46fb27798e2f8e551206442af2c0990a07",
"txt_hash": "c8601e4b4598c83bf4623f3faf37d7edfb8ed4c4380e12ec5f262ad6e849cfea"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Boundary Protection Devices and Systems",
"is_collaborative": true,
"maintenances": [],
"name": "collaborative Protection Profile Module for Stateful Traffic Filter Firewalls v1.4 + Errata 20200625",
"not_valid_after": null,
"not_valid_before": "2020-06-25",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.4e.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/certification-report---protection-profile-configuration-for-network.pdf",
"scheme": null,
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "active",
"version": "1.4E"
}
}