This page was not yet optimized for use on mobile devices.
Protection Profile
Web information ?
Status: archivedCertification date: 2015-02-27
Archived date: 2022-01-11
Scheme: ❌
Category: Network and Network-Related Devices and Systems
Security level: None
Certification report ?
Profile ?
References ?
- 3eTI CyberFence 3e-636 Series archived
- ALE Omniswitch 6250, 6350, and 6450 with the AOS 6.7.1.79.R04 firmware and ALE Omniswitch 6860, 6865, 6900, 9900, and 10K with the AOS 8.3.1.348.R01 firmware (NDcPP) archived
- AhnLab MDS, MDS with MTA, and MDS Manager v2.1 archived
- Allied Telesis x930 Series Switches v5.4.6-1 archived
- Avaya VSP 4000, VSP 7000 and VSP 8000 archived
- Bivio 6110-NC and 6120-NC archived
- Bivio 6310-NC archived
- Black Lantern BL300-B2 and BL300-C2 (software version 1.5.2) archived
- Brocade Communication Systems, Inc. Directors and Switches operating with Fabric OS version 8.1.0 archived
- Ciena 8700 Packetwave Platform archived
- Cisco Adaptive Security Appliances and ASA Virtual Version 9.6 archived
- Cisco Aggregation Services Router (ASR) 1000 Series (ASR1K) archived
- Cisco Catalyst 2K/3K Wired Access Switches running IOS 15.2(4)E archived
- Cisco Catalyst 3K/4K Wired Access Switches running IOS-XE 3.8.0E archived
- Cisco Email Security Appliance 9.8 archived
- Cisco IM&P 11.5 SU3 archived
- Cisco ISE v2.0 archived
- Cisco IoT Industrial Ethernet and Connected Grid Switches running IOS 15.2(4)E archived
- Cisco Web Security Appliance 10.5 archived
- CounterACT version 7.0 archived
- Dell EMC Networking Switches running Dell EMC Networking OS v9.11 archived
- Evertz MMA10G-IPX archived
- F5 BIG-IP 12.1.3.4 for LTM+APM archived
- F5 BIG-IP 13.1.1 for LTM+APM archived
- FireEye CMS Series Hardware and Virtual Appliances: CM2500V, CM4500, CM7500, CM7500V, CM9500 archived
- FireEye EX Series Hardware and Virtual Appliances: EX3500, EX5500, EX8500 archived
- FireEye NX Series Hardware and Virtual Appliances: NX1500, NX1500V, NX2500, NX2500V, NX2550, NX2550V, NX3500, NX4500, NX4500V, NX5500, NX6500V, NX10450 archived
- FireEye VX Series Hardware Appliances: VX12500, VX5500 archived
- Fortinet Fortiweb 5.6 archived
- IBM QRadar Security Intelligence Platform 7.2.7 archived
- Ixia NTO 7303 and Vision ONE v4.5.0.29 archived
- Klas Voyager 1.0 archived
- MMA10G-EXE archived
- Magnum-SC-CC archived
- Motorola Network Router, S6000 and GGM 8000 with EOS version 16.9 archived
- NIKSUN NetOmni, software version 5.0.1.2 archived
- Palo Alto Networks PA-200 Series, PA-500, PA-800 Series, PA-3000 Series, PA-5000 Series, PA-5200 Series, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS v8.0.6 archived
- Pulse Connect Secure 8.2 on Virtual Appliance and Pulse Policy Secure 5.3 on Virtual Appliance archived
- Pulse Connect Secure v8.2 archived
- Pulse Policy Secure v5.3 archived
- Secusmart SecuSUITE SIP Server v1.0 archived
- SonicWall SonicOS Enhanced V6.2.5 with IPS on NSA, SM, and TZ Appliances archived
Updates ?
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection Profile was processed.
Raw data
{
"_id": "c7cf611c6bb1e4b0",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "c7cf611c6bb1e4b0",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "CPP_ND_V1.0.pdf",
"pp_keywords": null,
"pp_metadata": null,
"report_filename": "cpp_nd_v1.0-vr.pdf",
"report_keywords": null,
"report_metadata": null
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": false,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7",
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": false,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7",
"txt_hash": null
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Network and Network-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile",
"not_valid_after": "2022-01-11",
"not_valid_before": "2015-02-27",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/cpp_nd_v1.0-vr.pdf",
"scheme": null,
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "archived",
"version": "1.0"
}
}