This page was not yet optimized for use on mobile
devices.
Protection Profile
Web information
| Status | archived |
|---|---|
| Valid from | 27.09.2019 |
| Valid until | 27.09.2020 |
| Scheme | ❌ None |
| Category | Boundary Protection Devices and Systems |
| Security level | None |
Certification report
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
ECDSA, DSAProtocols
SSH, TLS, DTLS, IPsec, VPNBlock cipher modes
CBC, CTR, GCMClaims
O.RESIDUAL_INFORMATION, O.STATEFUL_TRAFFIC_FILTERING, T.UNAUTHORIZED_ADMINISTRATOR_ACCESS, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_COMMUNICATION_CHANNELS, T.WEAK_AUTHENTICATION_ENDPOINTS, T.UPDATE_COMPROMISE, T.UNDETECTED_ACTIVITY, T.SECURITY_FUNCTIONALITY_COMPROMISE, T.PASSWORD_CRACKING, T.SECURITY_FUNCTIONALITY_FAILURE, T.NETWORK_DISCLOSURE, T.NETWORK_ACCESS, T.NETWORK_MISUSE, T.MALICIOUS_TRAFFIC, A.PHYSICAL_PROTECTION, A.LIMITED_FUNCTIONALITY, A.NO_THRU_TRAFFIC_PROTECTION, A.TRUSTED_ADMINISTRATOR, A.REGULAR_UPDATES, A.ADMIN_CREDENTIALS_SECURE, A.COMPONENTS_RUNNING, A.RESIDUAL_INFORMATION, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.NO_THRU_TRAFFIC_PROTECTION, OE.TRUSTED_ADMIN, OE.UPDATES, OE.ADMIN_CREDENTIALS_SECURE, OE.COMPONENTS_RUNNING, OE.RESIDUAL_INFORMATIONSecurity Assurance Requirements (SAR)
ACE_INT.1, ACE_CCL.1, ACE_SPD.1, ACE_OBJ.1, ACE_ECD.1, ACE_REQ.1, ACE_MCO.1, ACE_CCO.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, APE_INT.1, APE_SPD.1, APE_OBJ.2, ASE_OBJ.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2.1, FAU_STG_EXT.1, FAU_STG.1, FAU_STG_EXT.2, FAU_STG.3, FAU_GEN_EXT.1.1, FAU_STG_EXT, FCO_CPC_EXT.1, FCS_CKM, FCS_COP.1, FCS_RBG_EXT.1, FCS_NTP_EXT.1, FCS_SSHC_EXT.1, FCS_SSHS_EXT.1, FCS_TLSC_EXT, FCS_TLSS_EXT, FDP_RIP.2.1, FIA_AFL.1, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1, FIA_UAU_EXT.2.1, FIA_UAU.7.1, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1.1, FMT_SMF.1, FMT_SMR.2, FPT_SKP_EXT.1.1, FPT_APW_EXT.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1, FPT_STM_EXT.1, FPT_ITT.1.1, FPT_TST_EXT.2.1, FPT_TUD_EXT.2, FTA_SSL_EXT.1.1, FTA_SSL, FTA_TAB.1.1, FTP_ITC.1, FTP_TRP.1Evaluation facilities
Teron LabsCertification process
out of scope, Only necessary services NDcPP S5.1.2 OE.NO_THRU_TRAFFIC_PROTECTION Traversing traffic out of scope NDcPP S5.1.3 OE.TRUSTED_ADMIN Follow guidance, monitor certs NDcPP S5.1.4 OE.UPDATES FirmwareStandards
RFC 2818, RFC 4301, X.509File metadata
| Creation date | D:20201208171923+11'00' |
|---|---|
| Modification date | D:20201208171923+11'00' |
| Pages | 19 |
Protection Profile
Extracted keywords
Claims
O.RESIDUAL_INFORMATION, O.STATEFUL_TRAFFIC_FILTERING, T.NETWORK_DISCLOSURE, T.NETWORK_ACCESS, T.NETWORK_MISUSE, T.MALICIOUS_TRAFFIC, A.NO_THRU_TRAFFIC_PROTECTION, A.PHYSICAL_PROTECTION, A.LIMITED_FUNCTIONALITY, A.TRUSTED_ADMINISTRATOR, A.REGULAR_UPDATES, A.ADMIN_CREDENTIALS_SECURE, A.COMPONENTS_RUNNING, A.RESIDUAL_INFORMATION, OE.NO_THRU_TRAFFIC_PROTECTION, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.TRUSTED_ADMIN, OE.UPDATES, OE.ADMIN_CREDENTIALS_SECURE, OE.COMPONENTS_RUNNING, OE.RESIDUAL_INFORMATIONSecurity Assurance Requirements (SAR)
AVA_VAN.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FDP_RIP, FDP_RIP.2, FDP_RIP.2.1, FMT_SMF, FMT_SMF.1, FMT_SMF.1.1Standards
RFC 2460, RFC 5735, RFC 3513, RFC 793, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Creation date | D:20191008210650+02'00' |
|---|---|
| Modification date | D:20191008210650+02'00' |
| Pages | 41 |
| Creator | Microsoft® Word 2019 |
| Producer | Microsoft® Word 2019 |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- Aruba Mobility Controller with ArubaOS 8.6 archived
- Cisco ASA 9.12 running on Firepower 4100 and 9300 Security Appliances archived
- Cisco Adaptive Security Appliances (ASA) 5500, Industrial Security Appliances (ISA) 3000 and Adaptive Security Appliances Virtual (ASAv) Version 9.12 archived
- Cisco Adaptive Security Appliances (ASA) 9.12 running on Firepower 2100 Series Appliances archived
- Juniper Junos OS 20.2R1 for SRX345, SRX345-DUAL-AC, SRX380 and SRX1500 active
- Junos OS 20.4R1 for SRX345, SRX345-DUAL-AC and SRX380 in Cluster Mode active
- PacStar 451/453/455 Series with Cisco ASAv 9.12 archived
- Palo Alto Networks PA-220 Series, PA-800 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 9.0 archived
- WatchGuard Fireware OS v12.6.2 on Firebox NGFWs archived
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "cf18fa171ef6e928",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "cf18fa171ef6e928",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "MOD_CPP_FW_v1.3.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_SECURE": 2,
"A.COMPONENTS_RUNNING": 2,
"A.LIMITED_FUNCTIONALITY": 2,
"A.NO_THRU_TRAFFIC_PROTECTION": 2,
"A.PHYSICAL_PROTECTION": 2,
"A.REGULAR_UPDATES": 2,
"A.RESIDUAL_INFORMATION": 2,
"A.TRUSTED_ADMINISTRATOR": 2
},
"O": {
"O.RESIDUAL_INFORMATION": 6,
"O.STATEFUL_TRAFFIC_FILTERING": 11
},
"OE": {
"OE.ADMIN_CREDENTIALS_SECURE": 2,
"OE.COMPONENTS_RUNNING": 2,
"OE.NO_GENERAL_PURPOSE": 2,
"OE.NO_THRU_TRAFFIC_PROTECTION": 1,
"OE.PHYSICAL": 2,
"OE.RESIDUAL_INFORMATION": 2,
"OE.TRUSTED_ADMIN": 2,
"OE.UPDATES": 2
},
"T": {
"T.MALICIOUS_TRAFFIC": 4,
"T.NETWORK_ACCESS": 4,
"T.NETWORK_DISCLOSURE": 4,
"T.NETWORK_MISUSE": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ASE": {
"ASE_TSS.1": 2
},
"AVA": {
"AVA_VAN.1": 2
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4,
"FAU_GEN.1": 3
},
"FDP": {
"FDP_RIP": 2,
"FDP_RIP.2": 12,
"FDP_RIP.2.1": 1
},
"FMT": {
"FMT_SMF": 14,
"FMT_SMF.1": 3,
"FMT_SMF.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"RFC": {
"RFC 2460": 1,
"RFC 3513": 1,
"RFC 5735": 1,
"RFC 793": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20191008210650+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/ModDate": "D:20191008210650+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"pdf_file_size_bytes": 573399,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 41
},
"report_filename": "ACSC_Certification_Report_T020_NDcPP_FW-MOD_V1.1.pdf",
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_SECURE": 1,
"A.COMPONENTS_RUNNING": 1,
"A.LIMITED_FUNCTIONALITY": 1,
"A.NO_THRU_TRAFFIC_PROTECTION": 2,
"A.PHYSICAL_PROTECTION": 1,
"A.REGULAR_UPDATES": 1,
"A.RESIDUAL_INFORMATION": 1,
"A.TRUSTED_ADMINISTRATOR": 1
},
"O": {
"O.RESIDUAL_INFORMATION": 2,
"O.STATEFUL_TRAFFIC_FILTERING": 1
},
"OE": {
"OE.ADMIN_CREDENTIALS_SECURE": 1,
"OE.COMPONENTS_RUNNING": 1,
"OE.NO_GENERAL_PURPOSE": 1,
"OE.NO_THRU_TRAFFIC_PROTECTION": 2,
"OE.PHYSICAL": 1,
"OE.RESIDUAL_INFORMATION": 2,
"OE.TRUSTED_ADMIN": 1,
"OE.UPDATES": 1
},
"T": {
"T.MALICIOUS_TRAFFIC": 1,
"T.NETWORK_ACCESS": 1,
"T.NETWORK_DISCLOSURE": 1,
"T.NETWORK_MISUSE": 1,
"T.PASSWORD_CRACKING": 1,
"T.SECURITY_FUNCTIONALITY_COMPROMISE": 1,
"T.SECURITY_FUNCTIONALITY_FAILURE": 1,
"T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1,
"T.UNDETECTED_ACTIVITY": 1,
"T.UNTRUSTED_COMMUNICATION_CHANNELS": 1,
"T.UPDATE_COMPROMISE": 1,
"T.WEAK_AUTHENTICATION_ENDPOINTS": 1,
"T.WEAK_CRYPTOGRAPHY": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACE": {
"ACE_CCL.1": 1,
"ACE_CCO.1": 1,
"ACE_ECD.1": 2,
"ACE_INT.1": 2,
"ACE_MCO.1": 4,
"ACE_OBJ.1": 3,
"ACE_REQ.1": 2,
"ACE_SPD.1": 3
},
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1
},
"APE": {
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 4,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 2
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 2,
"FAU_GEN.2.1": 1,
"FAU_GEN_EXT.1.1": 1,
"FAU_STG.1": 1,
"FAU_STG.3": 1,
"FAU_STG_EXT": 1,
"FAU_STG_EXT.1": 1,
"FAU_STG_EXT.2": 1
},
"FCO": {
"FCO_CPC_EXT.1": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_COP.1": 4,
"FCS_NTP_EXT.1": 1,
"FCS_RBG_EXT.1": 1,
"FCS_SSHC_EXT.1": 1,
"FCS_SSHS_EXT.1": 1,
"FCS_TLSC_EXT": 1,
"FCS_TLSS_EXT": 1
},
"FDP": {
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_PMG_EXT.1.1": 1,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT.2.1": 1,
"FIA_UIA_EXT.1": 1
},
"FMT": {
"FMT_MOF.1": 2,
"FMT_MTD.1": 2,
"FMT_SMF.1": 1,
"FMT_SMF.1.1": 1,
"FMT_SMR.2": 1
},
"FPT": {
"FPT_APW_EXT.1": 1,
"FPT_ITT.1.1": 1,
"FPT_SKP_EXT.1.1": 1,
"FPT_STM_EXT.1": 1,
"FPT_TST_EXT.1.1": 1,
"FPT_TST_EXT.2.1": 1,
"FPT_TUD_EXT.1": 1,
"FPT_TUD_EXT.2": 1
},
"FTA": {
"FTA_SSL": 1,
"FTA_SSL_EXT.1.1": 1,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC.1": 1,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"Only necessary services NDcPP S5.1.2 OE.NO_THRU_TRAFFIC_PROTECTION Traversing traffic out of scope NDcPP S5.1.3 OE.TRUSTED_ADMIN Follow guidance, monitor certs NDcPP S5.1.4 OE.UPDATES Firmware": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"CTR": {
"CTR": 1
},
"GCM": {
"GCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"SSH": {
"SSH": 3
},
"TLS": {
"DTLS": {
"DTLS": 3
},
"TLS": {
"TLS": 4
}
},
"VPN": {
"VPN": 8
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Teron": {
"Teron Labs": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 2818": 1,
"RFC 4301": 1
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20201208171923+11\u002700\u0027",
"/ModDate": "D:20201208171923+11\u002700\u0027",
"pdf_file_size_bytes": 3802418,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.cyber.gov.au/ism",
"https://www.nzism.gcsb.govt.nz/ism-document/",
"https://www.cyber.gov.au/publications/aisep-policy-manual"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 19
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b5844364548539a01580ef284c8e885645638f71f7797b6b7d9ab4d09551f2ce",
"txt_hash": "0a71ce49ea6324b822dc92caccc38e0071fa194f961fe980d496885f17da2a00"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2dfbe42714e4d8869f88e181b07d4764598ad733f684c07e7ffa8c5f40a403bf",
"txt_hash": "2fed3749d0e52305cadb104da721f5f549965fd77e9a39530dbae159f3826055"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Boundary Protection Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile",
"not_valid_after": "2020-09-27",
"not_valid_before": "2019-09-27",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.3.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ACSC_Certification_Report_T020_NDcPP_FW-MOD_V1.1.pdf",
"scheme": null,
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "archived",
"version": "1.3"
}
}