This page was not yet optimized for use on mobile devices.
Protection Profile
Web information ?
Status: archivedCertification date: 2019-09-27
Archived date: 2020-09-27
Scheme: ❌
Category: Boundary Protection Devices and Systems
Security level: None
Certification report ?
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
ECDSA, DSAProtocols
SSH, TLS, DTLS, IPsec, VPNBlock cipher modes
CBC, CTR, GCMClaims
O.RESIDUAL_INFORMATION, O.STATEFUL_TRAFFIC_FILTERING, T.UNAUTHORIZED_ADMINISTRATOR_ACCESS, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_COMMUNICATION_CHANNELS, T.WEAK_AUTHENTICATION_ENDPOINTS, T.UPDATE_COMPROMISE, T.UNDETECTED_ACTIVITY, T.SECURITY_FUNCTIONALITY_COMPROMISE, T.PASSWORD_CRACKING, T.SECURITY_FUNCTIONALITY_FAILURE, T.NETWORK_DISCLOSURE, T.NETWORK_ACCESS, T.NETWORK_MISUSE, T.MALICIOUS_TRAFFIC, A.PHYSICAL_PROTECTION, A.LIMITED_FUNCTIONALITY, A.NO_THRU_TRAFFIC_PROTECTION, A.TRUSTED_ADMINISTRATOR, A.REGULAR_UPDATES, A.ADMIN_CREDENTIALS_SECURE, A.COMPONENTS_RUNNING, A.RESIDUAL_INFORMATION, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.NO_THRU_TRAFFIC_PROTECTION, OE.TRUSTED_ADMIN, OE.UPDATES, OE.ADMIN_CREDENTIALS_SECURE, OE.COMPONENTS_RUNNING, OE.RESIDUAL_INFORMATIONSecurity Assurance Requirements (SAR)
ACE_INT.1, ACE_CCL.1, ACE_SPD.1, ACE_OBJ.1, ACE_ECD.1, ACE_REQ.1, ACE_MCO.1, ACE_CCO.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, APE_INT.1, APE_SPD.1, APE_OBJ.2, ASE_OBJ.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2.1, FAU_STG_EXT.1, FAU_STG.1, FAU_STG_EXT.2, FAU_STG.3, FAU_GEN_EXT.1.1, FAU_STG_EXT, FCO_CPC_EXT.1, FCS_CKM, FCS_COP.1, FCS_RBG_EXT.1, FCS_NTP_EXT.1, FCS_SSHC_EXT.1, FCS_SSHS_EXT.1, FCS_TLSC_EXT, FCS_TLSS_EXT, FDP_RIP.2.1, FIA_AFL.1, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1, FIA_UAU_EXT.2.1, FIA_UAU.7.1, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1.1, FMT_SMF.1, FMT_SMR.2, FPT_SKP_EXT.1.1, FPT_APW_EXT.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1, FPT_STM_EXT.1, FPT_ITT.1.1, FPT_TST_EXT.2.1, FPT_TUD_EXT.2, FTA_SSL_EXT.1.1, FTA_SSL, FTA_TAB.1.1, FTP_ITC.1, FTP_TRP.1Evaluation facilities
Teron LabsCertification process
out of scope, Only necessary services NDcPP S5.1.2 OE.NO_THRU_TRAFFIC_PROTECTION Traversing traffic out of scope NDcPP S5.1.3 OE.TRUSTED_ADMIN Follow guidance, monitor certs NDcPP S5.1.4 OE.UPDATES FirmwareStandards
RFC 2818, RFC 4301, X.509File metadata
Creation date | D:20201208171923+11'00' |
---|---|
Modification date | D:20201208171923+11'00' |
Pages | 19 |
Profile ?
Extracted keywords
Claims
O.RESIDUAL_INFORMATION, O.STATEFUL_TRAFFIC_FILTERING, T.NETWORK_DISCLOSURE, T.NETWORK_ACCESS, T.NETWORK_MISUSE, T.MALICIOUS_TRAFFIC, A.NO_THRU_TRAFFIC_PROTECTION, A.PHYSICAL_PROTECTION, A.LIMITED_FUNCTIONALITY, A.TRUSTED_ADMINISTRATOR, A.REGULAR_UPDATES, A.ADMIN_CREDENTIALS_SECURE, A.COMPONENTS_RUNNING, A.RESIDUAL_INFORMATION, OE.NO_THRU_TRAFFIC_PROTECTION, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.TRUSTED_ADMIN, OE.UPDATES, OE.ADMIN_CREDENTIALS_SECURE, OE.COMPONENTS_RUNNING, OE.RESIDUAL_INFORMATIONSecurity Assurance Requirements (SAR)
AVA_VAN.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FDP_RIP, FDP_RIP.2, FDP_RIP.2.1, FMT_SMF, FMT_SMF.1, FMT_SMF.1.1Standards
RFC 2460, RFC 5735, RFC 3513, RFC 793, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Creation date | D:20191008210650+02'00' |
---|---|
Modification date | D:20191008210650+02'00' |
Pages | 41 |
Creator | Microsoft® Word 2019 |
Producer | Microsoft® Word 2019 |
References ?
- Aruba Mobility Controller with ArubaOS 8.6 archived
- Cisco ASA 9.12 running on Firepower 4100 and 9300 Security Appliances archived
- Cisco Adaptive Security Appliances (ASA) 5500, Industrial Security Appliances (ISA) 3000 and Adaptive Security Appliances Virtual (ASAv) Version 9.12 archived
- Cisco Adaptive Security Appliances (ASA) 9.12 running on Firepower 2100 Series Appliances archived
- Juniper Junos OS 20.2R1 for SRX345, SRX345-DUAL-AC, SRX380 and SRX1500 active
- Junos OS 20.4R1 for SRX345, SRX345-DUAL-AC and SRX380 in Cluster Mode active
- PacStar 451/453/455 Series with Cisco ASAv 9.12 archived
- Palo Alto Networks PA-220 Series, PA-800 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 9.0 archived
- WatchGuard Fireware OS v12.6.2 on Firebox NGFWs archived
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection Profile was processed.
Raw data
{
"_id": "cf18fa171ef6e928",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "cf18fa171ef6e928",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "MOD_CPP_FW_v1.3.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_SECURE": 2,
"A.COMPONENTS_RUNNING": 2,
"A.LIMITED_FUNCTIONALITY": 2,
"A.NO_THRU_TRAFFIC_PROTECTION": 2,
"A.PHYSICAL_PROTECTION": 2,
"A.REGULAR_UPDATES": 2,
"A.RESIDUAL_INFORMATION": 2,
"A.TRUSTED_ADMINISTRATOR": 2
},
"O": {
"O.RESIDUAL_INFORMATION": 6,
"O.STATEFUL_TRAFFIC_FILTERING": 11
},
"OE": {
"OE.ADMIN_CREDENTIALS_SECURE": 2,
"OE.COMPONENTS_RUNNING": 2,
"OE.NO_GENERAL_PURPOSE": 2,
"OE.NO_THRU_TRAFFIC_PROTECTION": 1,
"OE.PHYSICAL": 2,
"OE.RESIDUAL_INFORMATION": 2,
"OE.TRUSTED_ADMIN": 2,
"OE.UPDATES": 2
},
"T": {
"T.MALICIOUS_TRAFFIC": 4,
"T.NETWORK_ACCESS": 4,
"T.NETWORK_DISCLOSURE": 4,
"T.NETWORK_MISUSE": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ASE": {
"ASE_TSS.1": 2
},
"AVA": {
"AVA_VAN.1": 2
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4,
"FAU_GEN.1": 3
},
"FDP": {
"FDP_RIP": 2,
"FDP_RIP.2": 12,
"FDP_RIP.2.1": 1
},
"FMT": {
"FMT_SMF": 14,
"FMT_SMF.1": 3,
"FMT_SMF.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"RFC": {
"RFC 2460": 1,
"RFC 3513": 1,
"RFC 5735": 1,
"RFC 793": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20191008210650+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/ModDate": "D:20191008210650+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"pdf_file_size_bytes": 573399,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 41
},
"report_filename": "ACSC_Certification_Report_T020_NDcPP_FW-MOD_V1.1.pdf",
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_SECURE": 1,
"A.COMPONENTS_RUNNING": 1,
"A.LIMITED_FUNCTIONALITY": 1,
"A.NO_THRU_TRAFFIC_PROTECTION": 2,
"A.PHYSICAL_PROTECTION": 1,
"A.REGULAR_UPDATES": 1,
"A.RESIDUAL_INFORMATION": 1,
"A.TRUSTED_ADMINISTRATOR": 1
},
"O": {
"O.RESIDUAL_INFORMATION": 2,
"O.STATEFUL_TRAFFIC_FILTERING": 1
},
"OE": {
"OE.ADMIN_CREDENTIALS_SECURE": 1,
"OE.COMPONENTS_RUNNING": 1,
"OE.NO_GENERAL_PURPOSE": 1,
"OE.NO_THRU_TRAFFIC_PROTECTION": 2,
"OE.PHYSICAL": 1,
"OE.RESIDUAL_INFORMATION": 2,
"OE.TRUSTED_ADMIN": 1,
"OE.UPDATES": 1
},
"T": {
"T.MALICIOUS_TRAFFIC": 1,
"T.NETWORK_ACCESS": 1,
"T.NETWORK_DISCLOSURE": 1,
"T.NETWORK_MISUSE": 1,
"T.PASSWORD_CRACKING": 1,
"T.SECURITY_FUNCTIONALITY_COMPROMISE": 1,
"T.SECURITY_FUNCTIONALITY_FAILURE": 1,
"T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1,
"T.UNDETECTED_ACTIVITY": 1,
"T.UNTRUSTED_COMMUNICATION_CHANNELS": 1,
"T.UPDATE_COMPROMISE": 1,
"T.WEAK_AUTHENTICATION_ENDPOINTS": 1,
"T.WEAK_CRYPTOGRAPHY": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACE": {
"ACE_CCL.1": 1,
"ACE_CCO.1": 1,
"ACE_ECD.1": 2,
"ACE_INT.1": 2,
"ACE_MCO.1": 4,
"ACE_OBJ.1": 3,
"ACE_REQ.1": 2,
"ACE_SPD.1": 3
},
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1
},
"APE": {
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 4,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 2
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 2,
"FAU_GEN.2.1": 1,
"FAU_GEN_EXT.1.1": 1,
"FAU_STG.1": 1,
"FAU_STG.3": 1,
"FAU_STG_EXT": 1,
"FAU_STG_EXT.1": 1,
"FAU_STG_EXT.2": 1
},
"FCO": {
"FCO_CPC_EXT.1": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_COP.1": 4,
"FCS_NTP_EXT.1": 1,
"FCS_RBG_EXT.1": 1,
"FCS_SSHC_EXT.1": 1,
"FCS_SSHS_EXT.1": 1,
"FCS_TLSC_EXT": 1,
"FCS_TLSS_EXT": 1
},
"FDP": {
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_PMG_EXT.1.1": 1,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT.2.1": 1,
"FIA_UIA_EXT.1": 1
},
"FMT": {
"FMT_MOF.1": 2,
"FMT_MTD.1": 2,
"FMT_SMF.1": 1,
"FMT_SMF.1.1": 1,
"FMT_SMR.2": 1
},
"FPT": {
"FPT_APW_EXT.1": 1,
"FPT_ITT.1.1": 1,
"FPT_SKP_EXT.1.1": 1,
"FPT_STM_EXT.1": 1,
"FPT_TST_EXT.1.1": 1,
"FPT_TST_EXT.2.1": 1,
"FPT_TUD_EXT.1": 1,
"FPT_TUD_EXT.2": 1
},
"FTA": {
"FTA_SSL": 1,
"FTA_SSL_EXT.1.1": 1,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC.1": 1,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"Only necessary services NDcPP S5.1.2 OE.NO_THRU_TRAFFIC_PROTECTION Traversing traffic out of scope NDcPP S5.1.3 OE.TRUSTED_ADMIN Follow guidance, monitor certs NDcPP S5.1.4 OE.UPDATES Firmware": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"CTR": {
"CTR": 1
},
"GCM": {
"GCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"SSH": {
"SSH": 3
},
"TLS": {
"DTLS": {
"DTLS": 3
},
"TLS": {
"TLS": 4
}
},
"VPN": {
"VPN": 8
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Teron": {
"Teron Labs": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 2818": 1,
"RFC 4301": 1
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20201208171923+11\u002700\u0027",
"/ModDate": "D:20201208171923+11\u002700\u0027",
"pdf_file_size_bytes": 3802418,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.nzism.gcsb.govt.nz/ism-document/",
"https://www.cyber.gov.au/ism",
"https://www.cyber.gov.au/publications/aisep-policy-manual"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 19
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b5844364548539a01580ef284c8e885645638f71f7797b6b7d9ab4d09551f2ce",
"txt_hash": "0a71ce49ea6324b822dc92caccc38e0071fa194f961fe980d496885f17da2a00"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2dfbe42714e4d8869f88e181b07d4764598ad733f684c07e7ffa8c5f40a403bf",
"txt_hash": "2fed3749d0e52305cadb104da721f5f549965fd77e9a39530dbae159f3826055"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Boundary Protection Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile",
"not_valid_after": "2020-09-27",
"not_valid_before": "2019-09-27",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.3.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ACSC_Certification_Report_T020_NDcPP_FW-MOD_V1.1.pdf",
"scheme": null,
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "archived",
"version": "1.3"
}
}