This page was not yet optimized for use on mobile devices.
Protection Profile
Web information
Status: archivedCertification date: 2019-09-27
Archived date: 2020-09-27
Scheme: ❌
Category: Boundary Protection Devices and Systems
Security level: None
Certification report
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
ECDSA, DSAProtocols
SSH, TLS, DTLS, IPsec, VPNBlock cipher modes
CBC, CTR, GCMClaims
O.RESIDUAL_INFORMATION, O.STATEFUL_TRAFFIC_FILTERING, T.UNAUTHORIZED_ADMINISTRATOR_ACCESS, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_COMMUNICATION_CHANNELS, T.WEAK_AUTHENTICATION_ENDPOINTS, T.UPDATE_COMPROMISE, T.UNDETECTED_ACTIVITY, T.SECURITY_FUNCTIONALITY_COMPROMISE, T.PASSWORD_CRACKING, T.SECURITY_FUNCTIONALITY_FAILURE, T.NETWORK_DISCLOSURE, T.NETWORK_ACCESS, T.NETWORK_MISUSE, T.MALICIOUS_TRAFFIC, A.PHYSICAL_PROTECTION, A.LIMITED_FUNCTIONALITY, A.NO_THRU_TRAFFIC_PROTECTION, A.TRUSTED_ADMINISTRATOR, A.REGULAR_UPDATES, A.ADMIN_CREDENTIALS_SECURE, A.COMPONENTS_RUNNING, A.RESIDUAL_INFORMATION, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.NO_THRU_TRAFFIC_PROTECTION, OE.TRUSTED_ADMIN, OE.UPDATES, OE.ADMIN_CREDENTIALS_SECURE, OE.COMPONENTS_RUNNING, OE.RESIDUAL_INFORMATIONSecurity Assurance Requirements (SAR)
ACE_INT.1, ACE_CCL.1, ACE_SPD.1, ACE_OBJ.1, ACE_ECD.1, ACE_REQ.1, ACE_MCO.1, ACE_CCO.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, APE_INT.1, APE_SPD.1, APE_OBJ.2, ASE_OBJ.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2.1, FAU_STG_EXT.1, FAU_STG.1, FAU_STG_EXT.2, FAU_STG.3, FAU_GEN_EXT.1.1, FAU_STG_EXT, FCO_CPC_EXT.1, FCS_CKM, FCS_COP.1, FCS_RBG_EXT.1, FCS_NTP_EXT.1, FCS_SSHC_EXT.1, FCS_SSHS_EXT.1, FCS_TLSC_EXT, FCS_TLSS_EXT, FDP_RIP.2.1, FIA_AFL.1, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1, FIA_UAU_EXT.2.1, FIA_UAU.7.1, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1.1, FMT_SMF.1, FMT_SMR.2, FPT_SKP_EXT.1.1, FPT_APW_EXT.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1, FPT_STM_EXT.1, FPT_ITT.1.1, FPT_TST_EXT.2.1, FPT_TUD_EXT.2, FTA_SSL_EXT.1.1, FTA_SSL, FTA_TAB.1.1, FTP_ITC.1, FTP_TRP.1Evaluation facilities
Teron LabsCertification process
out of scope, Only necessary services NDcPP S5.1.2 OE.NO_THRU_TRAFFIC_PROTECTION Traversing traffic out of scope NDcPP S5.1.3 OE.TRUSTED_ADMIN Follow guidance, monitor certs NDcPP S5.1.4 OE.UPDATES FirmwareStandards
RFC 2818, RFC 4301, X.509File metadata
Creation date | D:20201208171923+11'00' |
---|---|
Modification date | D:20201208171923+11'00' |
Pages | 19 |
Profile
Extracted keywords
Claims
O.RESIDUAL_INFORMATION, O.STATEFUL_TRAFFIC_FILTERING, T.NETWORK_DISCLOSURE, T.NETWORK_ACCESS, T.NETWORK_MISUSE, T.MALICIOUS_TRAFFIC, A.NO_THRU_TRAFFIC_PROTECTION, A.PHYSICAL_PROTECTION, A.LIMITED_FUNCTIONALITY, A.TRUSTED_ADMINISTRATOR, A.REGULAR_UPDATES, A.ADMIN_CREDENTIALS_SECURE, A.COMPONENTS_RUNNING, A.RESIDUAL_INFORMATION, OE.NO_THRU_TRAFFIC_PROTECTION, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.TRUSTED_ADMIN, OE.UPDATES, OE.ADMIN_CREDENTIALS_SECURE, OE.COMPONENTS_RUNNING, OE.RESIDUAL_INFORMATIONSecurity Assurance Requirements (SAR)
AVA_VAN.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FDP_RIP, FDP_RIP.2, FDP_RIP.2.1, FMT_SMF, FMT_SMF.1, FMT_SMF.1.1Standards
RFC 2460, RFC 5735, RFC 3513, RFC 793, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Creation date | D:20191008210650+02'00' |
---|---|
Modification date | D:20191008210650+02'00' |
Pages | 41 |
Creator | Microsoft® Word 2019 |
Producer | Microsoft® Word 2019 |
References
- Aruba Mobility Controller with ArubaOS 8.6 archived
- Cisco ASA 9.12 running on Firepower 4100 and 9300 Security Appliances archived
- Cisco Adaptive Security Appliances (ASA) 5500, Industrial Security Appliances (ISA) 3000 and Adaptive Security Appliances Virtual (ASAv) Version 9.12 archived
- Cisco Adaptive Security Appliances (ASA) 9.12 running on Firepower 2100 Series Appliances archived
- Juniper Junos OS 20.2R1 for SRX345, SRX345-DUAL-AC, SRX380 and SRX1500 active
- Junos OS 20.4R1 for SRX345, SRX345-DUAL-AC and SRX380 in Cluster Mode active
- PacStar 451/453/455 Series with Cisco ASAv 9.12 archived
- Palo Alto Networks PA-220 Series, PA-800 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 9.0 archived
- WatchGuard Fireware OS v12.6.2 on Firebox NGFWs archived
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 3802418, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 19, '/CreationDate': "D:20201208171923+11'00'", '/ModDate': "D:20201208171923+11'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.cyber.gov.au/publications/aisep-policy-manual', 'https://www.nzism.gcsb.govt.nz/ism-document/', 'https://www.cyber.gov.au/ism']}}
. - The pp_metadata property was set to
{'pdf_file_size_bytes': 573399, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 41, '/Producer': 'Microsoft® Word 2019', '/Creator': 'Microsoft® Word 2019', '/CreationDate': "D:20191008210650+02'00'", '/ModDate': "D:20191008210650+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/']}}
. - The report_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ACE': {'ACE_INT.1': 2, 'ACE_CCL.1': 1, 'ACE_SPD.1': 3, 'ACE_OBJ.1': 3, 'ACE_ECD.1': 2, 'ACE_REQ.1': 2, 'ACE_MCO.1': 4, 'ACE_CCO.1': 1}, 'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.1': 1, 'ALC_CMS.1': 1}, 'ATE': {'ATE_IND.1': 1}, 'AVA': {'AVA_VAN.1': 2}, 'APE': {'APE_INT.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.2': 1}, 'ASE': {'ASE_OBJ.1': 4, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.1': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 2, 'FAU_GEN.2.1': 1, 'FAU_STG_EXT.1': 1, 'FAU_STG.1': 1, 'FAU_STG_EXT.2': 1, 'FAU_STG.3': 1, 'FAU_GEN_EXT.1.1': 1, 'FAU_STG_EXT': 1}, 'FCO': {'FCO_CPC_EXT.1': 1}, 'FCS': {'FCS_CKM': 1, 'FCS_COP.1': 4, 'FCS_RBG_EXT.1': 1, 'FCS_NTP_EXT.1': 1, 'FCS_SSHC_EXT.1': 1, 'FCS_SSHS_EXT.1': 1, 'FCS_TLSC_EXT': 1, 'FCS_TLSS_EXT': 1}, 'FDP': {'FDP_RIP.2.1': 1}, 'FIA': {'FIA_AFL.1': 1, 'FIA_PMG_EXT.1.1': 1, 'FIA_UIA_EXT.1': 1, 'FIA_UAU_EXT.2.1': 1, 'FIA_UAU.7.1': 1}, 'FMT': {'FMT_MOF.1': 2, 'FMT_MTD.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMF.1': 1, 'FMT_SMR.2': 1}, 'FPT': {'FPT_SKP_EXT.1.1': 1, 'FPT_APW_EXT.1': 1, 'FPT_TST_EXT.1.1': 1, 'FPT_TUD_EXT.1': 1, 'FPT_STM_EXT.1': 1, 'FPT_ITT.1.1': 1, 'FPT_TST_EXT.2.1': 1, 'FPT_TUD_EXT.2': 1}, 'FTA': {'FTA_SSL_EXT.1.1': 1, 'FTA_SSL': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.RESIDUAL_INFORMATION': 2, 'O.STATEFUL_TRAFFIC_FILTERING': 1}, 'T': {'T.UNAUTHORIZED_ADMINISTRATOR_ACCESS': 1, 'T.WEAK_CRYPTOGRAPHY': 1, 'T.UNTRUSTED_COMMUNICATION_CHANNELS': 1, 'T.WEAK_AUTHENTICATION_ENDPOINTS': 1, 'T.UPDATE_COMPROMISE': 1, 'T.UNDETECTED_ACTIVITY': 1, 'T.SECURITY_FUNCTIONALITY_COMPROMISE': 1, 'T.PASSWORD_CRACKING': 1, 'T.SECURITY_FUNCTIONALITY_FAILURE': 1, 'T.NETWORK_DISCLOSURE': 1, 'T.NETWORK_ACCESS': 1, 'T.NETWORK_MISUSE': 1, 'T.MALICIOUS_TRAFFIC': 1}, 'A': {'A.PHYSICAL_PROTECTION': 1, 'A.LIMITED_FUNCTIONALITY': 1, 'A.NO_THRU_TRAFFIC_PROTECTION': 2, 'A.TRUSTED_ADMINISTRATOR': 1, 'A.REGULAR_UPDATES': 1, 'A.ADMIN_CREDENTIALS_SECURE': 1, 'A.COMPONENTS_RUNNING': 1, 'A.RESIDUAL_INFORMATION': 1}, 'OE': {'OE.PHYSICAL': 1, 'OE.NO_GENERAL_PURPOSE': 1, 'OE.NO_THRU_TRAFFIC_PROTECTION': 2, 'OE.TRUSTED_ADMIN': 1, 'OE.UPDATES': 1, 'OE.ADMIN_CREDENTIALS_SECURE': 1, 'OE.COMPONENTS_RUNNING': 1, 'OE.RESIDUAL_INFORMATION': 2}}, 'vendor': {}, 'eval_facility': {'Teron': {'Teron Labs': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}}, 'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 3}, 'TLS': {'TLS': {'TLS': 4}, 'DTLS': {'DTLS': 3}}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 8}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}, 'CTR': {'CTR': 1}, 'GCM': {'GCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 2818': 1, 'RFC 4301': 1}, 'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'Only necessary services NDcPP S5.1.2 OE.NO_THRU_TRAFFIC_PROTECTION Traversing traffic out of scope NDcPP S5.1.3 OE.TRUSTED_ADMIN Follow guidance, monitor certs NDcPP S5.1.4 OE.UPDATES Firmware': 1}}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'AVA': {'AVA_VAN.1': 2}, 'ASE': {'ASE_TSS.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 4, 'FAU_GEN.1': 3}, 'FDP': {'FDP_RIP': 2, 'FDP_RIP.2': 12, 'FDP_RIP.2.1': 1}, 'FMT': {'FMT_SMF': 14, 'FMT_SMF.1': 3, 'FMT_SMF.1.1': 1}}, 'cc_claims': {'O': {'O.RESIDUAL_INFORMATION': 6, 'O.STATEFUL_TRAFFIC_FILTERING': 11}, 'T': {'T.NETWORK_DISCLOSURE': 4, 'T.NETWORK_ACCESS': 4, 'T.NETWORK_MISUSE': 5, 'T.MALICIOUS_TRAFFIC': 4}, 'A': {'A.NO_THRU_TRAFFIC_PROTECTION': 2, 'A.PHYSICAL_PROTECTION': 2, 'A.LIMITED_FUNCTIONALITY': 2, 'A.TRUSTED_ADMINISTRATOR': 2, 'A.REGULAR_UPDATES': 2, 'A.ADMIN_CREDENTIALS_SECURE': 2, 'A.COMPONENTS_RUNNING': 2, 'A.RESIDUAL_INFORMATION': 2}, 'OE': {'OE.NO_THRU_TRAFFIC_PROTECTION': 1, 'OE.PHYSICAL': 2, 'OE.NO_GENERAL_PURPOSE': 2, 'OE.TRUSTED_ADMIN': 2, 'OE.UPDATES': 2, 'OE.ADMIN_CREDENTIALS_SECURE': 2, 'OE.COMPONENTS_RUNNING': 2, 'OE.RESIDUAL_INFORMATION': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 2460': 1, 'RFC 5735': 1, 'RFC 3513': 1, 'RFC 793': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b5844364548539a01580ef284c8e885645638f71f7797b6b7d9ab4d09551f2ce', 'txt_hash': '0a71ce49ea6324b822dc92caccc38e0071fa194f961fe980d496885f17da2a00'}
data. - The report property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2dfbe42714e4d8869f88e181b07d4764598ad733f684c07e7ffa8c5f40a403bf', 'txt_hash': '2fed3749d0e52305cadb104da721f5f549965fd77e9a39530dbae159f3826055'}
data.
- The report_metadata property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection Profile was processed.
Raw data
{
"_id": "cf18fa171ef6e928",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "cf18fa171ef6e928",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "MOD_CPP_FW_v1.3.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_SECURE": 2,
"A.COMPONENTS_RUNNING": 2,
"A.LIMITED_FUNCTIONALITY": 2,
"A.NO_THRU_TRAFFIC_PROTECTION": 2,
"A.PHYSICAL_PROTECTION": 2,
"A.REGULAR_UPDATES": 2,
"A.RESIDUAL_INFORMATION": 2,
"A.TRUSTED_ADMINISTRATOR": 2
},
"O": {
"O.RESIDUAL_INFORMATION": 6,
"O.STATEFUL_TRAFFIC_FILTERING": 11
},
"OE": {
"OE.ADMIN_CREDENTIALS_SECURE": 2,
"OE.COMPONENTS_RUNNING": 2,
"OE.NO_GENERAL_PURPOSE": 2,
"OE.NO_THRU_TRAFFIC_PROTECTION": 1,
"OE.PHYSICAL": 2,
"OE.RESIDUAL_INFORMATION": 2,
"OE.TRUSTED_ADMIN": 2,
"OE.UPDATES": 2
},
"T": {
"T.MALICIOUS_TRAFFIC": 4,
"T.NETWORK_ACCESS": 4,
"T.NETWORK_DISCLOSURE": 4,
"T.NETWORK_MISUSE": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ASE": {
"ASE_TSS.1": 2
},
"AVA": {
"AVA_VAN.1": 2
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4,
"FAU_GEN.1": 3
},
"FDP": {
"FDP_RIP": 2,
"FDP_RIP.2": 12,
"FDP_RIP.2.1": 1
},
"FMT": {
"FMT_SMF": 14,
"FMT_SMF.1": 3,
"FMT_SMF.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"RFC": {
"RFC 2460": 1,
"RFC 3513": 1,
"RFC 5735": 1,
"RFC 793": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20191008210650+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/ModDate": "D:20191008210650+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"pdf_file_size_bytes": 573399,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 41
},
"report_filename": "ACSC_Certification_Report_T020_NDcPP_FW-MOD_V1.1.pdf",
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_SECURE": 1,
"A.COMPONENTS_RUNNING": 1,
"A.LIMITED_FUNCTIONALITY": 1,
"A.NO_THRU_TRAFFIC_PROTECTION": 2,
"A.PHYSICAL_PROTECTION": 1,
"A.REGULAR_UPDATES": 1,
"A.RESIDUAL_INFORMATION": 1,
"A.TRUSTED_ADMINISTRATOR": 1
},
"O": {
"O.RESIDUAL_INFORMATION": 2,
"O.STATEFUL_TRAFFIC_FILTERING": 1
},
"OE": {
"OE.ADMIN_CREDENTIALS_SECURE": 1,
"OE.COMPONENTS_RUNNING": 1,
"OE.NO_GENERAL_PURPOSE": 1,
"OE.NO_THRU_TRAFFIC_PROTECTION": 2,
"OE.PHYSICAL": 1,
"OE.RESIDUAL_INFORMATION": 2,
"OE.TRUSTED_ADMIN": 1,
"OE.UPDATES": 1
},
"T": {
"T.MALICIOUS_TRAFFIC": 1,
"T.NETWORK_ACCESS": 1,
"T.NETWORK_DISCLOSURE": 1,
"T.NETWORK_MISUSE": 1,
"T.PASSWORD_CRACKING": 1,
"T.SECURITY_FUNCTIONALITY_COMPROMISE": 1,
"T.SECURITY_FUNCTIONALITY_FAILURE": 1,
"T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1,
"T.UNDETECTED_ACTIVITY": 1,
"T.UNTRUSTED_COMMUNICATION_CHANNELS": 1,
"T.UPDATE_COMPROMISE": 1,
"T.WEAK_AUTHENTICATION_ENDPOINTS": 1,
"T.WEAK_CRYPTOGRAPHY": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACE": {
"ACE_CCL.1": 1,
"ACE_CCO.1": 1,
"ACE_ECD.1": 2,
"ACE_INT.1": 2,
"ACE_MCO.1": 4,
"ACE_OBJ.1": 3,
"ACE_REQ.1": 2,
"ACE_SPD.1": 3
},
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1
},
"APE": {
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 4,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 2
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 2,
"FAU_GEN.2.1": 1,
"FAU_GEN_EXT.1.1": 1,
"FAU_STG.1": 1,
"FAU_STG.3": 1,
"FAU_STG_EXT": 1,
"FAU_STG_EXT.1": 1,
"FAU_STG_EXT.2": 1
},
"FCO": {
"FCO_CPC_EXT.1": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_COP.1": 4,
"FCS_NTP_EXT.1": 1,
"FCS_RBG_EXT.1": 1,
"FCS_SSHC_EXT.1": 1,
"FCS_SSHS_EXT.1": 1,
"FCS_TLSC_EXT": 1,
"FCS_TLSS_EXT": 1
},
"FDP": {
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_PMG_EXT.1.1": 1,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT.2.1": 1,
"FIA_UIA_EXT.1": 1
},
"FMT": {
"FMT_MOF.1": 2,
"FMT_MTD.1": 2,
"FMT_SMF.1": 1,
"FMT_SMF.1.1": 1,
"FMT_SMR.2": 1
},
"FPT": {
"FPT_APW_EXT.1": 1,
"FPT_ITT.1.1": 1,
"FPT_SKP_EXT.1.1": 1,
"FPT_STM_EXT.1": 1,
"FPT_TST_EXT.1.1": 1,
"FPT_TST_EXT.2.1": 1,
"FPT_TUD_EXT.1": 1,
"FPT_TUD_EXT.2": 1
},
"FTA": {
"FTA_SSL": 1,
"FTA_SSL_EXT.1.1": 1,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC.1": 1,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"Only necessary services NDcPP S5.1.2 OE.NO_THRU_TRAFFIC_PROTECTION Traversing traffic out of scope NDcPP S5.1.3 OE.TRUSTED_ADMIN Follow guidance, monitor certs NDcPP S5.1.4 OE.UPDATES Firmware": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"CTR": {
"CTR": 1
},
"GCM": {
"GCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"SSH": {
"SSH": 3
},
"TLS": {
"DTLS": {
"DTLS": 3
},
"TLS": {
"TLS": 4
}
},
"VPN": {
"VPN": 8
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Teron": {
"Teron Labs": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 2818": 1,
"RFC 4301": 1
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20201208171923+11\u002700\u0027",
"/ModDate": "D:20201208171923+11\u002700\u0027",
"pdf_file_size_bytes": 3802418,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.cyber.gov.au/ism",
"https://www.nzism.gcsb.govt.nz/ism-document/",
"https://www.cyber.gov.au/publications/aisep-policy-manual"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 19
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b5844364548539a01580ef284c8e885645638f71f7797b6b7d9ab4d09551f2ce",
"txt_hash": "0a71ce49ea6324b822dc92caccc38e0071fa194f961fe980d496885f17da2a00"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2dfbe42714e4d8869f88e181b07d4764598ad733f684c07e7ffa8c5f40a403bf",
"txt_hash": "2fed3749d0e52305cadb104da721f5f549965fd77e9a39530dbae159f3826055"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Boundary Protection Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile",
"not_valid_after": "2020-09-27",
"not_valid_before": "2019-09-27",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.3.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ACSC_Certification_Report_T020_NDcPP_FW-MOD_V1.1.pdf",
"scheme": null,
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "archived",
"version": "1.3"
}
}