This page was not yet optimized for use on mobile devices.
Stateful Traffic Filter Firewall Extended Package for Network Device Protection Profile
Web information ?
Status: archivedCertification date: 2011-12-19
Archived date: 2015-08-27
Scheme: 🇺🇸
Category: Boundary Protection Devices and Systems
Security level: None
Certification report ?
Extracted keywords
Claims
O.ADDRESS_FILTERING, O.PORT_FILTERING, O.STATEFUL_INSPECTION, O.RELATED_CONNECTION_FILTERING, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.NETWORK_DOS, A.CONNECTIONS, OE.CONNECTIONSSecurity Assurance Requirements (SAR)
APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2File metadata
Title | Validation Report for HP |
---|---|
Author | Tammy Compton |
Creation date | D:20140814083834-04'00' |
Modification date | D:20140814083841-04'00' |
Pages | 10 |
Creator | Acrobat PDFMaker 10.1 for Word |
Producer | Adobe PDF Library 10.0 |
Profile ?
Extracted keywords
Claims
O.ADDRESS_FILTERING, O.PORT_FILTERING, O.STATEFUL_INSPECTION, O.RELATED_CONNECTION_FILTERING, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.NETWORK_DOS, A.CONNECTIONS, OE.CONNECTIONSSecurity Assurance Requirements (SAR)
AVA_VAN.1Security Functional Requirements (SFR)
FAU_GEN.1, FMT_SMF.1Standards
RFC 792, RFC 4443, RFC 791, RFC 2460, RFC 793, RFC 768, RFC792, RFC 959, RFC 5735, RFC 3513, RFC 1918File metadata
Title | NDPP Extended Package |
---|---|
Author | James Arnold |
Creation date | D:20111223092940 |
Modification date | D:20111223092940 |
Pages | 36 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
References ?
- ARUBA NETWORKS VIRTUAL MOBILITY CONTROLLER (HARDENED CHASSIS RUNNING VMWARE ESXI) WITH ARUBAOS 6.4.2.0 - 1.3 FIPS archived
- Aruba Networks Mobility Controller v6.4.3.4-FIPS archived
- CISCO ADAPTIVE SECURITY APPLIANCES (ASA) AND CISCO ADAPTIVE SECURITY APPLIANCES VIRTUAL (ASAV) Version: ASA 9.4(1.13), ASAv 9.4(1.240) ASDM 7.4Components: ASA 5500 Series (5506-X, 5506-H, 5506-W, 5508-X, 5516-X) and ASAv running on VM ESXi 5.1 and 5.5 on the Unified Computing System (UCS) EN120E, EN120S M2, E140S M1, E140S M2, E140D M1, E160D M2, E160D M1, E180D M2, E140DP M1, E160DP M1, C22 M3, C24 M3, C220 M3, C220 M4, C240 M3, C240 M4, C260 M2, C420 M3, C460 M2, and C460 M4 archived
- Check Point Software Technologies Ltd. Security Appliances R77.30 archived
- Cisco Adaptive Security Appliances (ASA) Firewall and Virtual Private Network (VPN) Platform, version 9.4(1) archived
- Cisco Adaptive Security Appliances Version: ASA software version 9.1(2) Components: ASA 5500 (5505, 5510, 5520, 5540, 5550, 5580-20-40), ASA 5500-X Series (5512-X, 5515-X, 5525-X, 5545-X, 5555-X), ASA 5585-X (5585-10, 5585-20, 5585-40, 5585-60), ASA Services Module (ASA-SM) archived
- FortiGate™ UTM appliances running FortiOS™ 5.0 Patch Release 10 archived
- Fortigate UTM appliances running FortiOS 5.0 Patch Release 10 archived
- JUNIPER NETWORKS, INC JUNOS 15.1X49-D60 archived
- JUNOS 12.3 X48-D30 FOR SRX PLATFORMSComponents: SRX100, SRX110, SRX210, SRX220, SRX240, SRX550 and SRX650; SRX5400, SRX5400E SRX5600, SRX5600E, SRX5800 and SRX5800E with SPC-4-15-320 archived
- JUNOS 12.3X48-D30 FOR SRX XLR PLATFORMSComponents: Hardware Platforms: SRX1400, SRX3400 and SRX3600; SRX5400, SRX5400E, SRX5600, SRX5600E, SRX5800 and SRX5800E with SPC-2-10-20 archived
- Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320. archived
- Juniper Networks, Inc. Junos 12.1 X46 D20 for SRX Series Platforms archived
- Juniper Networks, Inc. Junos 12.1 X46 D20 for SRX Series and LN Series Platforms archived
- Palo Alto Networks PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series, PA-7000 Series, VM Series, Next-Generation Firewall with PAN-OS 7.0.1-h4 archived
- Stonesoft Next Generation Firewall (NGFW) archived
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Stateful Traffic Filter Firewall Extended Package for Network Device Protection Profile was processed.
Raw data
{
"_id": "d7508f508083d040",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "d7508f508083d040",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "PP_ND_TFFWEP_V1.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIONS": 2
},
"O": {
"O.ADDRESS_FILTERING": 6,
"O.PORT_FILTERING": 6,
"O.RELATED_CONNECTION_FILTERING": 3,
"O.STATEFUL_INSPECTION": 3,
"O.SYSTEM_MONITORING": 3,
"O.TOE_ADMINISTRATION": 2
},
"OE": {
"OE.CONNECTIONS": 2
},
"T": {
"T.NETWORK_DISCLOSURE": 3,
"T.NETWORK_DOS": 3,
"T.NETWORK_MISUSE": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"AVA": {
"AVA_VAN.1": 2
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 6
},
"FMT": {
"FMT_SMF.1": 6
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 1918": 1,
"RFC 2460": 3,
"RFC 3513": 3,
"RFC 4443": 3,
"RFC 5735": 2,
"RFC 768": 3,
"RFC 791": 3,
"RFC 792": 3,
"RFC 793": 3,
"RFC 959": 1,
"RFC792": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "James Arnold",
"/CreationDate": "D:20111223092940",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20111223092940",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "NDPP Extended Package",
"pdf_file_size_bytes": 819100,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.niap-ccevs.org/pp/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"report_filename": "pp_nd_tffw_ep_v1.0-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIONS": 1
},
"O": {
"O.ADDRESS_FILTERING": 1,
"O.PORT_FILTERING": 1,
"O.RELATED_CONNECTION_FILTERING": 1,
"O.STATEFUL_INSPECTION": 1
},
"OE": {
"OE.CONNECTIONS": 1
},
"T": {
"T.NETWORK_DISCLOSURE": 1,
"T.NETWORK_DOS": 1,
"T.NETWORK_MISUSE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.2": 1
}
},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Tammy Compton",
"/Company": "SAIC",
"/CreationDate": "D:20140814083834-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 10.1 for Word",
"/Keywords": "",
"/ModDate": "D:20140814083841-04\u002700\u0027",
"/Producer": "Adobe PDF Library 10.0",
"/SourceModified": "D:20140814123712",
"/Subject": "",
"/Title": "Validation Report for HP",
"/_NewReviewCycle": "",
"pdf_file_size_bytes": 118131,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 10
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e4f95b5d5aa0b0de379448ec1027e22f6e74303fe3ce040683d628eb2ef55466",
"txt_hash": "90586c542e95a3230f403cbcd994baebdf2f6fd8a1104ef5e1011b43f8953291"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5c3bcebedb56b45f59f0ccbcb28ba9b2df6fb2311e513e21f1fd078f09f131a4",
"txt_hash": "85db2745deafd4b2d0f955c4e206c1f2e56abf69c4f568f8b29b949bcfce1738"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Boundary Protection Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Stateful Traffic Filter Firewall Extended Package for Network Device Protection Profile",
"not_valid_after": "2015-08-27",
"not_valid_before": "2011-12-19",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_tffw_ep_v1.0-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "archived",
"version": "1.0"
}
}