This page was not yet optimized for use on mobile devices.
Extended Package for Intrusion Prevention Systems
Web information
Status: archivedCertification date: 2014-06-26
Archived date: 2016-02-27
Scheme: 🇺🇸
Category: Boundary Protection Devices and Systems
Security level: None
Certification report
Extracted keywords
Claims
O.IPSSENSE, O.IPSREACT, O.IPSANALYZE, T.NETWORK_DISCLOSURE, T.NETWORK_ACCESS, T.NETWORK_MISUSE, T.NETWORK_DOS, A.CONNECTIONS, OE.CONNECTIONSSecurity Assurance Requirements (SAR)
APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2Security Functional Requirements (SFR)
FAU_GEN.1, FAU_ARP.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_STG.1, FAU_STG.4, FMT_SMF.1, FMT_MOF.1, FMT_MTD.1, FMT_SMR.1, FPT_STM.1, FPT_FLS.1, FRU_RSA.1Certificates
Certification Report 2017/108Evaluation facilities
BAE Applied IntelligenceFile metadata
Title | |
---|---|
Author | ACA |
Creation date | D:20170412182251+10'00' |
Modification date | D:20170413172229-04'00' |
Pages | 17 |
Creator | Acrobat PDFMaker 9.0 for Word |
Producer | Acrobat Distiller 9.0.0 (Windows) |
Profile
Extracted keywords
Schemes
MACClaims
O.SYSTEM_MONITORING, O.IPSANALYZE, O.IPSREACT, O.TOE_ADMINISTRATION, O.CONNECTIONS, O.IPS_REACT, O.IPSANALYSE, O.IPSSENSE, T.NETWORK_DISCLOSURE, T.NETWORK, T.NETWORK_MISUSE, T.NETWORK_DOS, A.CONNECTIONS, OE.CONNECTIONSSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_ARP.1, FAU_ARP.1.1, FAU_ARP, FAU_SAA, FAU_STG_EXT.1, FAU_SAR, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_STG, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4.1, FAU_STG.4, FCS_STG_EXT.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MTD.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMR.2, FPT_ITT.1, FPT_STM.1, FPT_FLS.1, FPT_FLS.1.1, FRU_RSA, FRU_RSA.1, FRU_RSA.1.1, FTP_ITC, FTP_TRP, FTP_ITC.1.3, FTP_ITC.1Standards
RFC 791, RFC 2460, RFC 792, RFC 2463, RFC 793, RFC 768File metadata
Creation date | D:20140626095617-04'00' |
---|---|
Modification date | D:20140626095617-04'00' |
Pages | 44 |
References
- JUNIPER NETWORKS, INC JUNOS 15.1X49-D60 archived
- JUNOS 12.3 X48-D30 FOR SRX PLATFORMSComponents: SRX100, SRX110, SRX210, SRX220, SRX240, SRX550 and SRX650; SRX5400, SRX5400E SRX5600, SRX5600E, SRX5800 and SRX5800E with SPC-4-15-320 archived
- JUNOS 12.3X48-D30 FOR SRX XLR PLATFORMSComponents: Hardware Platforms: SRX1400, SRX3400 and SRX3600; SRX5400, SRX5400E, SRX5600, SRX5600E, SRX5800 and SRX5800E with SPC-2-10-20 archived
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 71455, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/Author': 'ACA', '/Company': 'Department of Defence', '/CreationDate': "D:20170412182251+10'00'", '/Creator': 'Acrobat PDFMaker 9.0 for Word', '/ModDate': "D:20170413172229-04'00'", '/Objective-Classification': '[Inherited - Unclassified]', '/Objective-CreationStamp': 'D:20170410', '/Objective-Id': 'R29469034', '/Objective-IsApproved': '0', '/Objective-IsPublished': '0', '/Objective-ModificationStamp': 'D:20170412', '/Objective-Owner': 'Chan, Hin (Mr)(I&S ASD)', '/Objective-Parent': 'Certification', '/Objective-Path': 'Objective Global Folder - PROD:Defence Business Units:Strategic Policy and Intelligence Group:Australian Signals Directorate:ASD : Australian Signals Directorate:CISD:ASCS:CS-PD1:Evaluations:ACA:Australasn Certn Auth:Certification:Operations:AISEP Certifi', '/Objective-State': 'Being Edited', '/Objective-Title': 'EFS-T046_IPS_EP_ Certification Report v0.1', '/Objective-Version': '0.5', '/Objective-VersionNumber': '5', '/Producer': 'Acrobat Distiller 9.0.0 (Windows)', '/SourceModified': 'D:20170412082154', '/Title': ' ', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=166']}}
. - The pp_metadata property was set to
{'pdf_file_size_bytes': 1218755, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 44, '/CreationDate': "D:20140626095617-04'00'", '/ModDate': "D:20140626095617-04'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['file://corp/org$/NIAP_CCEVS/PPs/PP%20-%20Published/IPS%20EP/PP_ND_IPS_EP_V1.0.docx%23_Toc391539813', 'http://www.niap-ccevs.org/pp/', 'file://corp/org$/NIAP_CCEVS/PPs/PP%20-%20Published/IPS%20EP/PP_ND_IPS_EP_V1.0.docx%23_Toc391539814']}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'Certification Report 2017/108': 1}, 'AU': {'Certification Report 2017/108': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 2, 'APE_REQ.2': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 8, 'FAU_ARP.1': 4, 'FAU_SAR.1': 4, 'FAU_SAR.2': 4, 'FAU_SAR.3': 4, 'FAU_STG.1': 4, 'FAU_STG.4': 4}, 'FMT': {'FMT_SMF.1': 6, 'FMT_MOF.1': 3, 'FMT_MTD.1': 4, 'FMT_SMR.1': 4}, 'FPT': {'FPT_STM.1': 2, 'FPT_FLS.1': 4}, 'FRU': {'FRU_RSA.1': 5}}, 'cc_claims': {'O': {'O.IPSSENSE': 4, 'O.IPSREACT': 4, 'O.IPSANALYZE': 1}, 'T': {'T.NETWORK_DISCLOSURE': 1, 'T.NETWORK_ACCESS': 1, 'T.NETWORK_MISUSE': 1, 'T.NETWORK_DOS': 1}, 'A': {'A.CONNECTIONS': 1}, 'OE': {'OE.CONNECTIONS': 1}}, 'vendor': {}, 'eval_facility': {'BAE': {'BAE Applied Intelligence': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 22, 'FAU_GEN': 3, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_ARP.1': 1, 'FAU_ARP.1.1': 1, 'FAU_ARP': 3, 'FAU_SAA': 2, 'FAU_STG_EXT.1': 1, 'FAU_SAR': 3, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_STG': 2, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4.1': 1, 'FAU_STG.4': 1}, 'FCS': {'FCS_STG_EXT.1': 1}, 'FMT': {'FMT_SMF.1': 11, 'FMT_SMF.1.1': 1, 'FMT_MTD.1': 3, 'FMT_MOF.1': 1, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 1, 'FMT_SMR.1': 4, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMR.2': 2}, 'FPT': {'FPT_ITT.1': 1, 'FPT_STM.1': 1, 'FPT_FLS.1': 1, 'FPT_FLS.1.1': 1}, 'FRU': {'FRU_RSA': 1, 'FRU_RSA.1': 3, 'FRU_RSA.1.1': 1}, 'FTP': {'FTP_ITC': 3, 'FTP_TRP': 3, 'FTP_ITC.1.3': 1, 'FTP_ITC.1': 3}}, 'cc_claims': {'O': {'O.SYSTEM_MONITORING': 5, 'O.IPSANALYZE': 3, 'O.IPSREACT': 2, 'O.TOE_ADMINISTRATION': 1, 'O.CONNECTIONS': 1, 'O.IPS_REACT': 4, 'O.IPSANALYSE': 1, 'O.IPSSENSE': 1}, 'T': {'T.NETWORK_DISCLOSURE': 3, 'T.NETWORK': 1, 'T.NETWORK_MISUSE': 3, 'T.NETWORK_DOS': 3}, 'A': {'A.CONNECTIONS': 1}, 'OE': {'OE.CONNECTIONS': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 791': 1, 'RFC 2460': 1, 'RFC 792': 1, 'RFC 2463': 1, 'RFC 793': 1, 'RFC 768': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9cfc67e80aa916d6be15631786961cabdcf543e8ca331ca0077c8fd7fc9883c5', 'txt_hash': '495f7fae5ced3b3cb76719b9834914fd7172459cc7f1773c27bb8b4b96739f2f'}
data. - The report property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '655cdebe65a32d752c411b4edee900ffa65007ef1c0289b619156c6009561ab5', 'txt_hash': 'b7119cfcef79888a541424ac26884b1d37c01711b4526f8f6e01250f6a993bc9'}
data.
- The report_metadata property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Extended Package for Intrusion Prevention Systems was processed.
Raw data
{
"_id": "f21e576d983cc1d7",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "f21e576d983cc1d7",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_nd_ips_ep_v1.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIONS": 1
},
"O": {
"O.CONNECTIONS": 1,
"O.IPSANALYSE": 1,
"O.IPSANALYZE": 3,
"O.IPSREACT": 2,
"O.IPSSENSE": 1,
"O.IPS_REACT": 4,
"O.SYSTEM_MONITORING": 5,
"O.TOE_ADMINISTRATION": 1
},
"OE": {
"OE.CONNECTIONS": 2
},
"T": {
"T.NETWORK": 1,
"T.NETWORK_DISCLOSURE": 3,
"T.NETWORK_DOS": 3,
"T.NETWORK_MISUSE": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_ARP": 3,
"FAU_ARP.1": 1,
"FAU_ARP.1.1": 1,
"FAU_GEN": 3,
"FAU_GEN.1": 22,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAA": 2,
"FAU_SAR": 3,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2.1": 1,
"FAU_SAR.3.1": 1,
"FAU_STG": 2,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.4": 1,
"FAU_STG.4.1": 1,
"FAU_STG_EXT.1": 1
},
"FCS": {
"FCS_STG_EXT.1": 1
},
"FMT": {
"FMT_MOF.1": 1,
"FMT_MOF.1.1": 1,
"FMT_MTD.1": 3,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 4,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1,
"FMT_SMR.2": 2
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 1,
"FPT_STM.1": 1
},
"FRU": {
"FRU_RSA": 1,
"FRU_RSA.1": 3,
"FRU_RSA.1.1": 1
},
"FTP": {
"FTP_ITC": 3,
"FTP_ITC.1": 3,
"FTP_ITC.1.3": 1,
"FTP_TRP": 3
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 2460": 1,
"RFC 2463": 1,
"RFC 768": 1,
"RFC 791": 1,
"RFC 792": 1,
"RFC 793": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20140626095617-04\u002700\u0027",
"/ModDate": "D:20140626095617-04\u002700\u0027",
"pdf_file_size_bytes": 1218755,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"file://corp/org$/NIAP_CCEVS/PPs/PP%20-%20Published/IPS%20EP/PP_ND_IPS_EP_V1.0.docx%23_Toc391539813",
"http://www.niap-ccevs.org/pp/",
"file://corp/org$/NIAP_CCEVS/PPs/PP%20-%20Published/IPS%20EP/PP_ND_IPS_EP_V1.0.docx%23_Toc391539814"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 44
},
"report_filename": "pp_nd_ips_ep_v1.0-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"AU": {
"Certification Report 2017/108": 1
},
"FR": {
"Certification Report 2017/108": 1
}
},
"cc_claims": {
"A": {
"A.CONNECTIONS": 1
},
"O": {
"O.IPSANALYZE": 1,
"O.IPSREACT": 4,
"O.IPSSENSE": 4
},
"OE": {
"OE.CONNECTIONS": 1
},
"T": {
"T.NETWORK_ACCESS": 1,
"T.NETWORK_DISCLOSURE": 1,
"T.NETWORK_DOS": 1,
"T.NETWORK_MISUSE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 2,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 4,
"FAU_GEN.1": 8,
"FAU_SAR.1": 4,
"FAU_SAR.2": 4,
"FAU_SAR.3": 4,
"FAU_STG.1": 4,
"FAU_STG.4": 4
},
"FMT": {
"FMT_MOF.1": 3,
"FMT_MTD.1": 4,
"FMT_SMF.1": 6,
"FMT_SMR.1": 4
},
"FPT": {
"FPT_FLS.1": 4,
"FPT_STM.1": 2
},
"FRU": {
"FRU_RSA.1": 5
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BAE": {
"BAE Applied Intelligence": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "ACA",
"/Company": "Department of Defence",
"/CreationDate": "D:20170412182251+10\u002700\u0027",
"/Creator": "Acrobat PDFMaker 9.0 for Word",
"/ModDate": "D:20170413172229-04\u002700\u0027",
"/Objective-Classification": "[Inherited - Unclassified]",
"/Objective-CreationStamp": "D:20170410",
"/Objective-Id": "R29469034",
"/Objective-IsApproved": "0",
"/Objective-IsPublished": "0",
"/Objective-ModificationStamp": "D:20170412",
"/Objective-Owner": "Chan, Hin (Mr)(I\u0026S ASD)",
"/Objective-Parent": "Certification",
"/Objective-Path": "Objective Global Folder - PROD:Defence Business Units:Strategic Policy and Intelligence Group:Australian Signals Directorate:ASD : Australian Signals Directorate:CISD:ASCS:CS-PD1:Evaluations:ACA:Australasn Certn Auth:Certification:Operations:AISEP Certifi",
"/Objective-State": "Being Edited",
"/Objective-Title": "EFS-T046_IPS_EP_ Certification Report v0.1",
"/Objective-Version": "0.5",
"/Objective-VersionNumber": "5",
"/Producer": "Acrobat Distiller 9.0.0 (Windows)",
"/SourceModified": "D:20170412082154",
"/Title": " ",
"pdf_file_size_bytes": 71455,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=166"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9cfc67e80aa916d6be15631786961cabdcf543e8ca331ca0077c8fd7fc9883c5",
"txt_hash": "495f7fae5ced3b3cb76719b9834914fd7172459cc7f1773c27bb8b4b96739f2f"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "655cdebe65a32d752c411b4edee900ffa65007ef1c0289b619156c6009561ab5",
"txt_hash": "b7119cfcef79888a541424ac26884b1d37c01711b4526f8f6e01250f6a993bc9"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Boundary Protection Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Extended Package for Intrusion Prevention Systems",
"not_valid_after": "2016-02-27",
"not_valid_before": "2014-06-26",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_ips_ep_v1.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_ips_ep_v1.0-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"None"
]
},
"status": "archived",
"version": "1.0"
}
}