This page was not yet optimized for use on mobile
devices.
PP-Module for Virtual Private Network (VPN) Gateways
Web information
| Status | archived |
|---|---|
| Valid from | 22.11.2019 |
| Valid until | 27.09.2020 |
| Scheme | 🇺🇸 US |
| Category | Network and Network-Related Devices and Systems |
| Security level | EAL1 |
Certification report
Extracted keywords
Protocols
IKE, IPsec, VPNClaims
O.ADDRESS_FILTERING, O.AUTHENTICATION, O.CRYPTOGRAPHIC_FUNCTIONS, O.FAIL_SECURE, O.PORT_FILTERING, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, T.PASSWORD_CRACKING, T.SECURITY_FUNCTIONALITY_COM, T.SECURITY_FUNCTIONALITY_FAIL, T.UNAUTHORIZED_ADMINISTRATO, T.UNDETECTED_ACTIVITY, T.UNTRUSTED_COMMUNICATION_, T.UPDATE_COMPROMISE, T.WEAK_AUTHENTICATION_ENDPO, T.WEAK_CRYPTOGRAPHY, T.DATA_INTEGRITY, T.NETWORK_ACCESS, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.REPLAY_ATTACK, A.ADMIN_CREDENTIALS_SECURE, A.COMPONENTS_RUNNING, A.LIMITED_FUNCTIONALITY, A.NO_THRU_TRAFFIC_PROTECTION, A.PHYSICAL_PROTECTION, A.REGULAR_UPDATES, A.RESIDUAL_INFORMATION, A.TRUSTED_ADMINISTRATOR, A.CONNECTIONS, OE.ADMIN_CREDENTIALS_SECURE, OE.COMPONENTS_RUNNING, OE.NO_GENERAL_PURPOSE, OE.NO_THRU_TRAFFIC_PROTECTIO, OE.PHYSICAL, OE.RESIDUAL_INFORMATION, OE.TRUSTED_ADMIN, OE.UPDATES, OE.CONNECTIONSSecurity Assurance Requirements (SAR)
ACE_REQ, ACE_INT.1, ACE_CCL.1, ACE_SPD.1, ACE_OBJ.1, ACE_ECD.1, ACE_REQ.1, ACE_MCO.1, ACE_CCO.1Security Functional Requirements (SFR)
FCS_CKM, FIA_PSK_EXT, FPT_FLS, FPT_TST_EXT, FTA_SSL, FTA_TSE, FTA_VCM_EXT, FTP_ITCEvaluation facilities
Gossamer SecurityFile metadata
| Creation date | D:20201005102840-04'00' |
|---|---|
| Modification date | D:20201005102952-04'00' |
| Pages | 19 |
Protection Profile
Extracted keywords
Symmetric Algorithms
AES, AES-, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
ECDSA, DHHash functions
SHA-256, SHA-512Schemes
Key ExchangeProtocols
SSH, TLS, DTLS, IKE, IPsec, VPNElliptic Curves
P-256, P-384Block cipher modes
CBC, CTR, GCMClaims
O.ADDRESS_FILTERING, O.AUTHENTICATION, O.CRYPTOGRAPHIC_FUNCTIONS, O.FAIL_SECURE, O.PORT_FILTERING, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.CRYPTOGRAPHIC_FUNCTIO, T.DATA_INTEGRITY, T.NETWORK_ACCESS, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.REPLAY_ATTACK, T.SECURITY_FUNCTIONALITY_, T.UNDETECTED_ACTIVITY, T.UNAUTHORIZED_ADMINISTR, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_COMMUNICATION_CHANNELS, T.NETWORK_DISCOSURE, T.WEAK_AUTHENTICATION_ENDPOINTS, A.CONNECTIONS, A.NO_THRU_TRAFFIC_PROTECTION, OE.CONNECTIONS, OE.NO_THRU_TRAFFIC_PROTECTIONSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN, FCS_COP, FCS_CKM, FCS_RBG_EXT.1, FCS_COP.1, FCS_CKM.1, FIA_PSK_EXT.1, FIA_AFL.1, FIA_UAU_EXT.2, FIA_UIA_EXT.1, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1.2, FIA_PSK_EXT.1.3, FIA_PSK_EXT.1.4, FIA_PSK_EXT, FMT_MTD, FMT_SMF.1, FMT_MTD.1, FMT_SMF.1.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_FLS, FPT_TST_EXT.3, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.3, FPT_TUD_EXT.2, FPT_FLS.1, FPT_TST_EXT.3.1, FPT_TST_EXT.3.2, FPT_TST_EXT, FTA_SSL, FTA_TSE.1, FTA_VCM_EXT.1, FTA_SSL.3, FTA_TSE.1.1, FTA_VCM_EXT.1.1, FTA_VCM_EXT, FTP_ITC, FTP_ITC.1, FTP_TRP.1Standards
FIPS PUB 186-4, RFC4301, RFC 4303, RFC 3602, RFC 4106, RFC 5280, RFC 2986, RFC 3526, RFC 7919, RFC 791, RFC 2460, RFC 793, RFC 768, RFC792, X.509, CCMB-2070-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Creation date | D:20190920124652-04'00' |
|---|---|
| Modification date | D:20190920124652-04'00' |
| Pages | 39 |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- Aruba Mobility Controller with ArubaOS 8.6 archived
- Cisco ASA 9.12 running on Firepower 4100 and 9300 Security Appliances archived
- Cisco Adaptive Security Appliances (ASA) 5500, Industrial Security Appliances (ISA) 3000 and Adaptive Security Appliances Virtual (ASAv) Version 9.12 archived
- Cisco Adaptive Security Appliances (ASA) 9.12 running on Firepower 2100 Series Appliances archived
- CommScope Technologies LLC, Ruckus FastIron ICX 7450 Series Router 8.0.70 with IPsec VPN archived
- Juniper Junos OS 20.2R1 for SRX345, SRX345-DUAL-AC, SRX380 and SRX1500 active
- Junos OS 20.4R1 for SRX345, SRX345-DUAL-AC and SRX380 in Cluster Mode active
- PacStar 451/453/455 Series with Cisco ASAv 9.12 archived
- Palo Alto Networks PA-220 Series, PA-800 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 9.0 archived
- WatchGuard Fireware OS v12.6.2 on Firebox NGFWs archived
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "fa0610a54305df78",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "fa0610a54305df78",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "MOD_VPNGW_V1.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"DH": 4
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIONS": 1,
"A.NO_THRU_TRAFFIC_PROTECTION": 1
},
"O": {
"O.ADDRESS_FILTERING": 2,
"O.AUTHENTICATION": 2,
"O.CRYPTOGRAPHIC_FUNCTIO": 1,
"O.CRYPTOGRAPHIC_FUNCTIONS": 1,
"O.FAIL_SECURE": 2,
"O.PORT_FILTERING": 2,
"O.SYSTEM_MONITORING": 2,
"O.TOE_ADMINISTRATION": 2
},
"OE": {
"OE.CONNECTIONS": 2,
"OE.NO_THRU_TRAFFIC_PROTECTION": 1
},
"T": {
"T.DATA_INTEGRITY": 6,
"T.NETWORK_ACCESS": 6,
"T.NETWORK_DISCLOSURE": 4,
"T.NETWORK_DISCOSURE": 1,
"T.NETWORK_MISUSE": 6,
"T.REPLAY_ATTACK": 4,
"T.SECURITY_FUNCTIONALITY_": 1,
"T.UNAUTHORIZED_ADMINISTR": 1,
"T.UNDETECTED_ACTIVITY": 1,
"T.UNTRUSTED_COMMUNICATION_CHANNELS": 4,
"T.WEAK_AUTHENTICATION_ENDPOINTS": 1,
"T.WEAK_CRYPTOGRAPHY": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 4,
"FAU_GEN.1.1": 1
},
"FCS": {
"FCS_CKM": 4,
"FCS_CKM.1": 2,
"FCS_COP": 8,
"FCS_COP.1": 2,
"FCS_RBG_EXT.1": 4
},
"FIA": {
"FIA_AFL.1": 2,
"FIA_PSK_EXT": 3,
"FIA_PSK_EXT.1": 7,
"FIA_PSK_EXT.1.1": 2,
"FIA_PSK_EXT.1.2": 2,
"FIA_PSK_EXT.1.3": 2,
"FIA_PSK_EXT.1.4": 2,
"FIA_UAU_EXT.2": 1,
"FIA_UIA_EXT.1": 1
},
"FMT": {
"FMT_MTD": 4,
"FMT_MTD.1": 1,
"FMT_SMF.1": 5,
"FMT_SMF.1.1": 1
},
"FPT": {
"FPT_FLS": 4,
"FPT_FLS.1": 1,
"FPT_TST_EXT": 2,
"FPT_TST_EXT.1": 4,
"FPT_TST_EXT.1.1": 1,
"FPT_TST_EXT.3": 9,
"FPT_TST_EXT.3.1": 2,
"FPT_TST_EXT.3.2": 2,
"FPT_TUD_EXT.1": 4,
"FPT_TUD_EXT.1.3": 1,
"FPT_TUD_EXT.2": 1
},
"FTA": {
"FTA_SSL": 4,
"FTA_SSL.3": 1,
"FTA_TSE.1": 4,
"FTA_TSE.1.1": 1,
"FTA_VCM_EXT": 3,
"FTA_VCM_EXT.1": 8,
"FTA_VCM_EXT.1.1": 2
},
"FTP": {
"FTP_ITC": 4,
"FTP_ITC.1": 5,
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CTR": {
"CTR": 2
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 8
},
"IPsec": {
"IPsec": 22
},
"SSH": {
"SSH": 2
},
"TLS": {
"DTLS": {
"DTLS": 1
},
"TLS": {
"TLS": 1
}
},
"VPN": {
"VPN": 84
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 2,
"P-384": 2
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 2,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2070-04-001": 1
},
"FIPS": {
"FIPS PUB 186-4": 2
},
"RFC": {
"RFC 2460": 2,
"RFC 2986": 1,
"RFC 3526": 1,
"RFC 3602": 2,
"RFC 4106": 2,
"RFC 4303": 1,
"RFC 5280": 1,
"RFC 768": 2,
"RFC 791": 2,
"RFC 7919": 1,
"RFC 793": 2,
"RFC4301": 1,
"RFC792": 1
},
"X509": {
"X.509": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4,
"AES-": 1
}
},
"constructions": {
"MAC": {
"HMAC": 4,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20190920124652-04\u002700\u0027",
"/ModDate": "D:20190920124652-04\u002700\u0027",
"pdf_file_size_bytes": 1216853,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 39
},
"report_filename": "CFG_NDcPP-VPNGW_V1.0_VR.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_SECURE": 1,
"A.COMPONENTS_RUNNING": 1,
"A.CONNECTIONS": 1,
"A.LIMITED_FUNCTIONALITY": 1,
"A.NO_THRU_TRAFFIC_PROTECTION": 1,
"A.PHYSICAL_PROTECTION": 1,
"A.REGULAR_UPDATES": 1,
"A.RESIDUAL_INFORMATION": 1,
"A.TRUSTED_ADMINISTRATOR": 1
},
"O": {
"O.ADDRESS_FILTERING": 1,
"O.AUTHENTICATION": 1,
"O.CRYPTOGRAPHIC_FUNCTIONS": 1,
"O.FAIL_SECURE": 1,
"O.PORT_FILTERING": 1,
"O.SYSTEM_MONITORING": 1,
"O.TOE_ADMINISTRATION": 1
},
"OE": {
"OE.ADMIN_CREDENTIALS_SECURE": 1,
"OE.COMPONENTS_RUNNING": 1,
"OE.CONNECTIONS": 1,
"OE.NO_GENERAL_PURPOSE": 1,
"OE.NO_THRU_TRAFFIC_PROTECTIO": 1,
"OE.PHYSICAL": 1,
"OE.RESIDUAL_INFORMATION": 1,
"OE.TRUSTED_ADMIN": 1,
"OE.UPDATES": 1
},
"T": {
"T.DATA_INTEGRITY": 1,
"T.NETWORK_ACCESS": 1,
"T.NETWORK_DISCLOSURE": 1,
"T.NETWORK_MISUSE": 1,
"T.PASSWORD_CRACKING": 1,
"T.REPLAY_ATTACK": 1,
"T.SECURITY_FUNCTIONALITY_COM": 1,
"T.SECURITY_FUNCTIONALITY_FAIL": 1,
"T.UNAUTHORIZED_ADMINISTRATO": 1,
"T.UNDETECTED_ACTIVITY": 1,
"T.UNTRUSTED_COMMUNICATION_": 1,
"T.UPDATE_COMPROMISE": 1,
"T.WEAK_AUTHENTICATION_ENDPO": 1,
"T.WEAK_CRYPTOGRAPHY": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACE": {
"ACE_CCL.1": 1,
"ACE_CCO.1": 1,
"ACE_ECD.1": 1,
"ACE_INT.1": 1,
"ACE_MCO.1": 1,
"ACE_OBJ.1": 1,
"ACE_REQ": 1,
"ACE_REQ.1": 1,
"ACE_SPD.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FCS": {
"FCS_CKM": 1
},
"FIA": {
"FIA_PSK_EXT": 1
},
"FPT": {
"FPT_FLS": 1,
"FPT_TST_EXT": 1
},
"FTA": {
"FTA_SSL": 1,
"FTA_TSE": 1,
"FTA_VCM_EXT": 1
},
"FTP": {
"FTP_ITC": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1
},
"IPsec": {
"IPsec": 1
},
"VPN": {
"VPN": 30
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20201005102840-04\u002700\u0027",
"/ModDate": "D:20201005102952-04\u002700\u0027",
"pdf_file_size_bytes": 556692,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 19
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2b4429b545ee90f04fa5b4466a26fa6a8555eada1e71bb29c7e9f689f6710777",
"txt_hash": "3f1ec8edf822369e28b695be353e57e1969f453c6303dd380ff0cd067e485290"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e00af7c8aaa09d8b0e484107d378cc0cea44f808a3c1cb2be6c6af6c913f35d9",
"txt_hash": "af636a169f115eb67ec10cd1f512da31b675a164e6f59efd37da5cf556cd630a"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Network and Network-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "PP-Module for Virtual Private Network (VPN) Gateways",
"not_valid_after": "2020-09-27",
"not_valid_before": "2019-11-22",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPNGW_V1.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CFG_NDcPP-VPNGW_V1.0_VR.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "archived",
"version": "1.0"
}
}