Skip to Components List Index
Customers select products from this listing to satisfy the reference architectures and configuration information contained in published Capability Packages. Customers must ensure that the components selected will permit the necessary functionality for the selected architecture.
For some technologies, the CSfC program requires specific, selectable requirements to be included in the Common Criteria evaluation validating that the product complies with the applicable NIAP-approved protection profile(s). Some selections, which are not required for the product to be listed on the NIAP Product Compliant List, are mandatory selections for products that are to be listed on the CSfC Components List.
To see the selectable requirements, go to the CSfC Components List and click on the links for IPSec VPN Gateways, IPSec VPN Clients, WLAN Clients, WLAN Access Systems, Certificate Authorities, MDM, SW FDE, Mobile Platforms, SIP Servers and VoIP Applications.
Open source components may be listed, provided they have a responsible sponsor, and an NSA-approved plan for, taking a component through Common Criteria evaluation and sustainment of the component. Customers wishing to use open source components should contact us with their evaluation and sustainment plans and the responsible parties for each.
Contact us here for questions regarding the CSfC Components List.
Which protection profiles are published and which are in development?
View a current listing of NIAP approved U.S. Government Protection Profiles.
View a listing of U.S. Government Protection Profiles currently in development.
Additional information about NIAP and the Common Criteria Evaluation and Validation Scheme.
What is the process to get a commercial product CSfC-listed?
Vendors who wish to have their products eligible as CSfC components of a composed, layered information assurance solution must build their products in accordance with the applicable US Government approved Protection Profile(s) and submit their product using the Common Criteria Process.
For vendors utilizing either a U.S. Common Criteria Testing Laboratory (CCTL) or a foreign CCTL, the Product will not be added to the Components List until the NIAP/Common Criteria evaluation is in complete and the Product is posted to NIAP's Product Compliant List (PCL).
Vendors interested in having their products eligible as CSfC Components should notify NSA (csfc_components@nsa.gov) of your intent during the initial stage of the process (i.e. preferably during product development and before contracting to complete an evaluation). Vendors are encouraged to contact NSA with any questions or issues related to CSfC selections for Components and/or the CSfC Components List Process. NSA's objective is to collaborate with vendors to support the addition of suitable products to the CSfC Components List.
In deciding whether a particular product is appropriate for CSfC, NSA considers the totality of circumstances known to NSA, including the vendor's past willingness to fix vulnerabilities, supply chain, foreign ownership, control or influence, the proposed uses of the product under consideration and any other relevant information available to NSA. Vendors of products submitted for consideration under the CSfC process will be notified of NSA's decision on a product-by product basis.
The vendor will enter into a Memorandum of Agreement (MoA) with NSA. The MoA specifies that the vendor's product must be NIAP certified and that the vendor agrees to fix vulnerabilities in a timely fashion. The MoA may also reference technology-specific selections for NIAP testing.
Interested vendors must complete and submit the CSfC Questionnaire (PDF) for each product. Please submit completed questionnaires via email.
An Update to the Manufacturer Diversity Requirement
The manufacturer diversity requirement for CSfC layered solutions has been modified to permit, subject to certain conditions, single-manufacturer implementations of both layers. The manufacturer must show sufficient independence in the code base and cryptographic implementations of the products used to implement each layer. To demonstrate this, a manufacturer must document the similarities and differences between the two products, to include cryptographic hardware components, software code base (i.e. operating system), software cryptographic libraries, and development teams. It is a fundamental requirement that the code bases of the two products be significantly different. Additionally, the vendor must document measures taken to ensure that supply chain risk is no greater than would be the case for products from two different vendors. NSA will review the information and determine whether the documentation is sufficient to meet the requirements for independent layers. Manufacturer diversity will continue to be accepted to constitute independent layers.
Please contact the CSfC PMO at csfc_components@nsa.gov for approved Independence Layer Approval letters.
- Curtiss-Wright DTS1 Implementation Independence Letter
- (1) The Curtiss-Wright DTS1 Hardware Encryption Layer (v5.4)
- (2) The Curtiss-Wright DTS1 Software Encryption Layer (v3.01.00)
- Samsung Electronics Co., Ltd
- (1) Platform Encryption: Samsung Galaxy Devices on Android 13
- (2) File Encryption: Samsung Knox File Encryption 1.5
- Galleon Embedded Computing
- (1) Galleon Embedded Computing XSR and G1 Hardware Encryption Layer
- (2) Galleon Embedded Computing XSR and G1 Software Encryption Layer
Vendors who wish to submit a statement may do so via email.
Components List Index
Authentication Server
Click for Selections
Vendor |
Model |
Version |
CNSSP-11 Compliance |
Certification Date |
Notes |
ClearPass Policy Manager (C1000, C2000, C2010, C2020, C3000, C3010 and C1000V) |
v6.11 |
NIAP Validation Completed (at Gossamer) |
2023.03.27 |
|
Identity Services Engine (ISE) (SNS3515, SNS3595, SNS3615, SNS3655 and ISE virtual on ESXi 6.x running on UCSC-C220-M5SX) |
v3.1 |
NIAP Validation Ongoing (at Acumen) |
2023.09.27 |
|
Certification Authority
Click for Selections
Vendor |
Model |
Version |
CNSSP-11 Compliance |
Certification Date |
Notes |
Information Security Corporation |
CertAgent/Dhuma |
v8.0, Patch Level 0.2 |
NIAP Evaluation Completed (at Leidos) |
2024.09.03 |
|
Client Virtualization Systems
Click for Selections
Vendor |
Model |
Version |
CNSSP-11 Compliance |
Notes |
|
|
|
|
E-mail Clients
Click for Selections
Vendor |
Model |
Version |
CNSSP-11 Compliance |
Notes |
|
|
|
|
|
End User Device / Mobile Platform
Click for Selections
Vendor |
Model |
Version |
CNSSP-11 Compliance |
Certification Date |
Notes |
Pixel Devices (Pixel 4a, Pixel 4a-5G, Pixel 5, Pixel5a-5G, Pixel 6a, Pixel 6, Pixel 6 Pro, Pixel 7, and Pixel 7 Pro) |
Android 13 |
NIAP Validation Completed (at Gossamer) |
2023.01.24 |
|
Samsung Galaxy Devices on Android 13- Spring (Galaxy S23 Ultra 5G, Galaxy S22 Ultra 5G, Galaxy S22 5G, Galaxy S21 Ultra 5G, Galaxy S21 Ultra 5G, Galaxy S20+ 5G, Galaxy S20+ 5G, Galaxy Z Flip, Galaxy XCover Pro, Galaxy A53 5G, Galaxy XCover6 Pro) |
Android 13 |
NIAP Validation Completed (at Gossamer) |
2023.04.26 |
|
Samsung Galaxy Devices on Android 13 – Fall (Galaxy Z Flip5 5G, Galaxy A52 5G, Galaxy A71 5G, Galaxy Tab Active3 and Galaxy S23 FE |
Android 13 |
NIAP Validation Completed (at Gossamer) |
2023.10.23 |
|
Zebra Devices on Android 13 |
Android 13 |
NIAP Validation Completed (at Gossamer) |
2024.08.08 |
|
Samsung Galaxy Devices on Android 14-Spring (Galaxy S24 Ultra 5G, Galaxy S24 5G, Galaxy S23 Ultra 5G, Galaxy S22 Ultra 5G, Galaxy S22 5G, Galaxy S21 Ultra 5G, Galaxy XCover6 Pro, Galaxy Tab Active5) |
Android 14 |
NIAP Validation Completed (at Gossamer) |
2024.05.06 |
|
File Encryption
Click for Selections
Hardware Full Drive Encryption
Click for Selections
Note: Due to the nature of the split evaluations for this product category, some products listed here may not be validated against both applicable Protection Profiles. Products (marked with *) not validated against both the Collaborative Protection Profile Full Drive Encryption -- Authorization Acquisition (CPP FDE-AA) AND the Collaborative Protection Profile Full Drive Encryption -- Encryption Engine (CPP FDE-EE) will require a Deviation Request for requirement DAR-PS-7.
IPS
Click for Selections
Vendor |
Model |
Version |
CNSSP-11 Compliance |
Certification Date |
Notes |
Cisco FTD 7.0 on Firepower 1000 and 2100 Series with FMC/FMCv (FPR 1010, FPR 1120, FPR 1140, FPR 1150, FPR 2110, FPR 2120, FPR 2130, FPR 2140, FMC1000 FMC2500, FMC4500, FMC1600, FMC2600, FMC4600 and FMCv running on ESXi 6.7 or 7.0 and Cisco UCS-C and E Series)
|
FTD 7.0 |
NIAP Validation Completed (at Gossamer) |
2023.01.31 |
|
NGIPSv running Firepower v7.0 and FMC/FMCv 7.0 (FMCIO00, FMC2500, FMC4500, FMC1600, FMC2600, FMC4600 and FMCv running on ESXi 6.7 or 7.0 and Cisco UCS-C and E series)
|
v7.0 |
NIAP Validation Completed (at Gossamer) |
2023.05.18 |
|
Cisco FTD/FTDv on Firepower 4100 and 9300 Series with FMC/FMCv (FPR 4110, FPR 4112, FPR 4115, FPR 4120, FPR 4125 FPR 4140, FPR 4145, FPR 4150, FPR 9300 SM-24, FPR 9300 SM-36, FPR 9300 SM-40, FPR 9300 SM44, FPR 9300 SM-48 and FPR 9300 SM-56, FMCl 000, FMC2500, FMC4500, FMC1600, FMC2600, FMC4600 and FMCv running on ESXi 6.7 and 7.0 and Cisco UCS-C and E series) |
FTD 7.0 |
NIAP Validation Completed (at Gossamer) |
2023.02.13 |
|
Cisco FTD 7.0/FTDV on ASA 5500 and ISA 3000 with FMC/FMCv (ASA 5508, ASA 5516, ISA 3000, FMC1000, FMC2500, FMC4500, FMC1600, FMC2600, FMC4600, and FMCv running on ESXi 6.7 or 7.0 and Cisco UCS-C and E series and FTDv running on NFVIS v4.4.2 on ENCS 5406, ENCS 5408 AND ENCS 5412
|
FTD 7.0 |
NIAP Validation Completed (at Gossamer) |
2023.02.13 |
|
vSRX3.0 |
Junos OS 22.2R2 |
NIAP Validation Completed (at Acumen) |
2024.01.22 |
|
Junos OS 22.2R1 for SRX Series (SRX1500, SRX4100, SRX4200, SRX4600, SRX5400, SRX5600, and SRX5800) |
22.2R1 |
NIAP Validation Completed (at Teron Labs) |
2023.10.13 |
|
IPsec VPN Client
Click for Selections
Vendor |
Model |
Version |
CNSSP-11 Compliance |
Certification Date |
Notes |
Aruba |
Virtual Intranet Access (VIA) |
4.4 |
NIAP Validation Completed (at Leidos) |
2022.08.31
|
|
AnyConnect for Android 12 |
v5.0 |
NIAP Validation Completed (at Gossamer) |
2023.07.26 |
|
Secure Client - AnyConnect 5.0 for iOS 16 |
v5.0 |
NIAP Validation Completed (at Gossamer) |
2023.10.06 |
|
Secure Client AnyConnect 5.0 for Windows 10 |
v5.0 |
NIAP Validation Completed (at Gossamer) |
2023.12.19 |
|
Samsung Galaxy Devices on Android 13- Spring (Galaxy S23 Ultra 5G, Galaxy S22 Ultra 5G, Galaxy S22 5G, Galaxy S21 Ultra 5G, Galaxy S21 Ultra 5G, Galaxy S20+ 5G, Galaxy S20+ 5G, Galaxy Z Flip, Galaxy XCover Pro, Galaxy A53 5G, Galaxy XCover6 Pro) |
Android 13 |
NIAP Validation Completed (at Gossamer) |
2023.04.26 |
|
Samsung Galaxy Devices on Android 13 – Fall (Galaxy Z Flip5 5G, Galaxy A52 5G, Galaxy A71 5G, Galaxy Tab Active3 and Galaxy S23 FE |
Android 13 |
NIAP Validation Completed (at Gossamer) |
2023.10.23 |
|
Secure Tactical VPN Client for Android
|
v2.3.7 |
NIAP Validation Completed (at Gossamer) |
2023.08.14 |
For Tactical Use Only |
Secure Client- AnyConnect 5.1 for Red Hat Enterprise Linux 8.2 |
AnyConnect 5.1 for Red Hat Enterprise Linux 8.2 |
NIAP Validation Completed (at Gossamer) |
2024.06.25 |
|
Samsung Galaxy Devices on Android 14-Spring (Galaxy S24 Ultra 5G, Galaxy S24 5G, Galaxy S23 Ultra 5G, Galaxy S22 Ultra 5G, Galaxy S22 5G, Galaxy S21 Ultra 5G, Galaxy XCover6 Pro, Galaxy Tab Active5) |
Android 14 |
NIAP Validation Completed (at Gossamer) |
2024.05.06 |
|
IPsec VPN Gateway
Click for Selections
Vendor |
Model |
Version |
CNSSP-11 Compliance |
Certification Date |
Notes |
Apriva MESA VPN |
v3.0 |
NIAP Validation Completed (at Gossamer) |
2023.07.31 |
|
Aruba Mobility Controller 9004, 9012, 9240, 7005, 7008, 7010, 7024, 7030, 7205, 7210, 7220, 7240, 7240XM, 7280, MC-VA-50, MC-VA-250 and MC-VA-1k using ESXi v7 running on HPE EdgeLine EL8000, Pacstar 451/3 and GTS NXGEN-L 11/12 |
ArubaOS 8.10 |
NIAP Validation Completed (at Gossamer) |
2023.05.19 |
|
Cisco FTD 7.0 on Firepower 1000 and 2100 Series with FMC/FMCv (FPR 1010, FPR 1120, FPR 1140, FPR 1150, FPR 2110, FPR 2120, FPR 2130, FPR 2140, FMC1000, FMC2500, FMC4500, FMC1600, FMC2600) |
FTD 7.0 |
NIAP Validation Completed (at Gossamer) |
2023.01.31 |
|
Cisco FTD 7.0/FTDv on Firepower 4100 and 9300 Series with FMC/FMCv (FPR 4110, FPR 4112, FPR 4115, FPR 4120, FPR 4125 FPR 4140, FPR 4145, FPR 4150, FPR 9300 SM-24, FPR 9300 SM-36, FPR 9300 SM-40, FPR 9300 SM44, FPR 9300 SM-48 and. FPR 9300 SM-56, FMClO00, FMC2500, FMC4500, FMC 1600, FMC2600, FMC4600 and FMCv running on ESXi 6. 7 and 7 .0 and Cisco UCS-C and E series) |
FTD 7.0
|
NIAP Validation Completed (at Gossamer) |
2023.02.13 |
|
Catalyst Rugged Series Routers (IR8300) running IOS-XE v17.9 (IR8340-K9) |
IOS-XE v17.9 |
NIAP Validation Completed (at Acumen) |
2023.05.04 |
|
Cisco FTD 7.0/FTDv on ASA 5500 and ISA 3000 with FMC/FMCv" (ASA 5508, ASA 5516, ISA 3000, FMClO00, FMC2500, FMC4500, FMC1600, FMC2600, FMC4600 and FMCv running on ESXi 6.7 and 7.0 and Cisco UCS-C and E series and FTDv running on ESXi 6.7 or 7.0 and Cisco UCS-C and E series and FTDv running on NFVIS v4.4.2 on ENCS 5406, ENCS 5408 AND ENCS 5412) |
FTD 7.0 |
NIAP Validation Completed (at Gossamer) |
2023.02.13 |
|
Catalyst 8000V Edge (C8000V) running IOS-XE v17.9 (C8000V on Cisco UCS C-Series and general purpose computing platform) |
V17.9 |
NIAP Validation Completed (at Acumen) |
2023.05.04 |
|
Cisco 1000 Series Integrated Services Routers (ISR1000) running IOS-XE v17.9 (C1131) |
V17.9 |
NIAP Validation Completed (at Acumen) |
2023.05.04 |
|
Cisco Catalyst 8200 and 8500 Series Edge Routers running IOS-XE v17.6 (C8200-1N-4T, C8200L-1N-4T and C8500L-8S4X) |
IOS-XE v17.6 |
NIAP Validation Completed (at Acumen) |
2023.03.29 |
|
Forcepoint Next Generation Firewall (N120, N120W, N120WL, N120L, N60, N60L, 2201, 2205, 2210, 3401, 3405, 3410 running on ESXi 7.0) |
v6.10.9 |
NIAP Validation Completed (at Gossamer) |
2023.04.24 |
|
GoSilent Cube and GoSilent Server |
v25.01 |
NIAP Validation Completed (at Lightship Security USA) |
2022.12.22 |
|
vSRX3.0 |
Junos OS 22.2R2 |
NIAP Validation Completed (at Acumen) |
2024.01.22 |
|
Junos OS 22.2R1 for SRX Series (SRX1500, SRX4100, SRX4200, SRX4600, SRX5400, SRX5600, and SRX5800) |
22.2R1 |
NIAP Validation Completed (at Teron Labs) |
2023.10.13 |
|
DataSoft Radio Access Point (RAP)-117 |
HW v2.0 and FW v2.2.0 |
NIAP Validation Completed (at Gossamer) |
2023.07.26 |
For Tactical Use Only |
MACSEC Ethernet Encryption Devices
Click for Selection
Vendor |
Model |
Version |
CNSSP-11 Compliance |
Certification Date |
Notes |
Cisco 8000 Series Routers running on IOS-XR 7.3 (8808-SYS, 8812-SYS, 8818-SYS, 8800-RP, 8800-FC, 8800-LC-48H, 8800-LC-36FH-36x400 and 8800-LC-36FH LC)
|
IOS-XR 7.3 |
NIAP Validation Completed (at Acumen) |
2022.11.10 |
|
Catalyst 9200 and 9200L Series Switches running on IOS-XE v17.9 (C9200-24T, C9200-48T, C9200-24P, C9200-48P, C9200-24PB, C9200-48PB, C9200-24PXG, C9200-28PXG, C9200-NM-4G, C9200-NM-4X, C9200-NM-2Y, C9200-NM-2Q, C9200L-24P-4G, C9200L24P-4G, C9200L-48P-4G, C9200L-48PL-4G, C9200L-24P-4X, C9200L-48P-4X, C9200L-48PL-4X, C9200L-24T-4G, C9200L-48T-4G, C9200L-24T-4X, C9200L-48T-4X, C9200L-24PXG-2Y, C9200L-48PXG-2Y, C9200L-24PXG-4X and C9200L-48PXG-4X |
v17.9
|
NIAP Validation Completed (at Gossamer) |
2023.07.25 |
|
Cisco Catalyst 8200 and 8500 Series Edge Routers running IOS-XE v17.6 (C8200-1N-4T, C8200L-1N-4T and C8500L-8S4X) |
IOS-XE v17.6
|
NIAP Validation Completed (at Acumen) |
2023.03.29 |
|
Cisco Catalyst 9300/9300L/9400/9500/9600 Series Switches running IOS-XE 17.9 (C9300-24T, C9300-48T, C9300-24P, C9300-48P, C9300-24U, C9300-48U, C9300-24UX, C9300-48UXM, C9300-48UN, C9300-24S, C9300-48S, C9300D-24UB, C9300D-48UB, C9300D-24UXB, C9300-24H, C9300-48H, C9300NM-4G, C9300-NM-8X, C9300-NM-2Q, C9300-NM-4M,C9300NM-2Y, C9300L-24T-4G, C9300L-48T-4G, C9300L-24P-4G, C9300L-48P-4G, C9300L-24T-4X, C9300L-48T-4X, C9300L-24P-4X, C9300L-48P-4X, C9300L-48PF-4G, C9300L-48PF-4X, C9300L-24UXG-4X, C9300L-24UXG-2Q, C9300L-48UXG-4X, C9300L-48UXG-2Q, C9404R, C9407, C9410R Supervisor: C9400-SUP-1, C9400-SUP-1XL, C9400-SUP-1XL-Y, C400-LC-24S, C9400-LC-48S, C9400-LC-24XS, C9400-LC-48P, C9400-LC-48T, C9400-LC-48U, C9400-LC-48UX, C9400-LC-48H, C9500-12Q, C9500-24Q, C9500-40X, C9500-16X, C9500-32C, C9500-32QC, C9500-24Y4C, C9500-48Y4C, Network Modules: C9500-NM-8X, C9600-LC-48YL, C9600-LC-48TX, C9600-LC-24S |
IOS-XE 17.9 |
NIAP Validation Completed (at Gossamer) |
2023.07.18 |
|
Cisco Catalyst 9400X and 9600X Series Switches running IOS-XE 17.9 (C9400X-SUP-2, C9400X-SUP-2XL, C9400-LC-48HX, C9400-LC-48XS, C9400X-LC-48HN, C9600X-SUP2, C9600-LC-40YL4CD, C9600X-LC-32CD) |
IOS-XE 17.9 |
NIAP Validation Completed (at Gossamer) |
2023.11.13 |
|
Cisco Catalyst 9200CX, 9300X and 9500X Series Switches running IOS-XE 17.9 (C9200CX-12T-2X2G, C9200CX-12P-2X2G, C9200CX-8P-2X2G, C9200CX-12PD-2X2G, C9200CX-8PD-2G, C9200CX-8UXG-2X, C9300X-48HX, C9300X-48TX, C9300X-NM-4C, C9300X-NM-8M, C9300X-NM-2C, C9300X-NM-8Y, C9300X-12Y, C9300X-12Y, C9300X-24Y, C9300X-48HXN, C9300X-24HX, C9300LM-24U, C9300LM-48UX, C9300LM-48T, C9300LM-48U, C9500X-28C8D, C9500X-60L4D |
IOS-XE v17.9 |
NIAP Validation Completed (at Gossamer) |
2023.12.01 |
|
Catalyst Industrial Ethernet 9300 Rugged Series Switches running IOS-XE 17.9 (IE-9310-26S2C, IE-9320-26S2C) |
IOS-XE v17.9 |
NIAP Validation Completed (at Gossamer) |
2023.11.08 |
|
Embedded Services 9300 & 3300 Series Switches running IOS-XE 17.9 (ESS-3300-NCP, ESS-3300-CON ESS, ESS-9300-10X-E) |
IOS-XE 17.9 |
NIAP Validation Completed (at Gossamer) |
2023.10.04 |
|
Aruba 6300M and 8360v2 Switch Series |
v10.11 |
NIAP Validation Completed (at Gossamer) |
2024.04.22 |
|
Catalyst 9200/9200L Series Switches |
IOS-XE 17.12 |
NIAP Validation Completed (at Gossamer) |
2024.07.26 |
|
Aruba 6300M and 8360V2 Series Switches |
Aruba OS-CX v10.11 |
NIAP Validation Completed (at Gossamer) |
2024.04.22 |
|
MDM
Click for Selections
Session Border Controller
Click for Selections
Vendor |
Model |
Version |
CNSSP-11 Compliance |
|
|
|
|
Enterprise Session Controller (aka SIP Server)
Click for Selections
Vendor |
Model |
Version |
CNSSP-11 Compliance |
Certification Date |
Notes |
|
|
|
|
|
|
Software Full Drive Encryption
Click for Selections
TLS Protected Servers
Click for Selections
TLS Software Applications
Click for Selections
Note: Components listed here are validated for their ability to establish a TLS connection as specified in the Capability Packages. Additional functionality not described within the Capability Packages and evaluated by the Protection Profile for Application Software are beyond the scope of CSfC approval.
Traffic Filtering Firewall
Click for Selections
Vendor |
Model |
Version |
CNSSP-11 Compliance |
Certification Date |
Notes |
Aruba Mobility Controller 9004, 9012, 9240, 7005, 7008, 7010, 7024, 7030, 7205, 7210, 7220, 7240, 7240XM, 7280, MC-VA-50, MC-VA-250 and MC-VA-1k using ESXi v7 running on HPE EdgeLine EL8000, Pacstar 451/3 and GTS NXGEN-L 11/12 |
ArubaOS 8.10 |
NIAP Validation Completed (at Gossamer) |
2023.11.20 |
|
Cisco FTD 7.0 on Firepower 1000 and 2100 Series with FMC/FMCv (FPR 1010, FPR 1120, FPR 1140, FPR 1150, FPR 2110, FPR 2120, FPR 2130, FPR 2140, FMC1000, FMC2500, FMC4500, FMC1600, FMC2600, FMC4600 and FMCv running on ESXi 6.7 or 7.0 and Cisco USC-C and E series
|
FTD 7.0 |
NIAP Validation Completed (at Gossamer) |
2023.01.31 |
|
Cisco FTD 7.0/FTDV on ASA 5500 and ISA 3000 with FMC/FMCv (ASA 5508, ASA 5516, ISA 3000, FMCl000, FMC2500, FMC4500, FMC1600, FMC2600, FMC4600 and FMCv running on ESXi 6.7 and 7.0 and Cisco UCS-C and E series and FTDv running on ESXi 6.7 or 7.0 and Cisco UCS-C and E series and FTDv running on NFVIS v4.4.2 on ENCS 5406, ENCS 5408 AND ENCS 5412) |
FTD 7.0
|
NIAP Validation Completed (at Gossamer) |
2023.02.13 |
|
Forcepoint Next Generation Firewall (N120, N120W, N120WL, N120L, N60, N60L, 2201, 2205, 2210, 3401, 3405, 3410 running on ESXi 7.0) |
v6.10.9 |
NIAP Validation Completed (at Gossamer) |
2023.04.24 |
|
vSRX3.0 |
Junos OS 22.2R2 |
NIAP Validation Completed (at Acumen) |
2024.01.22 |
|
Junos OS 22.2R1 for SRX Series (SRX1500, SRX4100, SRX4200, SRX4600, SRX5400, SRX5600, and SRX5800) |
22.2R1 |
NIAP Validation Completed (at Teron Labs) |
2023.10.13 |
|
Klas OS Keel 5.4.0 running on VoyagerVMM, TRX R2, and Voyager VM3.0 |
5.4.0 |
NIAP Validation Completed (at Acumen) |
2024.07.16 |
|
VoIP Applications
Click for Selections
Web Browsers
Click for Selections
Vendor |
Model |
Version |
CNSSP-11 Compliance |
WIDS/WIPS
There is currently no WIDS/WIPS Selection document.
Vendor |
Model |
Version |
CNSSP-11 Compliance |
Certification Date |
Notes |
Commscope Technologies LLC |
Ruckus SmartZone WLAN Controllers and Access Points with WIDS |
R5.2.1.3 |
NIAP Validation Completed (at Gossamer) |
2023.09.19 |
|
WLAN Access System
Click for Selections
Vendor |
Model |
Version |
CNSSP-11 Compliance |
Certification Date |
Notes |
HPE Aruba Networking |
Aruba Mobility Controller 9004, 9012, 9240, 7005, 7008, 7010, 7024, 7030, 7205, 7210, 7220, 7240, 7240XM, 7280, MC-VA-50, MC-VA-250 and MC-VA-1k using ESXi v7 running on HPE EdgeLine EL8000, Pacstar 451/3 and GTS NXGEN-L 11/12 |
ArubaOS 8.10 |
NIAP Validation Completed (at Gossamer) |
2023.05.19 |
|
Commscope Technologies LLC |
Ruckus SmartZone WLAN Controllers and Access Points with WIDS |
R5.2.1.3 |
NIAP Validation Completed (at Gossamer) |
2023.09.19 |
|
Cisco |
Cisco Catalyst 9800 Series Wireless Controllers and Access Points running IOS-XE 17.6 (Cisco 9800-80-K9 Wireless Controller, Cisco 9800-40-K9 Wireless Controller, Cisco 9800-L Wireless Controller: C9800-L-F-K9, C98000L-C-K9 with Cisco Catalyst 9130 Series Wifi 6 Access Points (x=regulatory domain): C9130AXI-x, C9130AXE-x, C1930AXE-STA-x, Cisco Catalyst 9120 Series Wi-fi 6 Access Points (x= regulatory domain): C9120AXI-x, C9120AXE-x, C9120AXP-x, Cisco Catalyst 9115 Series Wi-fi 6 Access Points (x= regulatory domain): C9115AXI-x, C9115AXE-x Cisco Catalyst 9105 Series Wi-fi Access Points (x=regulatory domain): C9105AXI-x, C9105AXW-x, C9105AXIT-x, C9105AXWT-x |
IOS-XE 17.6 |
NIAP Validation Completed (at Lightship Security) |
2023.03.20 |
|
DataSoft Corp |
DataSoft Radio Access Point (RAP)-117
|
HW v2.0 and FW v2.2.0 |
NIAP Validation Completed (at Gossamer) |
2023.07.26 |
For Tactical Use Only |
WLAN Client
All validated End User Device / Mobile Platform components include validated WLAN Client implementations