{"product_id":11500,"v_id":11500,"product_name":"Palo Alto Networks M-200, M-300, M-600, and M-700 Hardware, and Virtual Appliances all running Panorama 11.1","certification_status":"Certified","certification_date":"2025-05-19T00:00:00Z","tech_type":"Network Device","vendor_id":{"name":"Palo Alto Networks, Inc.","website":"https://www.paloaltonetworks.com"},"vendor_poc":"Jake Bajic","vendor_phone":"408-753-3901","vendor_email":"jbajic@paloaltonetworks.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">Palo Alto Networks Panorama management appliances provide centralized monitoring and management of Palo Alto Networks next-generation firewalls and Wildfire appliances. It provides a single location from which administrators can oversee all applications, users, and content traversing the whole network, and then use this knowledge to create application enablement policies that control and protect the network. Using Panorama for centralized policy and firewall management increases operational efficiency in managing and maintaining a network of firewalls.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE models included in the evaluation are Palo Alto Networks Panorama M-200, M-300, M-600, and M-700 models, and Panorama Virtual Appliance, all running version 11.1.&nbsp; </span></p>\r\n<p style=\"margin: 0in 0in 3pt; text-align: justify; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">The Panorama Virtual Appliance is supported on the following hypervisors:</span></p>\r\n<ul style=\"margin-top: 0in; margin-bottom: 3.0pt;\">\r\n<li style=\"margin: 0in 0in 3pt 0px; text-align: justify; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">VMware ESXi with vSphere 7.0</span></li>\r\n</ul>\r\n<ul style=\"margin-top: 0in; margin-bottom: 3.0pt;\">\r\n<li style=\"margin: 0in 0in 3pt 0px; text-align: justify; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">Linux KVM on Ubuntu 20.04</span></li>\r\n<li style=\"margin: 0in 0in 3pt 0px; text-align: justify; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">Microsoft Hyper-V Server 2019.</span></li>\r\n</ul>","evaluation_configuration":"<p style=\"margin: 0in 0in 3pt; text-align: justify; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0in 0in 3pt; text-align: justify; font-size: 11pt; font-family: Calibri, sans-serif;\">The evaluated version of the TOE consists of Palo Alto Panorama 11.1.9-c2 running on the following physical and virtual appliances:</p><ul style=\"margin-bottom: 0in; margin-top: 0px;\" data-mce-style=\"margin-bottom: 0in; margin-top: 0px;\"><li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">M-200 </span></li><li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">M-300</span></li><li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">M-600</span></li><li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">M-700 </span></li></ul><ul style=\"margin-top: 0in; margin-bottom: 6.0pt;\" data-mce-style=\"margin-top: 0in; margin-bottom: 6.0pt;\"><li style=\"margin: 0in 0in 6pt 0px; text-align: justify; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"margin: 0in 0in 6pt 0px; text-align: justify; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">Panorama Virtual Appliance.</span></li></ul><p style=\"text-align: justify; margin: 0in; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"text-align: justify; margin: 0in; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">The Panorama Virtual Appliance is supported on the following hypervisors:</span></p><ul style=\"margin-bottom: 0in; margin-top: 0px;\" data-mce-style=\"margin-bottom: 0in; margin-top: 0px;\"><li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">VMware ESXi with vSphere 7.0</span></li><li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">Microsoft Hyper-V Server 2019 </span></li><li style=\"margin: 0in 0in 6pt 0px; text-align: justify; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"margin: 0in 0in 6pt 0px; text-align: justify; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">Kernel-based Virtual Machine (KVM) on Ubuntu 20.04.</span></li></ul><p style=\"margin: 0in; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"margin: 0in; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">The CCTL conducted evaluation testing of the Panorama Virtual Appliance on the following platforms:</span></p><p style=\"margin: 0in 0in 0in 0.25in; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"margin: 0in 0in 0in 0.25in; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">VMware ESXi 7.0:</span></p><ul style=\"margin-bottom: 0in; margin-top: 0px;\" data-mce-style=\"margin-bottom: 0in; margin-top: 0px;\"><li style=\"text-align: justify; margin: 0in 0in 0in 24px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"text-align: justify; margin: 0in 0in 0in 24px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">Dell PowerEdge R740 Processor:  Intel Xeon Gold 6248 (Cascade Lake microarchitecture) with Broadcom 57416 NIC</span></li><li style=\"text-align: justify; margin: 0in 0in 0in 24px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"text-align: justify; margin: 0in 0in 0in 24px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">Memory: 128 GB RDIMM</span></li></ul><p style=\"margin: 0in 0in 0in 0.25in; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"margin: 0in 0in 0in 0.25in; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">Microsoft Hyper-V Server 2019:</span></p><ul style=\"margin-bottom: 0in; margin-top: 0px;\" data-mce-style=\"margin-bottom: 0in; margin-top: 0px;\"><li style=\"text-align: justify; margin: 0in 0in 0in 24px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"text-align: justify; margin: 0in 0in 0in 24px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">Dell PowerEdge R740 Processor:  Intel Xeon Gold 6248 (Cascade Lake microarchitecture) with Broadcom 57416 NIC</span></li><li style=\"text-align: justify; margin: 0in 0in 0in 24px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"text-align: justify; margin: 0in 0in 0in 24px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">Memory: 128 GB RDIMM</span></li></ul><p style=\"margin: 0in 0in 0in 0.25in; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"margin: 0in 0in 0in 0.25in; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">Linux KVM 4 Ubuntu 20.04:</span></p><ul style=\"margin-bottom: 0in; margin-top: 0px;\" data-mce-style=\"margin-bottom: 0in; margin-top: 0px;\"><li style=\"text-align: justify; margin: 0in 0in 0in 24px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"text-align: justify; margin: 0in 0in 0in 24px; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">Dell PowerEdge R740 Processor:  Intel Xeon Gold 6248 (Cascade Lake microarchitecture) with Broadcom 57416 NIC</span></li><li style=\"margin: 0in 0in 6pt 24px; text-align: justify; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\" data-mce-style=\"margin: 0in 0in 6pt 24px; text-align: justify; font-size: 12pt; font-family: Calibri, sans-serif; color: black;\"><span style=\"font-size: 11.0pt;\" data-mce-style=\"font-size: 11.0pt;\">Memory: 128 GB RDIMM.</span></li></ul>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme for the <em>collaborative Protection Profile for Network Devices</em> [NDcPP] and <em>Functional Package for Secure Shell (SSH) </em>[SSHPKG]. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 release 5. The product, when delivered and configured as identified in the guidance document, satisfies all of the security functional requirements stated in the Palo Alto Networks M-200, M-300, M-600, and M-700 Hardware, and Virtual Appliances all running Panorama 11.1 Security Target. The evaluation was completed in May 2025. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.</p>","environmental_strengths":"<p style=\"margin: 0in 0in 6pt; line-height: normal; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><em><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif; color: black;\">Security Audit</span></em></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE generates logs for security relevant events including the events specified in [NDcPP]</span><span style=\"font-family: Calibri, sans-serif;\"> </span><span style=\"font-family: Calibri, sans-serif;\">and [SSHPKG]. By default, the TOE stores the logs locally so they can be accessed by an administrator. The TOE can also be configured to send the logs securely to a designated external log server. </span></p>\r\n<p style=\"margin: 0in 0in 6pt; line-height: normal; break-after: avoid; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><em><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">Cryptographic Support</span></em></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE implements NIST-validated cryptographic algorithms that provide key management, random bit generation, encryption/decryption, digital signature generation and verification, cryptographic hashing, and keyed-hash message authentication features in support of higher-level cryptographic protocols, including SSH and TLS. </span></p>\r\n<p style=\"margin: 0in 0in 6pt; line-height: normal; break-after: avoid; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><em><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">Identification and Authentication</span></em></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE requires all users accessing the TOE user interfaces to be successfully identified and authenticated before they can access any security management functions available in the TOE. The TOE offers remote network accessible (HTTPS, SSH) connections to the GUI and CLI for interactive administrator sessions and HTTPS for XML and REST APIs.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE supports the local (i.e., on device) definition and authentication of administrators with username, password</span><span style=\"font-family: Calibri, sans-serif;\"> </span><span style=\"font-family: Calibri, sans-serif;\">or public-key, and role (set of privileges), </span><span style=\"font-family: Calibri, sans-serif;\">which it uses to authenticate the human user and to associate that user with an authorized role. In addition, the TOE can authenticate users using X.509 certificates and can be configured to lock a user out after a configurable number of unsuccessful authentication attempts.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; line-height: normal; break-after: avoid; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><em><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">Security Management</span></em></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE provides a GUI, CLI, or API (XML and REST) to access the security management functions. Security management commands are limited to administrators and are available only after they have provided acceptable user identification and authentication data to the TOE. The TOE provides access to the GUI/API/CLI remotely using an HTTPS/TLS or SSHv2 client.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE provides a number of management functions and restricts them to users with the appropriate privileges. The management functions include the capability to configure the audit function, configure the idle timeout, and review the audit trail. The TOE provides pre-defined Security Administrator, Audit Administrator, and Cryptographic Administrator roles. These administrator roles are all considered Security Administrator as defined in the [NDcPP].</span></p>\r\n<p style=\"margin: 0in 0in 6pt; line-height: normal; break-after: avoid; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><em><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">Protection of the TSF</span></em></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE implements mechanisms to protect itself to ensure the reliability and integrity of its security features.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">It protects particularly sensitive data such as stored passwords and cryptographic keys so that they are not accessible even by an administrator. It also provides its own timing mechanism to ensure that reliable time information is available (e.g., for log accountability). </span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE includes functions to perform self-tests so that it can detect when it is failing. It also includes mechanism to verify TOE updates to prevent malicious or other unexpected changes in the TOE.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; line-height: normal; break-after: avoid; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><em><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">TOE Access</span></em></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE provides the capability to terminate a remote interactive session after a period of inactivity and supports administrator-initiated termination of the administrator&rsquo;s own interactive session. The TOE will display an advisory and consent warning message regarding unauthorized use of the TOE before establishing a user session.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; line-height: normal; break-after: avoid; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><em><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">Trusted Path/Channels</span></em></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif; color: black;\">The TOE protects interactive communication with remote administrators using SSH or HTTP over TLS (HTTPS). SSH and TLS ensure both integrity and disclosure protection of channel data.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif; color: black;\">The TOE protects communication with the syslog server, Palo Alto Networks firewalls and Wildfire Appliances using TLS connections.</span></p>","features":[{"id":3262,"feature_name":"Asymmetric Key Generation"},{"id":3340,"feature_name":"Auditing"},{"id":3265,"feature_name":"Cryptographic Hashing"},{"id":3263,"feature_name":"Cryptographic Key Establishment"},{"id":3264,"feature_name":"Cryptographic Signature Verification"},{"id":3261,"feature_name":"DRBG"},{"id":3339,"feature_name":"Flaw Remediation"},{"id":3266,"feature_name":"Keyed-hash message authentication"},{"id":3260,"feature_name":"SSH Server"}]}