top of page
logo-color.png

CERTIFIED PRODUCTS

Palo Alto Networks

PA-450 NGFW

PRODUCT VERSION

11.0.2-h2

DATE: February 16, 2024

Fortinet

FortiGate 601F NGFW

PRODUCT VERSION:

7.2.6, build1575, 230926 (GA.F)

DATE: February 1, 2024

Juniper Networks

Juniper SRX4600

PRODUCT VERSION

21.3R1.9

DATE: March 21, 2022

Juniper Networks

Juniper SRX4600

PRODUCT VERSION

20.4R2.5

DATE: July 29, 2021

Trend Micro

TippingPoint Threat Protection System 5500TX

PRODUCT VERSION

5.4.1.1649

DATE: July 13, 2021

WatchGuard Technologies

Firebox T40

PRODUCT VERSION

12.6.4 (Build 635642)

DATE: April 16, 2021

WatchGuard Technologies

Firebox M5800

PRODUCT VERSION

12.6.2 (Build 628008)

DATE: December 6, 2020

Palo Alto Networks

PA-3250 NGFW

PRODUCT VERSION

9.0.7

DATE: May 14, 2020

Cisco Systems

Firepower 4120

PRODUCT VERSION:

6.4.0.4

DATE: February 19, 2020

Fortinet

FortiGate 500E

PRODUCT VERSION:

6.0.6, Build0272, 190716 (GA)

DATE: February 19, 2020

Palo Alto Networks

PA-3250 NGFW

PRODUCT VERSION:

9.0.5

DATE: February 19, 2020

SonicWall

NSA 4650

PRODUCT VERSION:

SonicOS Enhanced 6.5.0.11

DATE: February 19, 2020

Certified products are tested against the set of requirements current when testing began. The current requirements can be found below:

Additionally, the CVE vulnerability set was split into two sets, one public and one private. The only purpose of testing with these sets was to ensure that the security function of the Device Under Test (DUT) was active. In no way should the results articulated be considered to reflect how effective the security of the DUT was.


Finally, the DUT vendors were only provided with the public vulnerability set. The private set was used to ensure that no one would game the test.

Availability of DUT config and Test Tool config

In order to ensure the transparency of the certification testing the test labs, DUT vendors and test tool
vendors are required to provide the configurations use during the test.


The DUT vendor is to provide the configuration of the DUT used during testing. The test tool vendor is to
provide the default configuration of the test tool used. The labs are required to document any changes
to the test tool default configuration in their test report.


These configurations files and information are available to all interested parties. Please contact the
NetSecOPEN Certification Body at netsecopen-cert-body@netsecopen.org. You will be asked to provide
verifiable information to confirm your identity. (This information will not be shared outside of
NetSecOPEN.)

bottom of page