top of page
logo-color.png

CERTIFIED PRODUCTS

Cisco Systems

 

Cisco Catalyst 8300 Edge Platform

PRODUCT VERSION

17.12.04

DATE: December 4, 2024

SonicWall

 

SonicWall NSa 4700

PRODUCT VERSION:

SonicOS 7.0.1-6009

DATE: October 26. 2024

Cisco Systems

 

Cisco Secure Firewall 3105

PRODUCT VERSION:

7.4.1.1

DATE: October 8, 2024

Palo Alto Networks

PA-450 NGFW

PRODUCT VERSION:

11.0.2-h2

DATE: February 16, 2024

Fortinet

FortiGate 601F NGFW

PRODUCT VERSION:

7.2.6, build1575, 230926 (GA.F)

DATE: February 1, 2024

Juniper Networks

Juniper SRX4600

PRODUCT VERSION:

21.3R91.9
DATE: March21, 2022

Juniper Networks

Juniper SRX4600

PRODUCT VERSION:

20.4R2.5
DATE: July 19, 2021

Trend Micro

TippingPoint Threat Protection System 5500TX

PRODUCT VERSION:

5.4.1.1649

DATE: July 13, 2021

WatchGuard Technologies

Firebox T40

PRODUCT VERSION:

12.6.4 (Build 635642)

DATE: April 16, 2021

Fortinet

FortiGate 500E

PRODUCT VERSION:

6.0.6, Build0272, 190716 (GA)

DATE: February 19, 2020

WatchGuard Technologies

Firebox M5800

PRODUCT VERSION:

12.6.2 (Build 628008)

DATE: December 6, 2020

Palo Alto Networks

PA-3250 NGFW

PRODUCT VERSION:

9.0.5

DATE: February 19, 2020

Palo Alto Networks

PA-3250 NGFW
PRODUCT VERSION:

9.0.7

DATE: May 14, 2020

SonicWall

NSA 4650

PRODUCT VERSION:

SonicOS Enhanced 6.5.0.11

DATE: February 19, 2020

Cisco Systems

Firepower 4120

PRODUCT VERSION:

6.4.0.4

DATE: February 19, 2020

Certified products are tested against the set of requirements current when testing began. The current requirements can be found below:

Additionally, the CVE vulnerability set was split into two sets, one public and one private. The only purpose of testing with these sets was to ensure that the security function of the Device Under Test (DUT) was active. In no way should the results articulated be considered to reflect how effective the security of the DUT was.


Finally, the DUT vendors were only provided with the public vulnerability set. The private set was used to ensure that no one would game the test.

Availability of DUT config and Test Tool config

In order to ensure the transparency of the certification testing the test labs, DUT vendors and test tool
vendors are required to provide the configurations use during the test.


The DUT vendor is to provide the configuration of the DUT used during testing. The test tool vendor is to
provide the default configuration of the test tool used. The labs are required to document any changes
to the test tool default configuration in their test report.


These configurations files and information are available to all interested parties. Please contact the
NetSecOPEN Certification Body at netsecopen-cert-body@netsecopen.org. You will be asked to provide
verifiable information to confirm your identity. (This information will not be shared outside of
NetSecOPEN.)

bottom of page