{"_id": "07bffc2fb1a2fbc4", "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "07bffc2fb1a2fbc4", "status": "archived", "category": "Network and Network-Related Devices and Systems", "name": "Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y", "manufacturer": "HPE Juniper Networking", "scheme": "AU", "security_level": {"_type": "Set", "elements": []}, "not_valid_before": "2021-02-15", "not_valid_after": "2026-02-15", "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/T0017-Certification_Report_V1.0.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20QFX5120,%20QFX5200,%20QFX5210,%20EX4650%20Junos%2020.2R1%20ST%20v1.3.pdf", "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T017%20Cert%202021_135%20OS.pdf", "manufacturer_web": "https://www.juniper.net/", "protection_profile_links": {"_type": "Set", "elements": ["https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf"]}, "maintenance_updates": {"_type": "Set", "elements": []}, "state": {"_type": "sec_certs.sample.cc_eucc_common.InternalState", "report": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "bddf13f40de3d9cb92c9abbe68aaa10b8a6c79a9e423de8f190974b3a8ee8e6f", "txt_hash": "10a9390fcc6bc5718d0eb46eeaee9398795880e05eb10a244c0f2eac3e05f7eb", "json_hash": null}, "st": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "6472d784f3dfccd33f0ced9d81e9b904a4e58afa199091a0ca27c662b06f4377", "txt_hash": "d2fe8cca8851a7d5afb3d7d84a8c94ddd36185f2efb521bfcc984a24b4f04847", "json_hash": null}, "cert": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": false, "pdf_hash": "fac57c0015453f0c9dbbafae4d15f8fa5be325d7822a4e933cb2daeef767ed2f", "txt_hash": "5213f572633178f75f44b712500bac6362c1fb121bb5cdfc9658182f29bc9280", "json_hash": null}}, "pdf_data": {"_type": "sec_certs.sample.cc_eucc_common.PdfData", "report_metadata": {"pdf_file_size_bytes": 3964125, "pdf_is_encrypted": false, "pdf_number_of_pages": 17, "/CreationDate": "D:20210128143119+11'00'", "/ModDate": "D:20210128143119+11'00'", "pdf_hyperlinks": {"_type": "Set", "elements": ["https://www.nzism.gcsb.govt.nz/ism-document/", "https://www.commoncriteriaportal.org/", "https://www.cyber.gov.au/ism", "https://www.cyber.gov.au/sites/default/files/2019-03/AISEP_Policy_Manual.pdf", "https://www.gcsb.govt.nz/", "https://support.juniper.net/support"]}}, "st_metadata": {"pdf_file_size_bytes": 880547, "pdf_is_encrypted": false, "pdf_number_of_pages": 46, "/Producer": "Microsoft\u00ae Word for Microsoft 365", "/Creator": "Microsoft\u00ae Word for Microsoft 365", "/CreationDate": "D:20210317120949+11'00'", "/ModDate": "D:20210317120949+11'00'", "pdf_hyperlinks": {"_type": "Set", "elements": ["http://www.juniper.net/", "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0453"]}}, "cert_metadata": null, "report_frontpage": {}, "st_frontpage": null, "cert_frontpage": null, "report_keywords": {"cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": {"Teron": {"Teron Labs": 4}}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {"SSH": {"SSH": 3, "SSHv2": 2}}, "randomness": {"RNG": {"RBG": 1}}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {}}, "st_keywords": {"cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {"ADV": {"ADV_FSP.1": 1}, "AGD": {"AGD_PRE.1": 1, "AGD_OPE.1": 1}, "ALC": {"ALC_CMC.1": 1, "ALC_CMS.1": 1}, "ATE": {"ATE_IND.1": 1}, "AVA": {"AVA_VAN": 1, "AVA_VAN.1": 1}, "ASE": {"ASE_CCL.1": 1, "ASE_ECD.1": 1, "ASE_INT.1": 1, "ASE_OBJ.1": 1, "ASE_REQ.1": 1, "ASE_SPD.1": 1, "ASE_TSS.1": 1}}, "cc_sfr": {"FAU": {"FAU_GEN": 2, "FAU_STG_EXT": 2, "FAU_GEN.1": 10, "FAU_GEN.1.1": 1, "FAU_GEN.1.2": 1, "FAU_GEN.2": 5, "FAU_STG_EXT.1": 5, "FAU_STG": 1, "FAU_GEN.2.1": 1, "FAU_STG_EXT.1.1": 1, "FAU_STG_EXT.1.2": 1, "FAU_STG_EXT.1.3": 1, "FAU_STG.1": 4, "FAU_STG.1.1": 1, "FAU_STG.1.2": 1}, "FCS": {"FCS_CKM": 2, "FCS_COP": 28, "FCS_RBG_EXT": 2, "FCS_TLSC_EXT.1.1": 2, "FCS_NTP_EXT.1.4": 1, "FCS_SSHS_EXT.1.5": 2, "FCS_SSHC_EXT.1.5": 1, "FCS_CKM.2": 10, "FCS_CKM.1": 17, "FCS_CKM.4": 11, "FCS_RBG_EXT.1": 7, "FCS_SSHS_EXT": 1, "FCS_CKM.1.1": 1, "FCS_CKM.2.1": 1, "FCS_CKM.4.1": 1, "FCS_COP.1": 6, "FCS_RBG_EXT.1.1": 2, "FCS_RBG_EXT.1.2": 1, "FCS_SSHS_EXT.1": 6, "FCS_SSHS_EXT.1.1": 1, "FCS_SSHS_EXT.1.2": 1, "FCS_SSHS_EXT.1.3": 1, "FCS_SSHS_EXT.1.4": 1, "FCS_SSHS_EXT.1.6": 1, "FCS_SSHS_EXT.1.7": 1, "FCS_SSHS_EXT.1.8": 1}, "FIA": {"FIA_AFL": 2, "FIA_PMG_EXT": 2, "FIA_UIA_EXT": 2, "FIA_UAU": 2, "FIA_UAU_EXT": 2, "FIA_AFL.1": 9, "FIA_PMG_EXT.1": 5, "FIA_UIA_EXT.1": 11, "FIA_UAU_EXT.2": 5, "FIA_UAU.7": 5, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_PMG_EXT.1.1": 1, "FIA_UIA_EXT.1.1": 1, "FIA_UIA_EXT.1.2": 1, "FIA_UAU_EXT.2.1": 1, "FIA_UAU.7.1": 1, "FIA_UID.1": 3}, "FMT": {"FMT_MOF": 19, "FMT_MTD": 14, "FMT_SMF": 2, "FMT_SMR": 2, "FMT_SMF.1": 13, "FMT_SMR.2": 12, "FMT_MOF.1": 3, "FMT_MTD.1": 2, "FMT_SMF.1.1": 1, "FMT_SMR.2.1": 1, "FMT_SMR.2.2": 1, "FMT_SMR.2.3": 1, "FMT_SMR.1": 5}, "FPT": {"FPT_SKP_EXT": 2, "FPT_APW_EXT": 2, "FPT_TST_EXT": 2, "FPT_TUD_EXT": 2, "FPT_STM_EXT": 2, "FPT_APW_EXT.1": 6, "FPT_TUD_EXT.1": 7, "FPT_SKP_EXT.1": 5, "FPT_TST_EXT.1": 6, "FPT_STM_EXT.1": 2, "FPT_SKP_EXT.1.1": 1, "FPT_APW_EXT.1.1": 1, "FPT_APW_EXT.1.2": 1, "FPT_TST_EXT.1.1": 1, "FPT_TUD_EXT.1.1": 1, "FPT_TUD_EXT.1.2": 1, "FPT_TUD_EXT.1.3": 1, "FPT_STM": 3, "FPT_STM_EXT.1.1": 1, "FPT_STM_EXT.1.2": 1, "FPT_STM.1": 3}, "FTA": {"FTA_SSL_EXT": 2, "FTA_SSL": 2, "FTA_TAB": 2, "FTA_SSL_EXT.1": 7, "FTA_SSL.3": 8, "FTA_SSL.4": 6, "FTA_TAB.1": 9, "FTA_SSL_EXT.1.1": 1}, "FTP": {"FTP_ITC": 2, "FTP_TRP": 8, "FTP_TUD.1": 1, "FTP_ITC.1": 22, "FTP_ITC.1.1": 1, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP.1": 3, "FTP_ITC.2": 6}}, "cc_claims": {"T": {"T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1, "T.WEAK_CRYPTOGRAPHY": 1, "T.UNTRUSTED_COMMUNICATION_CHANNELS": 1, "T.WEAK_AUTHENTICATION_ENDPOINTS": 1, "T.UPDATE_COMPROMISE": 1, "T.UNDETECTED_ACTIVITY": 1, "T.SECURITY_FUNCTIONALITY_COMPROMISE": 1, "T.PASSWORD_CRACKING": 1, "T.SECURITY_FUNCTIONALITY_FAILURE": 1}, "A": {"A.PHYSICAL_PROTECTION": 1, "A.LIMITED_FUNCTIONALITY": 1, "A.NO_THRU_TRAFFIC_PROTECTION": 1, "A.TRUSTED_ADMINSTRATOR": 1, "A.REGULAR_UPDATES": 1, "A.ADMIN_CREDENTIALS_SECURE": 1, "A.RESIDUAL_INFORMATION": 1}, "OE": {"OE.PHYSICAL": 1, "OE.NO_GENERAL_PURPOSE": 1, "OE.NO_THRU_TRAFFIC_PROTECTION": 1, "OE.TRUSTED_ADMIN": 1, "OE.UPDATES": 1, "OE.ADMIN_CREDENTIALS_SECURE": 1, "OE.RESIDUAL_INFORMATION": 1}}, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {"AES_competition": {"AES": {"AES": 9}}, "constructions": {"MAC": {"HMAC": 1, "HMAC-SHA-256": 3, "HMAC-SHA-512": 2}}}, "asymmetric_crypto": {"RSA": {"RSA 2048": 1}, "ECC": {"ECDH": {"ECDH": 4}, "ECDSA": {"ECDSA": 8}, "ECC": {"ECC": 5}}, "FF": {"DH": {"Diffie-Hellman": 4, "DH": 2}}}, "pq_crypto": {}, "hash_function": {"SHA": {"SHA1": {"SHA-1": 2, "SHA1": 4}, "SHA2": {"SHA-256": 3, "SHA-384": 4, "SHA-512": 2}}}, "crypto_scheme": {"MAC": {"MAC": 2}, "KEX": {"Key Exchange": 3, "Key exchange": 1}}, "crypto_protocol": {"SSH": {"SSH": 97, "SSHv2": 11}, "TLS": {"SSL": {"SSL": 2}, "TLS": {"TLS": 7, "TLS1.1": 1, "TLS1.2": 1}}}, "randomness": {"PRNG": {"DRBG": 4}, "RNG": {"RNG": 1, "RBG": 2}}, "cipher_mode": {"CBC": {"CBC": 4}, "CTR": {"CTR": 4}}, "ecc_curve": {"NIST": {"P-256": 8, "P-384": 6, "P-521": 6}}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {"OpenSSL": {"OpenSSL": 3}}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"FIPS": {"FIPS PUB 186-4": 6, "FIPS 197": 2, "FIPS 180-4": 3, "FIPS 198-1": 3, "FIPS 186-4": 2}, "PKCS": {"PKCS #1": 1, "PKCS#1": 1}, "RFC": {"RFC 3526": 2, "RFC 4253": 3, "RFC3526": 1, "RFC 4251": 2, "RFC 5656": 1, "RFC 4252": 1, "RFC 4254": 1, "RFC5656": 1, "RFC 6668": 1}, "ISO": {"ISO/IEC 9796-2": 1, "ISO/IEC 14888-3": 1, "ISO/IEC 18031:2011": 2}, "X509": {"X.509": 3}, "CC": {"CCMB-2017-04-001": 1, "CCMB-2017-04-002": 1, "CCMB-2017-04-003": 1, "CCMB-2012-09-004": 1}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {"OutOfScope": {"out of scope": 1, "It first provides a descriptive overview of the TOE and then summarises the items which are out of scope of the TOE. 1.5.1 Overview 5. The Target of Evaluation (TOE) is Juniper Networks, Inc. Junos OS 20": 1}}}, "cert_keywords": {"cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {}}, "report_filename": "T0017-Certification_Report_V1.0.pdf", "st_filename": "Juniper QFX5120, QFX5200, QFX5210, EX4650 Junos 20.2R1 ST v1.3.pdf", "cert_filename": "EFT-T017 Cert 2021_135 OS.pdf"}, "heuristics": {"_type": "sec_certs.sample.cc_eucc_common.Heuristics", "extracted_versions": {"_type": "Set", "elements": ["20.2"]}, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": null, "cert_id": "Certificate Number: 2021/135", "prev_certificates": null, "next_certificates": null, "st_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "report_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "annotated_references": null, "extracted_sars": {"_type": "Set", "elements": [{"_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 1}]}, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": null, "protection_profiles": null, "eal": null}}