Juniper Networks IDP 4.0 & NSM 2006.1
CSV information ?
Status | archived |
---|---|
Valid from | 23.10.2006 |
Valid until | 06.09.2012 |
Scheme | 🇺🇸 US |
Manufacturer | Juniper Networks, Inc. |
Category | Network and Network-Related Devices and Systems |
Security level | EAL2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Vendor
MicrosoftSecurity level
EAL 2Claims
T.COMDIS, T.COMINT, T.FACCNT, T.IMPCON, T.INFLUX, T.LOSSOF, T.NOHALT, T.PRIVIL, T.FALACT, T.FALASC, T.FALREC, T.INADVE, T.MISACT, T.MISUSE, T.SCNCFG, T.SCNMLC, T.SCNVUL, A.ACCESS, A.ASCOPE, A.DYNMIC, A.MANAGE, A.NOEVIL, A.NOTRST, A.LOCATE, A.PROTCTCertificates
CCEVS-VR-06-0043Side-channel analysis
malfunctionFile metadata
Title | Validation Report for Juniper Networks |
---|---|
Author | Validation Team |
Creation date | D:20061101093929-05'00' |
Modification date | D:20061101093947-05'00' |
Pages | 16 |
Creator | Acrobat PDFMaker 7.0 for Word |
Producer | Acrobat Distiller 7.0 (Windows) |
Frontpage
Certificate ID | CCEVS-VR-06-0043 |
---|---|
Certified item | Juniper Networks JUNIPER NETWORKS IDP 4.0 & NSM 2006.1 |
Certification lab | US NIAP |
Security target ?
Extracted keywords
Hash functions
MD5Protocols
SSHVendor
MicrosoftSecurity level
EAL2, EAL 2, EAL1Claims
O.ACCESS, O.EADMIN, O.IDAUTH, O.IDSENS, O.OFLOWS, O.RESPON, O.CREDEN, O.INTROP, O.PHYCAL, O.AUDITS, O.IDANLZ, O.IDSCAN, O.INTEGR, O.PROTCT, O.INSTAL, O.PERSON, O.EXPORT, T.COMDIS, T.FACCNT, T.FALASC, T.IMPCON, T.INFLUX, T.MISACT, T.NOHALT, T.SCNCFG, T.SCNVUL, T.COMINT, T.LOSSOF, T.PRIVIL, T.FALACT, T.FALREC, T.INADVE, T.MISUSE, T.SCNMLC, A, A.ACCESS, A.DYNMIC, A.MANAGE, A.NOTRST, A.ASCOPE, A.NOEVIL, A.LOCATE, A.PROTCT, OE.AUDIT_PROTECTION, OE.TIME, OE.PROTECTSecurity Assurance Requirements (SAR)
ACM_CAP, ACM_CAP.2, ADO_DEL, ADO_IGS, ADO_DEL.1, ADO_IGS.1, ADV_FSP, ADV_HLD, ADV_RCR, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM, AGD_USR, AGD_ADM.1, AGD_USR.1, ATE_COV, ATE_FUN, ATE_IND, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF, AVA_VLA, AVA_SOF.1, AVA_VLA.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.4, FAU_STG.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.4.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_UAU, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL.1, FMT_MOF.1, FMT_MTD, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MDT.1, FPT_ITT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_ITT.1.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1, FPT_ITA.1, FPT_ITC.1, FPT_ITI.1, FPT_STMSide-channel analysis
malfunctionStandards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Security Target |
---|---|
Keywords | Intrusion Detection System (IDS), Intrusion Detection & Prevention system (IDP), IDP Sensorâ„¢, the IDP Management Serverâ„¢, IDP User Interfaceâ„¢ |
Author | |
Creation date | D:20061101102236-05'00' |
Modification date | D:20061101103840-05'00' |
Pages | 91 |
Creator | Acrobat PDFMaker 7.0 for Word |
Producer | Acrobat Distiller 7.0 (Windows) |
Heuristics ?
Extracted SARs
ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_VLA.1Scheme data ?
Product | Juniper Networks IDP 4.0 and NSM 2006.1 | |
---|---|---|
Id | CCEVS-VR-VID10045 | |
Url | https://www.niap-ccevs.org/product/10045 | |
Certification Date | 23.10.2006 | |
Expiration Date | None | |
Category | Wireless Monitoring | |
Vendor | Juniper Networks, Inc. | |
Evaluation Facility | Leidos Common Criteria Testing Laboratory | |
Scheme | US |
References ?
No references are available for this certificate.
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Juniper Networks IDP 4.0 and NSM 2006.1', 'id': 'CCEVS-VR-VID10045', 'url': 'https://www.niap-ccevs.org/product/10045', 'certification_date': '2006-10-23', 'expiration_date': None, 'category': 'Wireless Monitoring', 'vendor': 'Juniper Networks, Inc.', 'evaluation_facility': 'Leidos Common Criteria Testing Laboratory', 'scheme': 'US'}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2006-10-23'}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a9a53c19529c17bb454bf50e828dc9e8e480a2902763471c6aa30c6d0a52dc6f', 'txt_hash': 'cb58a3c22bfaec1928856e8cd27bc8e11c5eb68a0fc001b7206b938b06286c91'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 129187, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': "D:20061101093929-05'00'", '/_EmailSubject': 'VR', '/Author': 'Validation Team', '/Creator': 'Acrobat PDFMaker 7.0 for Word', '/_AuthorEmailDisplayName': 'Ashby,Victoria A.', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/_AuthorEmail': '[email protected]', '/ModDate': "D:20061101093947-05'00'", '/_AdHocReviewCycleID': '508012059', '/Company': 'MITRE and NSA', '/SourceModified': 'D:20061101143832', '/Title': 'Validation Report for Juniper Networks', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'US': {'cert_id': 'CCEVS-VR-06-0043', 'cert_item': 'Juniper Networks JUNIPER NETWORKS IDP 4.0 & NSM 2006.1', 'cert_lab': 'US NIAP'}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-06-0043': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 4}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.COMDIS': 1, 'T.COMINT': 1, 'T.FACCNT': 1, 'T.IMPCON': 1, 'T.INFLUX': 1, 'T.LOSSOF': 1, 'T.NOHALT': 1, 'T.PRIVIL': 1, 'T.FALACT': 1, 'T.FALASC': 1, 'T.FALREC': 1, 'T.INADVE': 1, 'T.MISACT': 1, 'T.MISUSE': 1, 'T.SCNCFG': 1, 'T.SCNMLC': 1, 'T.SCNVUL': 1}, 'A': {'A.ACCESS': 1, 'A.ASCOPE': 1, 'A.DYNMIC': 1, 'A.MANAGE': 1, 'A.NOEVIL': 1, 'A.NOTRST': 1, 'A.LOCATE': 1, 'A.PROTCT': 1}}, 'vendor': {'Microsoft': {'Microsoft': 4}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
st_vid10045-vr.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
. - The cert_id property was set to
CCEVS-VR-0043-2006
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10045-vr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10045-st.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Juniper Networks IDP 4.0 & NSM 2006.1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "269fe84a0f9bf6f4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-0043-2006",
"cert_lab": [
"US"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2006.1",
"4.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Wireless Monitoring",
"certification_date": "2006-10-23",
"evaluation_facility": "Leidos Common Criteria Testing Laboratory",
"expiration_date": null,
"id": "CCEVS-VR-VID10045",
"product": "Juniper Networks IDP 4.0 and NSM 2006.1",
"scheme": "US",
"url": "https://www.niap-ccevs.org/product/10045",
"vendor": "Juniper Networks, Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Juniper Networks, Inc.",
"manufacturer_web": "https://www.juniper.net/",
"name": "Juniper Networks IDP 4.0 \u0026 NSM 2006.1",
"not_valid_after": "2012-09-06",
"not_valid_before": "2006-10-23",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "st_vid10045-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-06-0043",
"cert_item": "Juniper Networks JUNIPER NETWORKS IDP 4.0 \u0026 NSM 2006.1",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-06-0043": 1
}
},
"cc_claims": {
"A": {
"A.ACCESS": 1,
"A.ASCOPE": 1,
"A.DYNMIC": 1,
"A.LOCATE": 1,
"A.MANAGE": 1,
"A.NOEVIL": 1,
"A.NOTRST": 1,
"A.PROTCT": 1
},
"T": {
"T.COMDIS": 1,
"T.COMINT": 1,
"T.FACCNT": 1,
"T.FALACT": 1,
"T.FALASC": 1,
"T.FALREC": 1,
"T.IMPCON": 1,
"T.INADVE": 1,
"T.INFLUX": 1,
"T.LOSSOF": 1,
"T.MISACT": 1,
"T.MISUSE": 1,
"T.NOHALT": 1,
"T.PRIVIL": 1,
"T.SCNCFG": 1,
"T.SCNMLC": 1,
"T.SCNVUL": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 4
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 4
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Validation Team",
"/Company": "MITRE and NSA",
"/CreationDate": "D:20061101093929-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0 for Word",
"/ModDate": "D:20061101093947-05\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0 (Windows)",
"/SourceModified": "D:20061101143832",
"/Title": "Validation Report for Juniper Networks",
"/_AdHocReviewCycleID": "508012059",
"/_AuthorEmail": "[email protected]",
"/_AuthorEmailDisplayName": "Ashby,Victoria A.",
"/_EmailSubject": "VR",
"pdf_file_size_bytes": 129187,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "st_vid10045-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A": 1,
"A.ACCESS": 4,
"A.ASCOPE": 3,
"A.DYNMIC": 4,
"A.LOCATE": 3,
"A.MANAGE": 4,
"A.NOEVIL": 3,
"A.NOTRST": 4,
"A.PROTCT": 3
},
"O": {
"O.ACCESS": 14,
"O.AUDITS": 9,
"O.CREDEN": 8,
"O.EADMIN": 7,
"O.EXPORT": 1,
"O.IDANLZ": 6,
"O.IDAUTH": 22,
"O.IDSCAN": 8,
"O.IDSENS": 10,
"O.INSTAL": 4,
"O.INTEGR": 6,
"O.INTROP": 8,
"O.OFLOWS": 7,
"O.PERSON": 5,
"O.PHYCAL": 10,
"O.PROTCT": 9,
"O.RESPON": 6
},
"OE": {
"OE.AUDIT_PROTECTION": 7,
"OE.PROTECT": 5,
"OE.TIME": 8
},
"T": {
"T.COMDIS": 4,
"T.COMINT": 3,
"T.FACCNT": 4,
"T.FALACT": 3,
"T.FALASC": 4,
"T.FALREC": 3,
"T.IMPCON": 4,
"T.INADVE": 3,
"T.INFLUX": 4,
"T.LOSSOF": 3,
"T.MISACT": 4,
"T.MISUSE": 3,
"T.NOHALT": 4,
"T.PRIVIL": 3,
"T.SCNCFG": 4,
"T.SCNMLC": 3,
"T.SCNVUL": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP": 7,
"ACM_CAP.2": 12
},
"ADO": {
"ADO_DEL": 5,
"ADO_DEL.1": 5,
"ADO_IGS": 6,
"ADO_IGS.1": 5
},
"ADV": {
"ADV_FSP": 6,
"ADV_FSP.1": 8,
"ADV_HLD": 6,
"ADV_HLD.1": 11,
"ADV_RCR": 6,
"ADV_RCR.1": 4
},
"AGD": {
"AGD_ADM": 6,
"AGD_ADM.1": 11,
"AGD_USR": 6,
"AGD_USR.1": 9
},
"ATE": {
"ATE_COV": 7,
"ATE_COV.1": 4,
"ATE_FUN": 7,
"ATE_FUN.1": 9,
"ATE_IND": 7,
"ATE_IND.2": 7
},
"AVA": {
"AVA_SOF": 6,
"AVA_SOF.1": 6,
"AVA_VLA": 6,
"AVA_VLA.1": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 2,
"EAL1": 1,
"EAL2": 8
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 16,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 12,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 11,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 9,
"FAU_SAR.3.1": 1,
"FAU_SEL.1": 10,
"FAU_SEL.1.1": 1,
"FAU_STG.2": 14,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1,
"FAU_STG.4": 10,
"FAU_STG.4.1": 1
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_ATD.1": 9,
"FIA_ATD.1.1": 1,
"FIA_UAU": 1,
"FIA_UAU.1": 12,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 13,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MDT.1": 1,
"FMT_MOF.1": 13,
"FMT_MOF.1.1": 2,
"FMT_MTD": 30,
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 13,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITA.1": 1,
"FPT_ITC.1": 1,
"FPT_ITI.1": 1,
"FPT_ITT.1": 10,
"FPT_ITT.1.1": 1,
"FPT_RVM.1": 14,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 14,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_STM": 1,
"FPT_STM.1": 10,
"FPT_STM.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 2
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2
}
},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 3
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": " ",
"/CC Version": "2.2",
"/CreationDate": "D:20061101102236-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0 for Word",
"/EAL": "EAL2",
"/Keywords": "Intrusion Detection System (IDS), Intrusion Detection \u0026 Prevention system (IDP), IDP Sensor\u2122, the IDP Management Server\u2122, IDP User Interface\u2122",
"/ModDate": "D:20061101103840-05\u002700\u0027",
"/PPs": "Intrusion Detection System System Protection Profile, version 1.5",
"/Producer": "Acrobat Distiller 7.0 (Windows)",
"/SourceModified": "D:20061101151653",
"/Status": "FINAL",
"/TOE": "IDP 4.0 \u0026 NSM 2006.1",
"/Title": "Security Target",
"/Vendor": "Juniper Networks",
"/Version": "1.0",
"pdf_file_size_bytes": 1029993,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_RAID_1750.pdf",
"http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci283994,00.html",
"http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_650_HG.pdf",
"http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0_CG.pdf",
"http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_1750_HG.pdf",
"http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0r1_QS.pdf",
"http://cio.nist.gov/esd/emaildir/lists/cc-cmt/msg00019.html",
"http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_1650_HG.pdf",
"http://www.niap.nist.gov/cc-scheme/pm02_14_aq_ia_it_products.pdf",
"http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0r1_QS_HA.pdf",
"http://www.juniper.net/techpubs/software/management/idp/idp30/IDP_3_0_UG.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 91
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10045-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10045-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a9a53c19529c17bb454bf50e828dc9e8e480a2902763471c6aa30c6d0a52dc6f",
"txt_hash": "cb58a3c22bfaec1928856e8cd27bc8e11c5eb68a0fc001b7206b938b06286c91"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "91669b8384fc571c070dfbf15082d7b1a5f92f63d14623b36b9a7fc8cfe96204",
"txt_hash": "874d98426913cc02761e00ebd74d75efd3909701b8768dd2420d4ecee2ec2de1"
}
},
"status": "archived"
}