This page was not yet optimized for use on mobile
devices.
Juniper Junos OS 24.4R1 for SRX300, SRX320, SRX340, SRX345, and SRX345-DUAL-AC
CSV information
| Status | active |
|---|---|
| Valid from | 12.04.2026 |
| Valid until | 12.04.2031 |
| Scheme | 🇦🇺 AU |
| Manufacturer | Juniper Networks, Inc. |
| Category | Network and Network-Related Devices and Systems |
| Security level | |
| Protection profiles |
|
Heuristics summary
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Schemes
Key ExchangeProtocols
SSH, SSHv2, SSL, TLS, IKE, IPsec, VPNRandomness
RNGEvaluation facilities
Teron LabsStandards
SP 800-90B, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Creation date | D:20260412123958+10'00' |
|---|---|
| Modification date | D:20260412123958+10'00' |
| Pages | 21 |
Security target
Extracted keywords
Symmetric Algorithms
AES, HMAC, HMAC-SHA-256, HMAC-SHA-512Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, SHA256Schemes
MAC, Key Exchange, Key AgreementProtocols
SSH, SSHv2, SSL, TLS, TLS 1.2, IKEv1, IKEv2, IKE, IPsec, VPNRandomness
DRBG, RNG, RBGLibraries
OpenSSLElliptic Curves
P-256, P-384, P-521Block cipher modes
CBC, CTR, GCMClaims
O.IPS_ANALYZE, O.IPS_REACT, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.RESIDUAL_, O.STATEFUL_TRAFFIC, O.ADDRESS_FILTERING, O.AUTHENTICATION, O.CRYPTOGRAPHIC_, O.FAIL_SECURE, O.PORT_FILTERING, T.UNAUTHORIZED_, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_, T.WEAK_AUTHENTICATION_, T.UPDATE_COMPROMISE, T.UNDETECTED_ACTIVITY, T.SECURITY_FUNCTIONALITY_, T.NETWORK_ACCESS, T.NETWORK_DISCLOSURE, T.NETWORK_DOS, T.NETWORK_MISUSE, T.MALICIOUS_TRAFFIC, T.DATA_INTEGRITY, T.REPLAY_ATTACK, A.PHYSICAL_PROTECTION, A.LIMITED_, A.NO_THRU_TRAFFIC_, A.TRUSTED_, A.REGULAR_UPDATES, A.ADMIN_CREDENTIALS_, A.RESIDUAL_INFORMATION, A.NO_THRU_TRAFFIC_PROTECTION, A.CONNECTIONS, OE.PHYSICAL, OE.NO_GENERAL_, OE.NO_THRU_TRAFFIC_, OE.TRUSTED_ADMIN, OE.UPDATES, OE.ADMIN_CREDENTIALS_, OE.RESDUAL_, OE.NO_THRU_TRAFFIC_PROTECTION, OE.CONNECTIONSSecurity Assurance Requirements (SAR)
ADV_FSP, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_FLR.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_STG_EXT.1, FAU_GEN.1.2, FAU_GEN.1, FAU_GEN.2, FAU_GEN, FAU_GEN.1.1, FAU_GEN.2.1, FAU_STG_EXT, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.1.3, FAU_STG_EXT.1.4, FAU_STG_EXT.1.5, FAU_STG_EXT.1.6, FCS_SSH_EXT.1.1, FCS_SSH_EXT.1, FCS_SSHS_EXT.1.3, FCS_SSHS_EXT.1, FCS_RBG_EXT, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP, FCS_RBG_EXT.1, FCS_NTP_EXT.1, FCS_CKM, FCS_SSH_EXT, FCS_SSHS_EXT, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_NTP_EXT, FCS_NTP_EXT.1.1, FCS_NTP_EXT.1.2, FCS_NTP_EXT.1.3, FCS_NTP_EXT.1.4, FCS_SSH_EXT.1.2, FCS_SSH_EXT.1.3, FCS_SSH_EXT.1.4, FCS_SSH_EXT.1.5, FCS_SSH_EXT.1.6, FCS_SSH_EXT.1.7, FCS_SSH_EXT.1.8, FCS_SSHS_EXT.1.1, FDP_RIP, FDP_RIP.2, FDP_RIP.2.1, FIA_UIA_EXT.1.3, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1, FIA_PSK_EXT.3, FIA_UIA_EXT.1, FIA_AFL.1, FIA_PMG_EXT.1, FIA_UAU.7, FIA_UIA_EXT, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UIA_EXT.1.4, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FIA_UAU.7.1, FIA_PMG_EXT, FIA_PMG_EXT.1.1, FMT_SMF, FMT_SMF.1.1, FMT_MOF, FMT_MTD, FMT_SMF.1, FMT_SMR.2, FMT_MOF.1, FMT_MTD.1, FMT_SMR, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_TST_EXT.1, FPT_SKP_EXT.1, FPT_STM_EXT.1, FPT_TUD_EXT.1, FPT_APW_EXT.1, FPT_FLS, FPT_TST_EXT.3, FPT_SKP_EXT, FPT_SKP_EXT.1.1, FPT_STM_EXT, FPT_STM_EXT.1.1, FPT_STM_EXT.1.2, FPT_TST_EXT, FPT_TUD_EXT, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_APW_EXT, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TST_EXT.3.1, FPT_TST_EXT.3.2, FTA_SSL.3, FTA_SSL.4, FTA_TAB.1, FTA_SSL_EXT.1, FTA_SSL, FTA_TAB, FTA_SSL_EXT, FTA_SSL_EXT.1.1, FTP_ITC.1, FTP_TRP, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Evaluation facilities
Teron LabsSide-channel analysis
DFAStandards
FIPS PUB 186-5, FIPS 186-5, FIPS PUB 186-4, PKCS #1, RFC 2460, RFC 3526, RFC 4301, RFC 4303, RFC 3602, RFC 4106, RFC 4109, RFC 4868, RFC 7296, RFC 5282, RFC 5114, RFC 4945, RFC 5280, RFC 2986, RFC 1305, RFC 5905, RFC 4252, RFC 4253, RFC 8332, RFC 5656, RFC 4344, RFC 6668, RFC 791, RFC 8200, RFC 792, RFC 2463, RFC 793, RFC 768, RFC 5735, RFC 3513, RFC 8603, RFC 4443, RFC 959, ISO/IEC 14888-3, ISO/IEC 9796-2, ISO/IEC 18031:2011, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Title | Juniper Junos OS 24.4R1 for SRX300, SRX320, SRX340, SRX345, and SRX345-DUAL-AC |
|---|---|
| Author | Microsoft Office User |
| Creation date | D:20260409085057+10'00' |
| Modification date | D:20260409085057+10'00' |
| Pages | 100 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
No heuristics are available for this certificate.
Extracted SARs
AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_FLR.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1, ATE_IND.1, AVA_VAN.1Similar certificates
| Name | Certificate ID | |
|---|---|---|
| Junos OS 19.2R1 for SRX300, SRX320, SRX340, SRX345, SRX345-DUAL-AC and SRX550M Series | Certificate Number: 2019/124 | Compare |
References
No references are available for this certificate as its ID was not successfully extracted.
Updates Feed
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "9cd92df5f3aad415",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": null,
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL1",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"24.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"4704bfbdf61ca066",
"ed9c9d74c3710878",
"e2ad7e4a892e3703",
"bde3d7587cf42e78",
"6448a1802bb874d8"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Juniper Networks, Inc.",
"manufacturer_web": "https://www.juniper.net/",
"name": "Juniper Junos OS 24.4R1 for SRX300, SRX320, SRX340, SRX345, and SRX345-DUAL-AC",
"not_valid_after": "2031-04-12",
"not_valid_before": "2026-04-12",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "AISEP-CC-CR-2026-EFT-T060-v1.0.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1
},
"IPsec": {
"IPsec": 10
},
"SSH": {
"SSH": 7,
"SSHv2": 2
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 2
}
},
"VPN": {
"VPN": 11
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Teron": {
"Teron Labs": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"NIST": {
"SP 800-90B": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20260412123958+10\u002700\u0027",
"/ModDate": "D:20260412123958+10\u002700\u0027",
"pdf_file_size_bytes": 1441445,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.cyber.gov.au/sites/default/files/2023-03/2022_AUG_REL_AISEP_Policy_Manual_6.3.pdf",
"https://www.juniper.net/customers/csc/management",
"https://www.commoncriteriaportal.org/",
"https://www.juniper.net/documentation",
"https://www.juniper.net/",
"https://www.cyber.gov.au/ism"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "Juniper Junos OS 24.4R1 for SRX Series Security Target v1.0.1.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 8
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 13
}
},
"FF": {
"DH": {
"DH": 12,
"Diffie-Hellman": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_": 1,
"A.CONNECTIONS": 2,
"A.LIMITED_": 1,
"A.NO_THRU_TRAFFIC_": 1,
"A.NO_THRU_TRAFFIC_PROTECTION": 3,
"A.PHYSICAL_PROTECTION": 1,
"A.REGULAR_UPDATES": 1,
"A.RESIDUAL_INFORMATION": 1,
"A.TRUSTED_": 1
},
"O": {
"O.ADDRESS_FILTERING": 1,
"O.AUTHENTICATION": 1,
"O.CRYPTOGRAPHIC_": 1,
"O.FAIL_SECURE": 1,
"O.IPS_ANALYZE": 1,
"O.IPS_REACT": 1,
"O.PORT_FILTERING": 1,
"O.RESIDUAL_": 1,
"O.STATEFUL_TRAFFIC": 1,
"O.SYSTEM_MONITORING": 2,
"O.TOE_ADMINISTRATION": 2
},
"OE": {
"OE.ADMIN_CREDENTIALS_": 1,
"OE.CONNECTIONS": 2,
"OE.NO_GENERAL_": 1,
"OE.NO_THRU_TRAFFIC_": 1,
"OE.NO_THRU_TRAFFIC_PROTECTION": 3,
"OE.PHYSICAL": 1,
"OE.RESDUAL_": 1,
"OE.TRUSTED_ADMIN": 1,
"OE.UPDATES": 1
},
"T": {
"T.DATA_INTEGRITY": 1,
"T.MALICIOUS_TRAFFIC": 1,
"T.NETWORK_ACCESS": 3,
"T.NETWORK_DISCLOSURE": 3,
"T.NETWORK_DOS": 1,
"T.NETWORK_MISUSE": 3,
"T.REPLAY_ATTACK": 1,
"T.SECURITY_FUNCTIONALITY_": 2,
"T.UNAUTHORIZED_": 1,
"T.UNDETECTED_ACTIVITY": 1,
"T.UNTRUSTED_": 1,
"T.UPDATE_COMPROMISE": 1,
"T.WEAK_AUTHENTICATION_": 1,
"T.WEAK_CRYPTOGRAPHY": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1,
"ALC_FLR.1": 2
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 4
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 9,
"FAU_GEN.1": 13,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 2,
"FAU_GEN.2": 3,
"FAU_GEN.2.1": 1,
"FAU_STG_EXT": 1,
"FAU_STG_EXT.1": 6,
"FAU_STG_EXT.1.1": 1,
"FAU_STG_EXT.1.2": 1,
"FAU_STG_EXT.1.3": 1,
"FAU_STG_EXT.1.4": 1,
"FAU_STG_EXT.1.5": 1,
"FAU_STG_EXT.1.6": 1
},
"FCS": {
"FCS_CKM": 6,
"FCS_CKM.1": 8,
"FCS_CKM.2": 5,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 4,
"FCS_CKM.4.1": 1,
"FCS_COP": 21,
"FCS_COP.1": 5,
"FCS_NTP_EXT": 1,
"FCS_NTP_EXT.1": 5,
"FCS_NTP_EXT.1.1": 1,
"FCS_NTP_EXT.1.2": 1,
"FCS_NTP_EXT.1.3": 1,
"FCS_NTP_EXT.1.4": 1,
"FCS_RBG_EXT": 2,
"FCS_RBG_EXT.1": 6,
"FCS_RBG_EXT.1.1": 1,
"FCS_RBG_EXT.1.2": 1,
"FCS_SSHS_EXT": 1,
"FCS_SSHS_EXT.1": 3,
"FCS_SSHS_EXT.1.1": 1,
"FCS_SSHS_EXT.1.3": 1,
"FCS_SSH_EXT": 4,
"FCS_SSH_EXT.1": 17,
"FCS_SSH_EXT.1.1": 2,
"FCS_SSH_EXT.1.2": 1,
"FCS_SSH_EXT.1.3": 1,
"FCS_SSH_EXT.1.4": 1,
"FCS_SSH_EXT.1.5": 1,
"FCS_SSH_EXT.1.6": 1,
"FCS_SSH_EXT.1.7": 1,
"FCS_SSH_EXT.1.8": 1
},
"FDP": {
"FDP_RIP": 2,
"FDP_RIP.2": 3,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_PMG_EXT": 1,
"FIA_PMG_EXT.1": 2,
"FIA_PMG_EXT.1.1": 1,
"FIA_PSK_EXT.1": 1,
"FIA_PSK_EXT.1.1": 1,
"FIA_PSK_EXT.3": 4,
"FIA_UAU": 1,
"FIA_UAU.7": 4,
"FIA_UAU.7.1": 1,
"FIA_UIA_EXT": 1,
"FIA_UIA_EXT.1": 5,
"FIA_UIA_EXT.1.1": 1,
"FIA_UIA_EXT.1.2": 1,
"FIA_UIA_EXT.1.3": 2,
"FIA_UIA_EXT.1.4": 1
},
"FMT": {
"FMT_MOF": 10,
"FMT_MOF.1": 2,
"FMT_MTD": 8,
"FMT_MTD.1": 2,
"FMT_SMF": 20,
"FMT_SMF.1": 13,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.2": 4,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_APW_EXT": 1,
"FPT_APW_EXT.1": 4,
"FPT_APW_EXT.1.1": 1,
"FPT_APW_EXT.1.2": 1,
"FPT_FLS": 4,
"FPT_FLS.1": 1,
"FPT_FLS.1.1": 1,
"FPT_SKP_EXT": 1,
"FPT_SKP_EXT.1": 4,
"FPT_SKP_EXT.1.1": 1,
"FPT_STM_EXT": 1,
"FPT_STM_EXT.1": 5,
"FPT_STM_EXT.1.1": 1,
"FPT_STM_EXT.1.2": 1,
"FPT_TST_EXT": 1,
"FPT_TST_EXT.1": 6,
"FPT_TST_EXT.3": 5,
"FPT_TST_EXT.3.1": 1,
"FPT_TST_EXT.3.2": 1,
"FPT_TUD_EXT": 1,
"FPT_TUD_EXT.1": 7,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 1
},
"FTA": {
"FTA_SSL": 1,
"FTA_SSL.3": 5,
"FTA_SSL.4": 5,
"FTA_SSL_EXT": 1,
"FTA_SSL_EXT.1": 4,
"FTA_SSL_EXT.1.1": 1,
"FTA_TAB": 1,
"FTA_TAB.1": 6
},
"FTP": {
"FTP_ITC": 5,
"FTP_ITC.1": 6,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP": 4,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CTR": {
"CTR": 3
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 18
}
},
"crypto_protocol": {
"IKE": {
"IKE": 26,
"IKEv1": 20,
"IKEv2": 19
},
"IPsec": {
"IPsec": 48
},
"SSH": {
"SSH": 86,
"SSHv2": 13
},
"TLS": {
"SSL": {
"SSL": 5
},
"TLS": {
"TLS": 3,
"TLS 1.2": 1
}
},
"VPN": {
"VPN": 41
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
},
"KEX": {
"Key Exchange": 3
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 28,
"P-384": 22,
"P-521": 20
}
},
"eval_facility": {
"Teron": {
"Teron Labs": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 5,
"SHA1": 1
},
"SHA2": {
"SHA-256": 20,
"SHA-384": 2,
"SHA-512": 5,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 3
},
"RNG": {
"RBG": 3,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS 186-5": 1,
"FIPS PUB 186-4": 8,
"FIPS PUB 186-5": 8
},
"ISO": {
"ISO/IEC 14888-3": 2,
"ISO/IEC 18031:2011": 2,
"ISO/IEC 9796-2": 1
},
"PKCS": {
"PKCS #1": 1
},
"RFC": {
"RFC 1305": 1,
"RFC 2460": 1,
"RFC 2463": 1,
"RFC 2986": 2,
"RFC 3513": 2,
"RFC 3526": 7,
"RFC 3602": 3,
"RFC 4106": 2,
"RFC 4109": 2,
"RFC 4252": 2,
"RFC 4253": 5,
"RFC 4301": 2,
"RFC 4303": 1,
"RFC 4344": 2,
"RFC 4443": 1,
"RFC 4868": 4,
"RFC 4945": 2,
"RFC 5114": 1,
"RFC 5280": 5,
"RFC 5282": 1,
"RFC 5656": 10,
"RFC 5735": 2,
"RFC 5905": 1,
"RFC 6668": 2,
"RFC 7296": 1,
"RFC 768": 3,
"RFC 791": 3,
"RFC 792": 2,
"RFC 793": 3,
"RFC 8200": 3,
"RFC 8332": 4,
"RFC 8603": 1,
"RFC 959": 1
},
"X509": {
"X.509": 15
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"constructions": {
"MAC": {
"HMAC": 9,
"HMAC-SHA-256": 3,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Microsoft Office User",
"/CreationDate": "D:20260409085057+10\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20260409085057+10\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Title": "Juniper Junos OS 24.4R1 for SRX300, SRX320, SRX340, SRX345, and SRX345-DUAL-AC",
"pdf_file_size_bytes": 1784373,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.teronlabs.com/",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=39789",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=40494",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=40283",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=39932"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 100
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPNGW_v1.3.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_IPS_v1.0.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.4e.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/NDcPP_v3_0e.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2026-EFT-T060-v1.0.pdf",
"scheme": "AU",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20Junos%20OS%2024.4R1%20for%20SRX%20Series%20Security%20Target%20v1.0.1.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "04f0465d59ef986d7a17bff6060b3ec475c6e339a4c31a5d663bd0201cb7b02a",
"txt_hash": "10221fffce1326c54fef31f5a63e8c15a46f549771c9d1e73e3fe00bec5c8550"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "98159d1fcc6a3e384d0686023f8017d6b8e0a064cb6192fe9c6006ce79893cbb",
"txt_hash": "0b4628d4cbd8a959fe3236c82cee680b8711306da9f8ffd1a4df9468916ff35b"
}
},
"status": "active"
}