Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Web Bytes Xilnex Framework version 3.0
ISCB-5-RPT-C030-CR-v1a
Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running JUNOS 11.2S4
CCEVS-VR-VID-10402-2013
name Web Bytes Xilnex Framework version 3.0 Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running JUNOS 11.2S4
category Other Devices and Systems Detection Devices and Systems
scheme MY US
not_valid_after 16.02.2017 22.04.2015
not_valid_before 16.02.2012 22.04.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C030-CR-v1a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10402-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Web%20Bytes%20EAL1%20Security%20Target%20(Xilnex%20Framework)%20v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10402-st.pdf
manufacturer Web Bytes Sdn Bhd HPE Juniper Networking
manufacturer_web https://www.webbytes.com.my https://www.juniper.net/
security_level EAL1 EAL4+, ALC_FLR.2
dgst 0136a64efd2140e4 32c0f398615e577f
heuristics/cert_id ISCB-5-RPT-C030-CR-v1a CCEVS-VR-VID-10402-2013
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 ALC_LCD.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ALC_FLR.2, ATE_DPT.1, AGD_OPE.1, ATE_COV.2, ALC_CMS.4, ALC_CMC.4, ADV_IMP.1, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1, ALC_DVS.1
heuristics/extracted_versions 3.0 11.2
heuristics/scheme_data
  • cert_no: 2012-002-C030
  • certification_date: 16.02.2012
  • developer: Web Bytes Sdn Bhd
  • enhanced:
    • assurance_level: EAL1
    • category: Other Devices and Systems
    • cert_id: C030
    • certification_date: 16.02.2012
    • developer: Ooi Boon-Sheng Unit 1-2-33, Kompleks Mayang Mall,Jalan Mayang Pasir 1,11950 Bayan Baru,Pulau Pinang MALAYSIA URL: http://www.webbytes.com.myEmail: [email protected]:+ 6012 472 9615Fax:+ 604 611 0162
    • expiration_date: 16.02.2017
    • mutual_recognition: CCRA
    • product: Web Bytes Xilnex Framework version 3.0
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C030/ISCB-5-RPT-C030-CR-v1a.pdf
    • scope: Web Bytes Xilnex Framework Version 3.0 is a distribution and synchronization platform which distributes subscribed applications to multiple clients as well performs data synchronisation between all the clients in the same group. The TOE comprises of two primary components as follows: Client Software. The client software that installs directly on each user's PC which operates the daily process and update based on the user activities. Server Software. The server software that extends client software with secure communication, identification and authentication, and data synchronization. The security functions that the TOE provides include the following: Secure Transmission – All communications between the server and the client is through an SSL channel. It protects the user data from disclosure and modification. Access control – The TOE allows users to launch only the applications they subscribed to as well as accessing the database. The TOE will check the user ID and their organization ID to ensure the applications that the user is allowed to run. Identification and Authentication – Users will have to present their credentials to the server for identification and authentication before the user is allowed to launch the applications and access the user data at the backend and at the local cache. Encryption – Username and passwords are always hashed when they are being stored into the database and during authentication. Management – The TOE contains various management functions to ensure efficient and secure management of the TOE. The TOE maintains two roles, users and administrator, to ensure that the functions are restricted to only the TOE administrator.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C030/Web%20Bytes%20EAL1%20Security%20Target%20(Xilnex%20Framework)%20v1.1.pdf
    • type: Distribution and synchronization platform
  • expiration_date: 16.02.2017
  • level: EAL1
  • product: Web Bytes Xilnex Framework version 3.0
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/152
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10402/
  • categories: ['Firewall', ' Router', ' Wireless Monitoring']
  • category: Firewall
  • certification_date: 22.04.2013
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 22.04.2015
  • id: CCEVS-VR-VID10402
  • product: Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running JUNOS 11.2S4
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10402
  • vendor: HPE Juniper Networking
pdf_data/report_filename ISCB-5-RPT-C030-CR-v1a.pdf st_vid10402-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10402-2013
    • cert_item: Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running Junos 11.2 R2S4
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C030-CR-v1a: 29
  • US:
    • CCEVS-VR-VID10402-2013: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL1: 11
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DEL: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 5
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_ATD.1: 1
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_ITT.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.NO_TOE_BYPASS: 1
    • A.PHYSICAL: 1
  • T:
    • T.ADDRESS_MASQUERADE: 1
    • T.ADMIN_ROGUE: 1
    • T.AUDIT_COMPROMISE: 1
    • T.CRYPTO_COMPROMISE: 1
    • T.EAVESDROP: 1
    • T.MALICIOUS_TSF_COMPROMISE: 1
    • T.MASQUERADE: 1
    • T.REPLAY: 1
    • T.RESIDUAL_DATA: 1
    • T.RESOURCE_EXHAUSTION: 1
    • T.SPOOFING: 1
    • T.UNATTENDED_SESSION: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_PEER: 1
    • T.UNIDENTIFIED_ACTIONS: 1
    • T.UNIDENTIFIED_INTRUSIONS: 1
    • T.UNKNOWN_STATE: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • RC:
      • RC4: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA512: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 9
  • IPsec:
    • IPsec: 2
  • SSH:
    • SSH: 6
  • TLS:
    • SSL:
      • SSL: 1
  • VPN:
    • VPN: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • FIPS:
    • FIPS 140-2: 2
pdf_data/report_metadata
  • /Author: SAIC
  • /CreationDate: D:20130502131855
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130502131855
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Validation Report
  • /Title: Juniper Networks
  • pdf_file_size_bytes: 338979
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename Web Bytes EAL1 Security Target (Xilnex Framework) v1.1.pdf st_vid10402-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 9
  • EAL:
    • EAL4: 2
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 2
    • ASE_ECD.1: 2
    • ASE_INT: 2
    • ASE_INT.1: 2
    • ASE_OBJ: 2
    • ASE_OBJ.1: 2
    • ASE_REQ: 2
    • ASE_REQ.1: 2
    • ASE_TSS: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 13
    • ADV_FSP.1: 2
    • ADV_FSP.2: 2
    • ADV_FSP.4: 13
    • ADV_IMP.1: 10
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 18
  • AGD:
    • AGD_OPE.1: 13
    • AGD_PRE.1: 8
  • ALC:
    • ALC_CMC.4: 16
    • ALC_CMS.1: 1
    • ALC_CMS.4: 7
    • ALC_DEL.1: 6
    • ALC_DVS.1: 7
    • ALC_FLR.2: 16
    • ALC_LCD.1: 8
    • ALC_TAT.1: 9
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 6
    • ATE_DPT.1: 7
    • ATE_FUN.1: 12
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.2: 2
    • FCS_CKM.4: 10
    • FCS_CKM.4.1: 1
    • FCS_COP: 11
    • FCS_COP.1: 2
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 2
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 3
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 4
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 8
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 4
    • FPT_ITT.1.1: 1
  • FAU:
    • FAU_ARP: 5
    • FAU_ARP.1: 13
    • FAU_ARP.1.1: 1
    • FAU_GEN: 14
    • FAU_GEN.1: 4
    • FAU_GEN.2: 1
    • FAU_SAA: 10
    • FAU_SAA.1: 2
    • FAU_SAR.1: 16
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 15
    • FAU_SAR.2.1: 2
    • FAU_SAR.3: 16
    • FAU_SAR.3.1: 2
    • FAU_SEL: 15
    • FAU_SEL.1: 2
    • FAU_STG: 30
    • FAU_STG.1: 2
    • FAU_STG.2: 1
    • FAU_STG.3: 6
    • FAU_STG.3.1: 1
    • FAU_UAU.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 6
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 28
    • FCS_COP.1.1: 4
  • FDP:
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 12
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 3
    • FDP_RIP.2: 6
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 6
    • FIA_AFL.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 15
    • FIA_ATD.1.1: 2
    • FIA_UAU: 5
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 1
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 76
    • FMT_MOF.1.1: 11
    • FMT_MSA: 14
    • FMT_MSA.1: 1
    • FMT_MSA.2: 5
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 29
    • FMT_MTD.1.1: 6
    • FMT_MTD.2: 21
    • FMT_MTD.2.1: 3
    • FMT_MTD.2.2: 3
    • FMT_REV: 5
    • FMT_REV.1: 9
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 5
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_RCV.2: 6
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 6
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TRP.1: 2
    • FPT_TST: 1
    • FPT_TST.1: 16
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
    • FPT_TST_EXP.1: 1
    • FPT_TST_EXP.1.1: 1
    • FPT_TST_EXP.1.2: 1
  • FRU:
    • FRU_RSA.1: 10
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_SSL: 11
    • FTA_SSL.1: 2
    • FTA_SSL.2: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL.3: 11
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE.1: 5
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 16
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 3
    • FTP_TRP.1: 14
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 3
    • FTP_TRP.1.3: 3
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.ADMIN: 1
    • OE.CERTIFICATES: 1
    • OE.DATABASE: 1
    • OE.ENVIRONMENT: 1
    • OE.INSTALL: 1
    • OE.NETWORK: 1
    • OE.PHYSICAL: 1
  • A:
    • A.NO_GENERAL_PURPOSE: 2
    • A.NO_TOE: 1
    • A.NO_TOE_BYPASS: 1
    • A.PHYSICAL: 2
  • O:
    • O.ADMIN_ROLE: 6
    • O.AUDIT_GENERATION: 5
    • O.AUDIT_PROTECTION: 3
    • O.AUDIT_REVIEW: 4
    • O.CORRECT_: 2
    • O.CORRECT_TSF_OPERATION: 2
    • O.CRYPTOGRAPHIC_FUNCTIONS: 4
    • O.CRYPTOGRAPHY_: 1
    • O.CRYPTOGRAPHY_VALIDATED: 3
    • O.DISPLAY_BANNER: 6
    • O.IDS_AUDIT_GENERATION: 3
    • O.IDS_AUDIT_REVIEW: 4
    • O.MAINT_MODE: 4
    • O.MANAGE: 4
    • O.MEDIATE_INFORMATION_FLOW: 6
    • O.PEER_AUTHENTICATION: 5
    • O.PROTECT_IN_TRANSIT: 4
    • O.PROTOCOL: 1
    • O.PROTOCOLS: 5
    • O.REPLAY_DETECTION: 5
    • O.RESIDUAL_INFORMATION: 11
    • O.RESOURCE_SHARING: 4
    • O.ROBUST_TOE_ACCESS: 9
    • O.TIME_STAMPS: 4
    • O.TRUSTED_PATH: 8
  • OE:
    • OE.CRYPTANALYTIC: 2
    • OE.MANAGEMENT: 1
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 2
  • T:
    • T.ADDRESS_MASQUERADE: 2
    • T.ADMIN_ERROR: 1
    • T.ADMIN_ROGUE: 3
    • T.AUDIT_COMPROMISE: 2
    • T.CRYPTO_COMPROMISE: 2
    • T.EAVESDROP: 2
    • T.MALICIOUS_TSF_COMPROMISE: 2
    • T.MASQUERADE: 2
    • T.REPLAY: 2
    • T.RESIDUAL_DATA: 2
    • T.RESOURCE_EXHAUSTION: 2
    • T.SPOOFING: 2
    • T.UNATTENDED_SESSION: 2
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_PEER: 2
    • T.UNIDENTIFIED_ACTIONS: 2
    • T.UNIDENTIFIED_INTRUSIONS: 2
    • T.UNKNOWN_STATE: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • RC:
      • RC4: 7
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDEA: 3
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 13
    • DSA:
      • DSA: 7
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA512: 3
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 11
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 10
  • IKE:
    • IKE: 28
    • IKEv1: 1
  • IPsec:
    • IPsec: 20
  • SSH:
    • SSH: 27
    • SSHv2: 6
  • TLS:
    • SSL:
      • SSL: 2
  • VPN:
    • VPN: 9
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 2
  • RNG:
    • RNG: 11
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CCM:
    • CCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-256: 1
    • P-256: 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-1: 1
    • FIPS 180-2: 2
    • FIPS140-1: 1
  • RFC:
    • RFC 4345: 3
  • FIPS:
    • FIPS 140-2: 15
    • FIPS 186-2: 1
    • FIPS PUB 140-2: 4
    • FIPS PUB 171: 1
    • FIPS PUB 180-2: 1
    • FIPS PUB 186-3: 1
  • NIST:
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 4
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 1
    • RFC 2409: 10
    • RFC 2451: 1
    • RFC 4251: 1
    • RFC 4252: 1
    • RFC 4253: 1
    • RFC 4271: 3
    • RFC 4301: 1
    • RFC 4302: 1
    • RFC 4303: 1
    • RFC 4305: 1
    • RFC2409: 1
  • X509:
    • X.509: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Authentication services can be handled either internally (user selected passwords: 1
    • including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Authentication services can be handled either internally (user selected passwords) or through a: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Seth Ross, Jane Medefesser
  • /CreationDate: D:20130502131822
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130502131822
  • /Producer: Microsoft® Office Word 2007
  • /Subject: LN1000-V Mobile Secure Router and SRX650 Services Gateway
  • /Title: Security Target
  • pdf_file_size_bytes: 2108087
  • pdf_hyperlinks: http://tools.ietf.org/html/rfc2409, http://www.juniper.net/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 156
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different