Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BorderWare MXtreme Mail Firewall Version 3.1
CRP204
Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running JUNOS 11.2S4
CCEVS-VR-VID-10402-2013
name BorderWare MXtreme Mail Firewall Version 3.1 Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running JUNOS 11.2S4
category Boundary Protection Devices and Systems Detection Devices and Systems
scheme UK US
not_valid_after 05.03.2013 22.04.2015
not_valid_before 30.07.2004 22.04.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP204.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10402-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/borderware_3.0Final.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10402-st.pdf
manufacturer Borderware Technologies Juniper Networks, Inc.
manufacturer_web https://www.borderware.com/ https://www.juniper.net/
security_level AVA_VLA.3, EAL4+, ALC_FLR.1 EAL4+, ALC_FLR.2
dgst 02140ad16c37fee4 32c0f398615e577f
heuristics/cert_id CRP204 CCEVS-VR-VID-10402-2013
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:h:juniper:ln1000:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*
heuristics/extracted_sars ADV_RCR.1, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, AVA_VLA.3, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ALC_CMS.4, AVA_VAN.3, ATE_FUN.1, ALC_DEL.1, ATE_IND.2, ADV_FSP.4, ALC_LCD.1, AGD_OPE.1, ADV_ARC.1, ADV_TDS.3, ATE_DPT.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1
heuristics/extracted_versions 3.1 11.2
heuristics/scheme_data
  • category: Firewall, Router, Wireless Monitoring
  • certification_date: 22.04.2013
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 22.04.2015
  • id: CCEVS-VR-VID10402
  • product: Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running JUNOS 11.2S4
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10402
  • vendor: Juniper Networks, Inc.
pdf_data/report_filename CRP204.pdf st_vid10402-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10402-2013
    • cert_item: Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running Junos 11.2 R2S4
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • UK:
    • CERTIFICATION REPORT No. P204: 1
  • US:
    • CCEVS-VR-VID10402-2013: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 1
    • EAL4: 25
    • EAL4 augmented: 18
    • EAL7: 1
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 39
  • AVA:
    • AVA_VLA.2: 1
    • AVA_VLA.3: 42
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 5
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_IFF.1.2: 1
  • FPT:
    • FPT_RIP.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_STM.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.NO_TOE_BYPASS: 1
    • A.PHYSICAL: 1
  • T:
    • T.ADDRESS_MASQUERADE: 1
    • T.ADMIN_ROGUE: 1
    • T.AUDIT_COMPROMISE: 1
    • T.CRYPTO_COMPROMISE: 1
    • T.EAVESDROP: 1
    • T.MALICIOUS_TSF_COMPROMISE: 1
    • T.MASQUERADE: 1
    • T.REPLAY: 1
    • T.RESIDUAL_DATA: 1
    • T.RESOURCE_EXHAUSTION: 1
    • T.SPOOFING: 1
    • T.UNATTENDED_SESSION: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_PEER: 1
    • T.UNIDENTIFIED_ACTIONS: 1
    • T.UNIDENTIFIED_INTRUSIONS: 1
    • T.UNKNOWN_STATE: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 3
  • IPsec:
    • IPsec: 2
  • SSH:
    • SSH: 6
  • TLS:
    • SSL:
      • SSL: 1
  • VPN:
    • VPN: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-2004-01-004: 1
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • FIPS:
    • FIPS 140-2: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The SMTP server accepts clear text and TLS encrypted connections on port 25, although the latter is out of scope of the evaluation. ii. The MCS may be configured to accept connections on ports 80 and 443: 1
    • of the firewall via the MCS and allows users to access their mailboxes, although the latter is out of scope. v. The Authentication server authenticates administrators before they are able to access the MCS: 1
    • out of scope: 2
pdf_data/report_metadata
  • /Author: racook
  • /CreationDate: D:20040804100821Z
  • /Creator: Borderware MXtreme Mail Firewall CR1.0 - Microsoft Word
  • /ModDate: D:20131119171800Z
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /Title: Borderware MXtreme Mail Firewall CR1.0.doc
  • pdf_file_size_bytes: 186048
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /Author: SAIC
  • /CreationDate: D:20130502131855
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130502131855
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Validation Report
  • /Title: Juniper Networks
  • pdf_file_size_bytes: 338979
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename borderware_3.0Final.pdf st_vid10402-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 10
  • EAL:
    • EAL4: 2
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_FLR.1: 7
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF: 1
    • AVA_SOF.1: 1
    • AVA_VLA.3: 7
  • ADV:
    • ADV_ARC.1: 13
    • ADV_FSP.1: 2
    • ADV_FSP.2: 2
    • ADV_FSP.4: 13
    • ADV_IMP.1: 10
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 18
  • AGD:
    • AGD_OPE.1: 13
    • AGD_PRE.1: 8
  • ALC:
    • ALC_CMC.4: 16
    • ALC_CMS.1: 1
    • ALC_CMS.4: 7
    • ALC_DEL.1: 6
    • ALC_DVS.1: 7
    • ALC_FLR.2: 16
    • ALC_LCD.1: 8
    • ALC_TAT.1: 9
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 6
    • ATE_DPT.1: 7
    • ATE_FUN.1: 12
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 9
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 1
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_RVM.1: 2
    • FDP_SEP.1: 2
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 4
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 7
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 7
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_ARP: 5
    • FAU_ARP.1: 13
    • FAU_ARP.1.1: 1
    • FAU_GEN: 14
    • FAU_GEN.1: 4
    • FAU_GEN.2: 1
    • FAU_SAA: 10
    • FAU_SAA.1: 2
    • FAU_SAR.1: 16
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 15
    • FAU_SAR.2.1: 2
    • FAU_SAR.3: 16
    • FAU_SAR.3.1: 2
    • FAU_SEL: 15
    • FAU_SEL.1: 2
    • FAU_STG: 30
    • FAU_STG.1: 2
    • FAU_STG.2: 1
    • FAU_STG.3: 6
    • FAU_STG.3.1: 1
    • FAU_UAU.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 6
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 28
    • FCS_COP.1.1: 4
  • FDP:
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 12
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 3
    • FDP_RIP.2: 6
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 6
    • FIA_AFL.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 15
    • FIA_ATD.1.1: 2
    • FIA_UAU: 5
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 1
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 76
    • FMT_MOF.1.1: 11
    • FMT_MSA: 14
    • FMT_MSA.1: 1
    • FMT_MSA.2: 5
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 29
    • FMT_MTD.1.1: 6
    • FMT_MTD.2: 21
    • FMT_MTD.2.1: 3
    • FMT_MTD.2.2: 3
    • FMT_REV: 5
    • FMT_REV.1: 9
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 5
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_RCV.2: 6
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 6
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TRP.1: 2
    • FPT_TST: 1
    • FPT_TST.1: 16
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
    • FPT_TST_EXP.1: 1
    • FPT_TST_EXP.1.1: 1
    • FPT_TST_EXP.1.2: 1
  • FRU:
    • FRU_RSA.1: 10
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_SSL: 11
    • FTA_SSL.1: 2
    • FTA_SSL.2: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL.3: 11
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE.1: 5
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 16
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 3
    • FTP_TRP.1: 14
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 3
    • FTP_TRP.1.3: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.PHYSICAL: 2
    • A.TRANSFER: 2
    • A.TRUSTED: 2
    • A.USEAGE: 2
  • O:
    • O.ADDRESS: 10
    • O.ADMIN: 7
    • O.ATTEMPT: 4
    • O.AUDREC: 4
    • O.DIRECT: 5
    • O.GW: 4
    • O.LIMEXT: 4
    • O.MAILCTL: 6
    • O.MEDIATE: 10
    • O.NOREP: 3
    • O.PORT: 1
    • O.PORTS: 10
    • O.SELPRO: 5
  • T:
    • T.CONFIG: 2
    • T.CONN: 1
    • T.DETECT: 2
    • T.MEDIAT: 2
    • T.OLDINF: 2
    • T.OPEN_RELAY: 2
    • T.OS_FAC: 2
    • T.REM_CONN: 2
    • T.REPEAT: 2
    • T.SELPRO: 2
    • T.SOURCE: 2
    • T.UNSOLICITED: 2
  • A:
    • A.NO_GENERAL_PURPOSE: 2
    • A.NO_TOE: 1
    • A.NO_TOE_BYPASS: 1
    • A.PHYSICAL: 2
  • O:
    • O.ADMIN_ROLE: 6
    • O.AUDIT_GENERATION: 5
    • O.AUDIT_PROTECTION: 3
    • O.AUDIT_REVIEW: 4
    • O.CORRECT_: 2
    • O.CORRECT_TSF_OPERATION: 2
    • O.CRYPTOGRAPHIC_FUNCTIONS: 4
    • O.CRYPTOGRAPHY_: 1
    • O.CRYPTOGRAPHY_VALIDATED: 3
    • O.DISPLAY_BANNER: 6
    • O.IDS_AUDIT_GENERATION: 3
    • O.IDS_AUDIT_REVIEW: 4
    • O.MAINT_MODE: 4
    • O.MANAGE: 4
    • O.MEDIATE_INFORMATION_FLOW: 6
    • O.PEER_AUTHENTICATION: 5
    • O.PROTECT_IN_TRANSIT: 4
    • O.PROTOCOL: 1
    • O.PROTOCOLS: 5
    • O.REPLAY_DETECTION: 5
    • O.RESIDUAL_INFORMATION: 11
    • O.RESOURCE_SHARING: 4
    • O.ROBUST_TOE_ACCESS: 9
    • O.TIME_STAMPS: 4
    • O.TRUSTED_PATH: 8
  • OE:
    • OE.CRYPTANALYTIC: 2
    • OE.MANAGEMENT: 1
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 2
  • T:
    • T.ADDRESS_MASQUERADE: 2
    • T.ADMIN_ERROR: 1
    • T.ADMIN_ROGUE: 3
    • T.AUDIT_COMPROMISE: 2
    • T.CRYPTO_COMPROMISE: 2
    • T.EAVESDROP: 2
    • T.MALICIOUS_TSF_COMPROMISE: 2
    • T.MASQUERADE: 2
    • T.REPLAY: 2
    • T.RESIDUAL_DATA: 2
    • T.RESOURCE_EXHAUSTION: 2
    • T.SPOOFING: 2
    • T.UNATTENDED_SESSION: 2
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_PEER: 2
    • T.UNIDENTIFIED_ACTIONS: 2
    • T.UNIDENTIFIED_INTRUSIONS: 2
    • T.UNKNOWN_STATE: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDEA: 3
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 13
    • DSA:
      • DSA: 7
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 11
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 3
  • IKE:
    • IKE: 28
    • IKEv1: 1
  • IPsec:
    • IPsec: 20
  • SSH:
    • SSH: 27
    • SSHv2: 6
  • TLS:
    • SSL:
      • SSL: 2
  • VPN:
    • VPN: 9
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 2
  • RNG:
    • RNG: 11
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CCM:
    • CCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-256: 1
    • P-256: 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 15
    • FIPS 186-2: 1
    • FIPS PUB 140-2: 4
    • FIPS PUB 171: 1
    • FIPS PUB 180-2: 1
    • FIPS PUB 186-3: 1
  • NIST:
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 4
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 1
    • RFC 2409: 10
    • RFC 2451: 1
    • RFC 4251: 1
    • RFC 4252: 1
    • RFC 4253: 1
    • RFC 4271: 3
    • RFC 4301: 1
    • RFC 4302: 1
    • RFC 4303: 1
    • RFC 4305: 1
    • RFC2409: 1
  • X509:
    • X.509: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Authentication services can be handled either internally (user selected passwords: 1
    • including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Authentication services can be handled either internally (user selected passwords) or through a: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: BorderWare Technologies Inc
  • /CreationDate: D:20040804110458Z
  • /Creator: SecurityTarget3.0Final - Microsoft Word
  • /ModDate: D:20040804134352+02'00'
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /Title: MXtreme V3.0 Security Target
  • pdf_file_size_bytes: 165061
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 54
  • /Author: Seth Ross, Jane Medefesser
  • /CreationDate: D:20130502131822
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130502131822
  • /Producer: Microsoft® Office Word 2007
  • /Subject: LN1000-V Mobile Secure Router and SRX650 Services Gateway
  • /Title: Security Target
  • pdf_file_size_bytes: 2108087
  • pdf_hyperlinks: http://www.juniper.net/, http://tools.ietf.org/html/rfc2409
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 156
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different