Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
PR/SM for IBM z16 and IBM LinuxONE Emperor 4 Systems, Driver Level D51C with Bundle Level 4B
BSI-DSZ-CC-1186-2023
Juniper MX240 MX480, MX960, MX2010, MX2020, EX9204, EX9208, EX9214, PTX3000, PTX5000 with JUNOS 14.2R3
CCEVS-VR-VID-10661-2015
name PR/SM for IBM z16 and IBM LinuxONE Emperor 4 Systems, Driver Level D51C with Bundle Level 4B Juniper MX240 MX480, MX960, MX2010, MX2020, EX9204, EX9208, EX9214, PTX3000, PTX5000 with JUNOS 14.2R3
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme DE US
status active archived
not_valid_after 09.03.2028 28.02.2017
not_valid_before 10.03.2023 28.12.2015
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1186c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10661-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1186a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10661-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1186b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10661-st.pdf
manufacturer IBM Corporation HPE Juniper Networking
manufacturer_web https://www.ibm.com https://www.juniper.net/
security_level ALC_TAT.3, AVA_VAN.5, EAL5+, ALC_FLR.3, ATE_FUN.2 {}
dgst 07abbe7023cf3637 92ea4a365faaabfd
heuristics/cert_id BSI-DSZ-CC-1186-2023 CCEVS-VR-VID-10661-2015
heuristics/cert_lab BSI US
heuristics/extracted_sars ALC_FLR.3, ASE_CCL.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, ATE_FUN.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_TAT.3, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_OBJ.2, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ASE_REQ.2, ADV_FSP.1
heuristics/extracted_versions 4 14.2
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-1222-2024 {}
heuristics/report_references/directly_referencing BSI-DSZ-CC-1160-2021 {}
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-1222-2024 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0846-2013, BSI-DSZ-CC-0793-2012, BSI-DSZ-CC-1109-2019, BSI-DSZ-CC-1160-2021, BSI-DSZ-CC-0900-2014, BSI-DSZ-CC-1133-2020, BSI-DSZ-CC-0953-2015, BSI-DSZ-CC-1005-2016, BSI-DSZ-CC-0715-2011, BSI-DSZ-CC-1048-2018 {}
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10661/
  • categories: ['Network Device']
  • category: Network Device
  • certification_date: 28.12.2015
  • evaluation_facility: UL Verification Services
  • expiration_date: 28.12.2017
  • id: CCEVS-VR-VID10661
  • product: Juniper MX240 MX480, MX960, MX2010, MX2020, EX9204, EX9208, EX9214, PTX3000, PTX5000 with JUNOS 14.2R3
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10661
  • vendor: HPE Juniper Networking
heuristics/protection_profiles {} ac9abe3d5c5a31f0
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf
pdf_data/cert_filename 1186c_pdf.pdf st_vid10661-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1186-2023: 1
  • US:
    • CCEVS-VR-VID10661-2015: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 5: 1
    • EAL 5 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 1
    • ALC_TAT.3: 1
  • ATE:
    • ATE_FUN.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, PR/SM for IBM z16 and IBM LinuxONE Emperor 4 Systems Driver Level D51C with Bundle Level 4B, BSI-DSZ-CC-1186"
  • /Subject: Common Criteria, Certification, Zertifizierung, PR/SM for IBM z16 and IBM LinuxONE Emperor 4 Systems Driver Level D51C with Bundle Level 4B, BSI-DSZ-CC-1186
  • /Title: Certification Report BSI-DSZ-CC-1186-2023
  • pdf_file_size_bytes: 328621
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20151231080423-05'00'
  • /ModDate: D:20151231080446-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 178899
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 1186a_pdf.pdf st_vid10661-vr.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_FLR.3, ALC_TAT.3, ATE_FUN.2, AVA_VAN.5
    • cc_version: Product specific Security Target Common Criteria Part 2 conformant
    • cert_id: BSI-DSZ-CC-1186-2023
    • cert_item: PR/SM for IBM z16 and IBM LinuxONE Emperor 4 Systems, Driver Level D51C with Bundle Level 4B
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
  • US:
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10661-2015
    • cert_item: Juniper Networks, Inc. Juniper Networks Mx Routers, PTX Routers and EX9200 Switches Running Junos OS 14.2R3
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1160-2021: 3
    • BSI-DSZ-CC-1186-2023: 16
  • US:
    • CCEVS-VR-VID10661-2015: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_TDS: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_FLR: 3
    • ALC_FLR.3: 4
    • ALC_TAT.3: 4
  • ATE:
    • ATE_FUN.2: 4
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS 1.3: 1
  • SSH:
    • SSH: 10
    • SSHv2: 3
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 1
    • RNG: 1
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2004-0468: 1
    • CVE-2006-3529: 1
    • CVE-2007-6372: 1
    • CVE-2013-4686: 1
    • CVE-2013-4687: 1
    • CVE-2013-4688: 1
    • CVE-2013-6170: 1
    • CVE-2013-7313: 1
    • CVE-2014-0612: 1
    • CVE-2014-0613: 1
    • CVE-2014-0614: 1
    • CVE-2014-0616: 1
    • CVE-2014-0617: 1
    • CVE-2014-2713: 1
    • CVE-2014-2714: 1
    • CVE-2014-3815: 1
    • CVE-2014-3817: 1
    • CVE-2014-3819: 1
    • CVE-2014-3822: 1
    • CVE-2014-3825: 1
    • CVE-2014-6378: 1
    • CVE-2014-6380: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 17
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 4, 2023-02-17, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Hardware Management Console Online Help, Version 2.16.0, 2022-05-27, IBM Corporation [9] IBM Z: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • OutOfScope:
    • out of scope: 1
    • the security test suite FTP06 must be included in the driver regression testing, which however is out of scope for this evaluation The combination of the above ensures that changes to the driver, including: 1
  • OutOfScope:
    • SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration: 1
    • Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration. 7 4.5 Security Management The TOE provides an: 1
    • out of scope: 1
pdf_data/report_metadata
pdf_data/st_filename 1186b_pdf.pdf st_vid10661-st.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1186: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.5: 2
    • ADV_IMP.1: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.3: 4
    • ALC_LCD.1: 2
    • ALC_TAT.3: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.3: 2
    • ATE_FUN.2: 4
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 3
    • FDP_ACC.1.1: 2
    • FDP_ACC.2: 25
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 43
    • FDP_ACF.1: 14
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 17
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 9
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.2: 8
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 27
    • FMT_MSA.1: 14
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 13
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_RSA.1: 7
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_TSE.1: 10
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 1
    • FAU_STG_EXT.1: 11
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 1
    • FCS_CKM.4: 7
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 20
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 47
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSH_EXT.1: 14
    • FCS_SSH_EXT.1.1: 2
    • FCS_SSH_EXT.1.2: 2
    • FCS_SSH_EXT.1.3: 2
    • FCS_SSH_EXT.1.4: 2
    • FCS_SSH_EXT.1.5: 2
    • FCS_SSH_EXT.1.6: 2
    • FCS_SSH_EXT.1.7: 2
    • FCS_TLS_EXT.1: 2
  • FDP:
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.2: 5
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_PMG_EXT.1: 11
    • FIA_PMG_EXT.1.1: 2
    • FIA_PSK_EXT.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 3
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 11
    • FIA_UAU_EXT.2.1: 2
    • FIA_UIA_EXT.1: 17
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
    • FIA_UID.1: 5
  • FMT:
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.2: 5
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 9
    • FPT_APW_EXT.1.1: 4
    • FPT_APW_EXT.1.2: 2
    • FPT_SKP_EXT.1: 11
    • FPT_SKP_EXT.1.1: 2
    • FPT_SSP.1: 1
    • FPT_SSP.2: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TRP.1: 1
    • FPT_TST.1: 1
    • FPT_TST_EXT.1: 11
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT.1: 11
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 2
  • FTA:
    • FTA_EXT_SSL.1: 1
    • FTA_SSL: 1
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 9
    • FTA_SSL_EXT.1.1: 3
    • FTA_SSL_EXT.4: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.SIE: 3
  • T:
    • T.LPAR_XCTL: 5
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.DISPLAY_BANNER: 1
    • O.PROTECTED_COMMUNICATIONS: 1
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.SESSION_LOCK: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 2
    • SHA2:
      • SHA-2: 5
      • SHA-256: 5
      • SHA-512: 3
      • SHA256: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • SSH:
    • SSH: 73
    • SSHv2: 10
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 4
    • RNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 6
    • P-384: 4
    • P-521: 4
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 26
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS PUB 186-3: 3
    • FIPS PUB 197: 1
    • FIPS140: 1
    • FIPS197: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
  • RFC:
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4254: 1
    • RFC 4741: 1
    • RFC 6668: 1
    • RFC4251: 1
    • RFC4252: 1
    • RFC4253: 3
    • RFC4254: 1
    • RFC5656: 3
    • RFC6668: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
    • i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled: 1
    • including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
    • out of scope: 2
    • the HTTP traffic arrives (i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled. This service can only: 1
pdf_data/st_metadata
  • /Author: Denise Cater
  • /CreationDate: D:20151210100045Z
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20151228141543-05'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Junos OS 13.3R1.8, Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20
  • /Title: Security Target
  • pdf_file_size_bytes: 1384363
  • pdf_hyperlinks: http://www.juniper.net/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different