Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y
Certificate Number: 2021/135
TNOR Guard v. 1.1.3
SERTIT-120
name Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y TNOR Guard v. 1.1.3
category Network and Network-Related Devices and Systems Boundary Protection Devices and Systems
scheme AU NO
not_valid_after 15.02.2026 12.05.2027
not_valid_before 15.02.2021 12.05.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T017%20Cert%202021_135%20OS.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-120%20C%20v1.0.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/T0017-Certification_Report_V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-120%20CR%20v1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20QFX5120,%20QFX5200,%20QFX5210,%20EX4650%20Junos%2020.2R1%20ST%20v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TNOR%20Guards%20739_20726_aaaa_sc_ed10-4-public.pdf
manufacturer Juniper Networks, Inc. Thales Norway AS
manufacturer_web https://www.juniper.net/ https://www.thales.no/
security_level {} EAL4+, AVA_VAN.4, ALC_FLR.3
dgst 07bffc2fb1a2fbc4 03972af324dcd07f
heuristics/cert_id Certificate Number: 2021/135 SERTIT-120
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1
heuristics/extracted_versions 20.2 1.1.3
heuristics/scheme_data
  • category: Boundary Protection Devices and Systems
  • certification_date: 12.05.2022
  • developer: Thales Norway AS
  • enhanced:
    • category: Boundary Protection Devices and Systems
    • cert_id: SERTIT-120
    • certification_date: 12.05.2022
    • description: TNOR Guard is a technology that provides controlled information flow between networks with different system and application security policies. The TNOR Guard (TOE) is part of the XOmail product family for messaging and information exchange in mission-critical military and civilian networks. The Guard implements high-assurance information flow control for the trusted exchange of information across security domain boundaries. This product is also described in this report as the Target of Evaluation (TOE). The main security feature of the TOE is to mediate a one-way or bidirectional flow between two security domains. The TOE inspects every information object that is requested sent between the security domains, and makes an automated release decision according to configured policy. The TOE covers the following four Guard products: STANAG 4406 Ed 2 Message Guard For connectivity towards the NATO standard Military Message Handling System (MMHS), SMTP Message Guard (E-mail) For connectivity towards standard e-mail systems such as Microsoft Exchange. Supports RFC 6477 for Military Message Handling attributes within the SMTP domain, Chat (XMPP) Guard Instant Messaging service between security domains. XML/SOAP Guard Exchange of XML/SOAP data between security domains.
    • developer: Thales Norway AS
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/1311036-1656573547/SERTIT/Sertifikater/2022/120/SERTIT-120%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/1310630-1654589563/SERTIT/Sertifikater/2022/120/TNOR%20Guards%20739_20726_aaaa_sc_ed10-4-public.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/1310627-1654589561/SERTIT/Sertifikater/2022/120/SERTIT-120%20CR%20v1.0.pdf'})]})
    • evaluation_facility: System Sikkerhet AS
    • expiration_date: 12.05.2027
    • level: EAL 4, ALC_FLR.3, AVA_VAN.4
    • mutual_recognition: CCRA, SOG-IS
    • product: TNOR Guard version 1.1.3
    • sponsor: Forsvarsmateriell IKT-kapasiteter
  • product: TNOR Guard
  • url: https://sertit.no/certified-products/tnor-guard-article2842-1919.html
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf {}
pdf_data/cert_filename EFT-T017 Cert 2021_135 OS.pdf SERTIT-120 C v1.0.pdf
pdf_data/cert_keywords/cc_cert_id
  • NO:
    • SERTIT-120: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
pdf_data/cert_keywords/vendor
  • Thales:
    • Thales: 1
pdf_data/cert_metadata
  • /CreationDate: D:20210217171814+10'00'
  • /Creator: ACA75941.dpe.protected.mil.au
  • /ModDate: D:20210217171814+10'00'
  • /Producer: KONICA MINOLTA bizhub C308
  • /Title: SACA75941.d21021717171
  • pdf_file_size_bytes: 108210
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: helgerudt
  • /CreationDate: D:20220629133919+02'00'
  • /Creator: Hewlett-Packard MFP
  • /ModDate: D:20220629142649+02'00'
  • /Producer: PixEdit AS, PixEdit Version 8.7.4.6
  • /Subject: 201676 201334 VEDLEGG01
  • pdf_file_size_bytes: 1289183
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename T0017-Certification_Report_V1.0.pdf SERTIT-120 CR v1.0.pdf
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-120: 22
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 27
    • EAL 4 augmented: 24
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_FLR.3: 26
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 27
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Thales:
    • Thales: 12
pdf_data/report_keywords/eval_facility
  • Teron:
    • Teron Labs: 4
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • PKE:
    • PKE: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
    • SSHv2: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 1
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-110: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 8
    • ISO/IEC 17025: 2
    • ISO/IEC 18045: 2
  • RFC:
    • RFC 6477: 1
pdf_data/report_metadata
  • /CreationDate: D:20220518100037+02'00'
  • /ModDate: D:20220518100037+02'00'
  • pdf_file_size_bytes: 529073
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename Juniper QFX5120, QFX5200, QFX5210, EX4650 Junos 20.2R1 ST v1.3.pdf TNOR Guards 739_20726_aaaa_sc_ed10-4-public.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 8
    • EAL4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 1
  • ALC:
    • ALC_FLR.3: 6
  • ASE:
    • ASE_CCL: 2
    • ASE_ECD: 2
    • ASE_INT: 2
    • ASE_OBJ: 2
    • ASE_REQ: 2
    • ASE_SPD: 2
    • ASE_TSS: 2
  • AVA:
    • AVA_VAN.4: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT: 2
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 17
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP: 28
    • FCS_COP.1: 6
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1.5: 1
    • FCS_SSHS_EXT: 1
    • FCS_SSHS_EXT.1: 6
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 2
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.1.1: 2
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 2
    • FIA_UAU_EXT.2: 5
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 2
    • FIA_UIA_EXT.1: 11
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UID.1: 3
  • FMT:
    • FMT_MOF: 19
    • FMT_MOF.1: 3
    • FMT_MTD: 14
    • FMT_MTD.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 5
    • FMT_SMR.2: 12
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 2
    • FPT_APW_EXT.1: 6
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 5
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM: 3
    • FPT_STM.1: 3
    • FPT_STM_EXT: 2
    • FPT_STM_EXT.1: 2
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL.3: 8
    • FTA_SSL.4: 6
    • FTA_SSL_EXT: 2
    • FTA_SSL_EXT.1: 7
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 9
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 22
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC.2: 6
    • FTP_TRP: 8
    • FTP_TRP.1: 3
    • FTP_TUD.1: 1
  • FAU:
    • FAU_ARP: 2
    • FAU_ARP.1: 9
    • FAU_GEN: 2
    • FAU_GEN.1: 13
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAA: 1
    • FAU_SAA.1: 10
    • FAU_SAR: 1
    • FAU_SAR.1: 11
    • FAU_SAR.2: 8
    • FAU_STG: 1
    • FAU_STG.1: 12
    • FAU_STG.3: 9
    • FAU_STG.4: 9
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.1: 10
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 1
    • FCS_COP: 1
    • FCS_COP.1: 10
    • FCS_NRO.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 9
    • FDP_ACC.2: 10
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ETC: 1
    • FDP_ETC.2: 13
    • FDP_IFC: 19
    • FDP_IFC.1: 14
    • FDP_IFC.2: 11
    • FDP_IFF: 19
    • FDP_IFF.1: 16
    • FDP_IFF.2: 16
    • FDP_IFF.2.2: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 15
    • FDP_RIP: 1
    • FDP_RIP.1: 1
    • FDP_RIP.2: 10
    • FDP_UIT: 1
    • FDP_UIT.1: 9
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 9
    • FIA_UID: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 13
  • FMT:
    • FMT_MOF: 19
    • FMT_MOF.1: 5
    • FMT_MSA: 1
    • FMT_MSA.1: 10
    • FMT_MSA.3: 15
    • FMT_MTD: 2
    • FMT_MTD.1: 12
    • FMT_MTD.3: 8
    • FMT_MTS: 1
    • FMT_REV: 1
    • FMT_REV.1: 9
    • FMT_SMF: 1
    • FMT_SMF.1: 15
    • FMT_SMR: 1
    • FMT_SMR.1: 9
    • FMT_SMR.2: 16
    • FMT_TST.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 11
    • FPT_RCV: 1
    • FPT_RCV.4: 10
    • FPT_STM.1: 2
    • FPT_TDC: 1
    • FPT_TDC.1: 11
    • FPT_TST: 1
    • FPT_TST.1: 12
  • FRU:
    • FRU_PRS: 1
    • FRU_PRS.1: 10
  • FTP:
    • FTP_ITC.1: 4
    • FTP_TRP: 1
    • FTP_TRP.1: 15
    • FTP_TRP.2: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINSTRATOR: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A..Z: 1
    • A.APPROVED_CRYPTO: 3
    • A.APPROVED_PKI: 2
    • A.CORRECT_CONFIGURATION: 3
    • A.NETWORK_PROTECTED: 2
    • A.PHYSICAL_ACCESS_MANAGED: 3
    • A.TRUSTED_AND_TRAINED_ADMIN: 2
    • A.TRUSTED_LABELLER: 3
  • O:
    • O.ACCESS: 8
    • O.AUDIT: 13
    • O.CMD_ACL: 10
    • O.CONFIGURATION_CHANGE: 5
    • O.CONTROLLED_INFORMATION: 1
    • O.CONTROLLED_INFORMATION_FLOW: 5
    • O.CORRECT_TSF_OPERATION: 6
    • O.INTERNAL_LEAST_PRIVILEG: 1
    • O.INTERNAL_LEAST_PRIVILEGE: 9
    • O.LABEL_MAPPING: 8
    • O.MAC: 5
    • O.MGMT_MODE: 6
    • O.MINIMAL_PROXY: 10
    • O.OBJECT_INTEGRITY: 9
    • O.RESIDUAL_INFORMATION: 7
    • O.RESOURCE_SHARING: 7
    • O.SECURE_STATE: 8
    • O.SUBJECT_ISOLATION: 12
    • O.TRANSITION: 5
    • O.TSF_INTEGRITY: 9
    • O.VALID_LABEL: 6
  • OE:
    • OE.APPROVED_CRYPTO: 7
    • OE.APPROVED_PKI: 7
    • OE.BORDER_PROTECTION: 12
    • OE.CONFIGURATION: 8
    • OE.CONTENT_INSPECTION_S: 1
    • OE.CONTENT_INSPECTION_SE: 2
    • OE.CONTENT_INSPECTION_SERVICE: 6
    • OE.DIRECTORY_SERVICE: 6
    • OE.MINIMAL_POSTURE: 10
    • OE.NETWORK: 10
    • OE.PHYSICAL_ACCESS_MANA: 2
    • OE.PHYSICAL_ACCESS_MANAG: 1
    • OE.PHYSICAL_ACCESS_MANAGED: 6
    • OE.PLATFORM: 10
    • OE.TIME_SOURCE: 6
    • OE.TRUSTED_AND_TRAINED_: 1
    • OE.TRUSTED_AND_TRAINED_A: 1
    • OE.TRUSTED_AND_TRAINED_ADMIN: 8
    • OE.TRUSTED_AND_TRAINED_ADMINS: 1
    • OE.TRUSTED_LABELLER: 7
  • T:
    • T.ADMIN_MASQUERADE: 4
    • T.AUDIT_COMPROMISE: 2
    • T.COVERT_CHANNEL: 2
    • T.DOS: 4
    • T.INFORMATION_LEAK: 2
    • T.INSECURE_STATE: 4
    • T.MALWARE_INJECTION: 2
    • T.METADATA_LEAK: 4
    • T.NETWORK_ATTACK: 2
    • T.OBJECT_TAMPERING: 4
    • T.RECONNAISSANCE: 4
    • T.RESIDUAL_DATA: 2
    • T.TSF_COMPROMISE: 3
    • T.UNATTENDED_ADMIN_SESSION: 2
    • T.UNAUTHORIZED_ACCESS: 4
    • T.UNNOTICED_ATTACK: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Thales:
    • Thales: 80
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 3
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 4
  • RSA:
    • RSA 2048: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 4
    • SHA2:
      • SHA-256: 3
      • SHA-384: 4
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
    • Key exchange: 1
  • MAC:
    • MAC: 2
  • MAC:
    • MAC: 22
  • PKE:
    • PKE: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 97
    • SSHv2: 11
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 7
      • TLS1.1: 1
      • TLS1.2: 1
  • SSH:
    • SSH: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • RNG:
    • RBG: 2
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 8
    • P-384: 6
    • P-521: 6
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 180-4: 3
    • FIPS 186-4: 2
    • FIPS 197: 2
    • FIPS 198-1: 3
    • FIPS PUB 186-4: 6
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
  • RFC:
    • RFC 3526: 2
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4254: 1
    • RFC 5656: 1
    • RFC 6668: 1
    • RFC3526: 1
    • RFC5656: 1
  • X509:
    • X.509: 3
  • FIPS:
    • FIPS PUB 180-4: 2
  • ISO:
    • ISO/IEC 15408: 6
  • PKCS:
    • PKCS #11: 2
    • PKCS#11: 4
    • PKCS11: 2
  • RFC:
    • RFC 5321: 1
    • RFC 5322: 1
    • RFC 6120: 1
    • RFC 6121: 1
    • RFC 6477: 1
    • RFC 7622: 2
    • RFC3507: 2
    • RFC5905: 1
    • RFC6120: 2
    • RFC6121: 1
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • It first provides a descriptive overview of the TOE and then summarises the items which are out of scope of the TOE. 1.5.1 Overview 5. The Target of Evaluation (TOE) is Juniper Networks, Inc. Junos OS 20: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Radical
  • /CreationDate: D:20220510093219+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220510093219+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: System/Subsystem Specification
  • pdf_file_size_bytes: 3028038
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different