This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y Certificate Number: 2021/135 |
Adder Secure Analogue and Digital KVM Switches, Version 1.0, AVSD1002-XX, AVSD1004-XX, AVSV1002-XX, AVSV1004-XX; where XX is one of the following: UK (United Kingdom), US (United States), EURO (Europe), AUS (Australia) CRP268 |
|
---|---|---|
name | Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y | Adder Secure Analogue and Digital KVM Switches, Version 1.0, AVSD1002-XX, AVSD1004-XX, AVSV1002-XX, AVSV1004-XX; where XX is one of the following: UK (United Kingdom), US (United States), EURO (Europe), AUS (Australia) |
category | Network and Network-Related Devices and Systems | Other Devices and Systems |
scheme | AU | UK |
status | active | archived |
not_valid_after | 15.02.2026 | 25.09.2017 |
not_valid_before | 15.02.2021 | 25.09.2012 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T017%20Cert%202021_135%20OS.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/T0017-Certification_Report_V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP268%20Adder%20v1.0%20-%20CR%20v1.0.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20QFX5120,%20QFX5200,%20QFX5210,%20EX4650%20Junos%2020.2R1%20ST%20v1.3.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP268%20Adder%20v1.0%20-%20ST%20v1.1.pdf |
manufacturer | Juniper Networks, Inc. | Adder Technology Ltd |
manufacturer_web | https://www.juniper.net/ | https://www.adder.com/ |
security_level | {} | EAL2+, ALC_FLR.2 |
dgst | 07bffc2fb1a2fbc4 | 5722cf893349cbfd |
heuristics/cert_id | Certificate Number: 2021/135 | CRP268 |
heuristics/extracted_sars | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 | ALC_CMS.2, ADV_TDS.1, ATE_DPT.2, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
heuristics/extracted_versions | 20.2 | 1.0 |
heuristics/report_references/directly_referencing | {} | CRP259 |
heuristics/report_references/indirectly_referencing | {} | CRP259 |
heuristics/protection_profiles | {} | fd5d86dc01df0437 |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf |
pdf_data/cert_filename | EFT-T017 Cert 2021_135 OS.pdf | |
pdf_data/cert_keywords/cc_cert_id | ||
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | T0017-Certification_Report_V1.0.pdf | CRP268 Adder v1.0 - CR v1.0.pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Juniper QFX5120, QFX5200, QFX5210, EX4650 Junos 20.2R1 ST v1.3.pdf | CRP268 Adder v1.0 - ST v1.1.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |