Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y
Certificate Number: 2021/135
Junos OS 20.3R3 for NFX350
CCEVS-VR-11236-2022
name Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y Junos OS 20.3R3 for NFX350
scheme AU US
status active archived
not_valid_after 15.02.2026 20.06.2024
not_valid_before 15.02.2021 20.06.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T017%20Cert%202021_135%20OS.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11236-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/T0017-Certification_Report_V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11236-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20QFX5120,%20QFX5200,%20QFX5210,%20EX4650%20Junos%2020.2R1%20ST%20v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11236-st.pdf
dgst 07bffc2fb1a2fbc4 eaaa430e291515fd
heuristics/cert_id Certificate Number: 2021/135 CCEVS-VR-11236-2022
heuristics/cert_lab [] US
heuristics/extracted_versions 20.2 20.3
heuristics/scheme_data
  • category: Network Device
  • certification_date: 20.06.2022
  • evaluation_facility: Acumen Security
  • expiration_date: 20.06.2024
  • id: CCEVS-VR-VID11236
  • product: Junos OS 20.3R3 for NFX350
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11236
  • vendor: Juniper Networks, Inc.
heuristics/protection_profiles {} 6448a1802bb874d8, bde3d7587cf42e78, 89f2a255423f4a20
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_IPS_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.4e.pdf
pdf_data/cert_filename EFT-T017 Cert 2021_135 OS.pdf st_vid11236-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11236-2022: 1
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_metadata
  • /CreationDate: D:20210217171814+10'00'
  • /Creator: ACA75941.dpe.protected.mil.au
  • /ModDate: D:20210217171814+10'00'
  • /Producer: KONICA MINOLTA bizhub C308
  • /Title: SACA75941.d21021717171
  • pdf_file_size_bytes: 108210
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20220621171132-04'00'
  • /ModDate: D:20220621171132-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181491
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename T0017-Certification_Report_V1.0.pdf st_vid11236-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-11236-2022
    • cert_item: for the Junos OS 20.3R3 for NFX350
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-11236-2022: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.CONNECTIONS: 2
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • T:
    • T.DATA: 1
    • T.MALICIOUS: 1
    • T.NETWORK_ACCESS: 4
    • T.NETWORK_DISCLOSURE: 3
    • T.NETWORK_DOS: 1
    • T.NETWORK_MISUSE: 3
    • T.PASSWORD_CRACKING: 1
    • T.REPLAY_ATTACK: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/report_keywords/eval_facility
  • Teron:
    • Teron Labs: 4
  • Acumen:
    • Acumen Security: 4
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
    • SSHv2: 2
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 7
    • SSHv2: 2
  • TLS:
    • SSL:
      • SSL: 2
  • VPN:
    • VPN: 24
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • over SSH and IPsec). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope. The TOE includes cryptographic modules that provide the underlying cryptographic services: 1
pdf_data/report_metadata
  • /Author: ppatin
  • /CreationDate: D:20220621165535-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220621165535-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 471423
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename Juniper QFX5120, QFX5200, QFX5210, EX4650 Junos 20.2R1 ST v1.3.pdf st_vid11236-st.pdf
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT: 2
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 17
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP: 28
    • FCS_COP.1: 6
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1.5: 1
    • FCS_SSHS_EXT: 1
    • FCS_SSHS_EXT.1: 6
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 2
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.1.1: 2
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 2
    • FIA_UAU_EXT.2: 5
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 2
    • FIA_UIA_EXT.1: 11
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UID.1: 3
  • FMT:
    • FMT_MOF: 19
    • FMT_MOF.1: 3
    • FMT_MTD: 14
    • FMT_MTD.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 5
    • FMT_SMR.2: 12
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 2
    • FPT_APW_EXT.1: 6
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 5
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM: 3
    • FPT_STM.1: 3
    • FPT_STM_EXT: 2
    • FPT_STM_EXT.1: 2
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL.3: 8
    • FTA_SSL.4: 6
    • FTA_SSL_EXT: 2
    • FTA_SSL_EXT.1: 7
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 9
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 22
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC.2: 6
    • FTP_TRP: 8
    • FTP_TRP.1: 3
    • FTP_TUD.1: 1
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_GEN_EXT.1: 1
    • FAU_STG_EXT.1: 4
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 4
    • FCS_CKM.4.1: 1
    • FCS_COP: 18
    • FCS_COP.1: 4
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT.1: 4
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT: 1
    • FCS_SSHS_EXT.1: 4
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT: 1
    • FCS_TLSC_EXT.2.3: 1
    • FCS_TLSS_EXT: 2
  • FDP:
    • FDP_RIP.2: 4
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT.1: 3
    • FIA_PSK_EXT.1.1: 2
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_PSK_EXT.1.4: 1
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 2
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.2: 3
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 4
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 12
    • FMT_MOF.1: 3
    • FMT_MTD: 8
    • FMT_MTD.1: 2
    • FMT_SMF: 11
    • FMT_SMF.1: 5
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 3
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_FLS: 4
    • FPT_FLS.1: 1
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM_EXT.1: 5
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.3: 4
    • FPT_TST_EXT.3.1: 1
    • FPT_TST_EXT.3.2: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 4
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_APW_EXT.1: 1
    • FTP_ITC: 3
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 4
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINSTRATOR: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.CONNECTIONS: 2
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • O:
    • O.ADDRESS_FILTERING: 1
    • O.AUTHENTICATION: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.FAIL_SECURE: 1
    • O.IPS_ANALYZE: 1
    • O.IPS_REACT: 1
    • O.PORT_FILTERING: 1
    • O.RESIDUAL_INFORMATION: 1
    • O.STATEFUL_TRAFFIC_FILTERING: 1
    • O.SYSTEM_MONITORING: 2
    • O.TOE_ADMINISTRATION: 2
    • O.TRUSTED_COMMUNICATIONS: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.CONNECTIONS: 2
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMN: 1
    • OE.UPDATES: 1
  • T:
    • T.DATA: 1
    • T.MALICIOUS: 1
    • T.NETWORK_ACCESS: 4
    • T.NETWORK_DISCLOSURE: 3
    • T.NETWORK_DOS: 1
    • T.NETWORK_MISUSE: 3
    • T.PASSWORD_CRACKING: 1
    • T.REPLAY_ATTACK: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 3
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 25
      • AES-: 5
  • constructions:
    • MAC:
      • HMAC: 11
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 4
  • RSA:
    • RSA 2048: 1
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 20
  • FF:
    • DH:
      • DH: 15
      • Diffie-Hellman: 5
  • RSA:
    • RSA 2048: 5
    • RSA 4096: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 4
    • SHA2:
      • SHA-256: 3
      • SHA-384: 4
      • SHA-512: 2
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 3
    • SHA2:
      • SHA-256: 13
      • SHA-384: 4
      • SHA-512: 4
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
    • Key exchange: 1
  • MAC:
    • MAC: 2
  • AEAD:
    • AEAD: 2
  • KA:
    • Key Agreement: 1
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 97
    • SSHv2: 11
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 7
      • TLS1.1: 1
      • TLS1.2: 1
  • IKE:
    • IKE: 34
    • IKEv1: 25
    • IKEv2: 25
  • IPsec:
    • IPsec: 37
  • SSH:
    • SSH: 105
    • SSHv2: 15
  • TLS:
    • DTLS:
      • DTLS: 2
    • SSL:
      • SSL: 5
    • TLS:
      • TLS: 5
  • VPN:
    • VPN: 64
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • RNG:
    • RBG: 2
    • RNG: 1
  • PRNG:
    • DRBG: 13
  • RNG:
    • RBG: 2
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 4
  • CBC:
    • CBC: 12
  • CTR:
    • CTR: 4
  • GCM:
    • GCM: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 8
    • P-384: 6
    • P-521: 6
  • NIST:
    • P-256: 30
    • P-384: 28
    • P-521: 16
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
  • OpenSSL:
    • OpenSSL: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 180-4: 3
    • FIPS 186-4: 2
    • FIPS 197: 2
    • FIPS 198-1: 3
    • FIPS PUB 186-4: 6
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
  • RFC:
    • RFC 3526: 2
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4254: 1
    • RFC 5656: 1
    • RFC 6668: 1
    • RFC3526: 1
    • RFC5656: 1
  • X509:
    • X.509: 3
  • FIPS:
    • FIPS 180-4: 6
    • FIPS 186-4: 5
    • FIPS 197: 5
    • FIPS 198-1: 5
    • FIPS PUB 186-4: 8
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-56A: 1
    • SP 800-38A: 2
    • SP 800-38D: 2
    • SP 800-56A: 2
    • SP 800-90A: 2
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 2409: 3
    • RFC 2460: 3
    • RFC 2463: 1
    • RFC 2986: 2
    • RFC 3513: 2
    • RFC 3526: 4
    • RFC 3602: 4
    • RFC 4106: 2
    • RFC 4109: 3
    • RFC 4251: 1
    • RFC 4253: 2
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4306: 3
    • RFC 4443: 1
    • RFC 4868: 6
    • RFC 4945: 2
    • RFC 5077: 1
    • RFC 5114: 2
    • RFC 5280: 5
    • RFC 5282: 1
    • RFC 5656: 1
    • RFC 5735: 2
    • RFC 5759: 1
    • RFC 5996: 1
    • RFC 768: 3
    • RFC 791: 3
    • RFC 792: 2
    • RFC 793: 3
    • RFC 959: 1
    • RFC3526: 1
  • X509:
    • X.509: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • It first provides a descriptive overview of the TOE and then summarises the items which are out of scope of the TOE. 1.5.1 Overview 5. The Target of Evaluation (TOE) is Juniper Networks, Inc. Junos OS 20: 1
    • out of scope: 1
  • OutOfScope:
    • out of scope: 1
    • over SSH and IPsec). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope. The TOE includes cryptographic modules that provide the underlying cryptographic services: 1
pdf_data/st_metadata
  • /Author: Shaina Rae
  • /CreationDate: D:20220621165300-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220621165300-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 1203654
  • pdf_hyperlinks: https://www.juniper.net/documentation/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 89
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different