This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| IBM Tivoli Netcool/OMNIbus Version 7.3.1 None |
Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y Certificate Number: 2021/135 |
|
|---|---|---|
| name | IBM Tivoli Netcool/OMNIbus Version 7.3.1 | Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y |
| scheme | US | AU |
| status | archived | active |
| not_valid_after | 31.12.2014 | 15.02.2026 |
| not_valid_before | 21.12.2012 | 15.02.2021 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T017%20Cert%202021_135%20OS.pdf | |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10355-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/T0017-Certification_Report_V1.0.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10355-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20QFX5120,%20QFX5200,%20QFX5210,%20EX4650%20Junos%2020.2R1%20ST%20v1.3.pdf |
| manufacturer | IBM United Kingdom Limited | HPE Juniper Networking |
| manufacturer_web | https://www.ibm.com/uk/ | https://www.juniper.net/ |
| security_level | EAL4+, ALC_FLR.3 | {} |
| dgst | 0bf6b35f242ca3f0 | 07bffc2fb1a2fbc4 |
| heuristics/cert_id | Certificate Number: 2021/135 | |
| heuristics/cpe_matches | cpe:2.3:a:ibm:tivoli_netcool\/omnibus:7.3.1.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_netcool\/omnibus:7.3.1.4:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_netcool\/omnibus:7.3.1.3:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_netcool\/omnibus:7.3.1.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_netcool\/omnibus:7.3.1.5:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_netcool\/omnibus:7.3.1.6:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_netcool\/omnibus:7.3.1.2:*:*:*:*:*:*:* | {} |
| heuristics/related_cves | CVE-2014-3032 | {} |
| heuristics/extracted_sars | ALC_FLR.3 | ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
| heuristics/extracted_versions | 7.3.1 | 20.2 |
| protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf |
| pdf_data/cert_filename | EFT-T017 Cert 2021_135 OS.pdf | |
| pdf_data/cert_keywords/cc_cert_id | ||
| pdf_data/cert_keywords/cc_protection_profile_id | ||
| pdf_data/cert_keywords/cc_security_level | ||
| pdf_data/cert_keywords/cc_sar | ||
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor | ||
| pdf_data/cert_keywords/eval_facility | ||
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness | ||
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name | ||
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | T0017-Certification_Report_V1.0.pdf | |
| pdf_data/report_frontpage | ||
| pdf_data/report_keywords/cc_cert_id | ||
| pdf_data/report_keywords/cc_protection_profile_id | ||
| pdf_data/report_keywords/cc_security_level | ||
| pdf_data/report_keywords/cc_sar | ||
| pdf_data/report_keywords/cc_sfr | ||
| pdf_data/report_keywords/cc_claims | ||
| pdf_data/report_keywords/vendor | ||
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto | ||
| pdf_data/report_keywords/asymmetric_crypto | ||
| pdf_data/report_keywords/pq_crypto | ||
| pdf_data/report_keywords/hash_function | ||
| pdf_data/report_keywords/crypto_scheme | ||
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode | ||
| pdf_data/report_keywords/ecc_curve | ||
| pdf_data/report_keywords/crypto_engine | ||
| pdf_data/report_keywords/tls_cipher_suite | ||
| pdf_data/report_keywords/crypto_library | ||
| pdf_data/report_keywords/vulnerability | ||
| pdf_data/report_keywords/side_channel_analysis | ||
| pdf_data/report_keywords/technical_report_id | ||
| pdf_data/report_keywords/device_model | ||
| pdf_data/report_keywords/tee_name | ||
| pdf_data/report_keywords/os_name | ||
| pdf_data/report_keywords/cplc_data | ||
| pdf_data/report_keywords/ic_data_group | ||
| pdf_data/report_keywords/standard_id | ||
| pdf_data/report_keywords/javacard_version | ||
| pdf_data/report_keywords/javacard_api_const | ||
| pdf_data/report_keywords/javacard_packages | ||
| pdf_data/report_keywords/certification_process | ||
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | Juniper QFX5120, QFX5200, QFX5210, EX4650 Junos 20.2R1 ST v1.3.pdf | |
| pdf_data/st_keywords/cc_cert_id | ||
| pdf_data/st_keywords/cc_protection_profile_id | ||
| pdf_data/st_keywords/cc_security_level | ||
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor | ||
| pdf_data/st_keywords/eval_facility | ||
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto | ||
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine | ||
| pdf_data/st_keywords/tls_cipher_suite | ||
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability | ||
| pdf_data/st_keywords/side_channel_analysis | ||
| pdf_data/st_keywords/technical_report_id | ||
| pdf_data/st_keywords/device_model | ||
| pdf_data/st_keywords/tee_name | ||
| pdf_data/st_keywords/os_name | ||
| pdf_data/st_keywords/cplc_data | ||
| pdf_data/st_keywords/ic_data_group | ||
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version | ||
| pdf_data/st_keywords/javacard_api_const | ||
| pdf_data/st_keywords/javacard_packages | ||
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_ok | False | True |
| state/cert/download_ok | False | True |
| state/cert/extract_ok | False | True |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/convert_ok | False | True |
| state/report/download_ok | False | True |
| state/report/extract_ok | False | True |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/convert_ok | False | True |
| state/st/download_ok | False | True |
| state/st/extract_ok | False | True |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |