name |
JUNOS 9.3R1 M/MX/T & EX family of routers and switches |
Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5 |
category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
UK |
US |
status |
archived |
archived |
not_valid_after |
03.02.2014 |
07.05.2016 |
not_valid_before |
03.02.2009 |
07.03.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CRP248]%20JUNOS%209.3R1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS%209.3R1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-st.pdf |
manufacturer |
Juniper Networks, Inc. |
Juniper Networks, Inc. |
manufacturer_web |
https://www.juniper.net/ |
https://www.juniper.net/ |
security_level |
ALC_FLR.3, EAL3+ |
{} |
dgst |
1905aafb7b17e82d |
c99465e61767d10a |
heuristics/cert_id |
CRP248 |
CCEVS-VR-VID-10517-2014 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
cpe:2.3:o:juniper:junos:12.1:r11:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2019-0036, CVE-2024-39556, CVE-2022-22208, CVE-2022-22220, CVE-2022-22244, CVE-2022-22197, CVE-2014-2714, CVE-2021-31372, CVE-2024-21591, CVE-2014-6379, CVE-2023-22391, CVE-2023-22395, CVE-2023-44194, CVE-2023-28975, CVE-2024-39555, CVE-2013-4686, CVE-2023-44176, CVE-2024-39511, CVE-2022-22224, CVE-2023-28963, CVE-2024-39549, CVE-2004-0468, CVE-2022-22163, CVE-2024-39514, CVE-2014-2713, CVE-2014-3818, CVE-2004-0230, CVE-2022-22173, CVE-2023-28962, CVE-2014-2712, CVE-2023-44197, CVE-2022-22245, CVE-2022-22243, CVE-2023-36841, CVE-2023-44182, CVE-2022-22241, CVE-2022-22156, CVE-2024-21594, CVE-2022-22181, CVE-2014-3816, CVE-2022-22242, CVE-2023-44185, CVE-2023-44184, CVE-2022-22215, CVE-2014-6380, CVE-2023-44175, CVE-2023-44177, CVE-2022-22162, CVE-2024-39528, CVE-2023-36839, CVE-2023-44201, CVE-2014-3819, CVE-2023-36843, CVE-2013-6618, CVE-2022-22238, CVE-2023-28964, CVE-2024-30380, CVE-2024-39558, CVE-2023-36842, CVE-2013-7313, CVE-2013-6014, CVE-2023-44186, CVE-2014-2711, CVE-2021-31362, CVE-2013-4689, CVE-2024-30397, CVE-2023-28979, CVE-2023-22407, CVE-2023-36840, CVE-2022-22246, CVE-2023-44178, CVE-2023-4481, CVE-2023-22406, CVE-2022-22214, CVE-2024-39517 |
heuristics/direct_transitive_cves |
CVE-2019-0036, CVE-2024-39556, CVE-2022-22208, CVE-2022-22220, CVE-2022-22244, CVE-2022-22197, CVE-2014-2714, CVE-2014-0616, CVE-2021-31372, CVE-2024-21591, CVE-2023-22391, CVE-2023-22395, CVE-2023-44194, CVE-2023-28975, CVE-2024-39555, CVE-2013-4686, CVE-2023-44176, CVE-2024-39511, CVE-2022-22224, CVE-2023-28963, CVE-2024-39549, CVE-2004-0468, CVE-2022-22163, CVE-2024-39514, CVE-2014-3818, CVE-2004-0230, CVE-2022-22173, CVE-2023-28962, CVE-2014-2712, CVE-2023-44197, CVE-2022-22245, CVE-2022-22243, CVE-2023-36841, CVE-2023-44182, CVE-2022-22241, CVE-2022-22156, CVE-2024-21594, CVE-2022-22181, CVE-2022-22242, CVE-2023-44185, CVE-2023-44184, CVE-2022-22215, CVE-2023-44175, CVE-2023-44177, CVE-2022-22162, CVE-2024-39528, CVE-2023-36839, CVE-2023-44201, CVE-2023-36843, CVE-2013-6618, CVE-2022-22238, CVE-2023-28964, CVE-2024-30380, CVE-2024-39558, CVE-2024-30397, CVE-2023-36842, CVE-2014-0613, CVE-2013-7313, CVE-2013-6014, CVE-2023-44186, CVE-2014-0615, CVE-2021-31362, CVE-2013-4689, CVE-2013-6170, CVE-2023-28979, CVE-2023-22407, CVE-2023-36840, CVE-2022-22246, CVE-2023-44178, CVE-2023-4481, CVE-2023-22406, CVE-2022-22214, CVE-2024-39517 |
{} |
heuristics/indirect_transitive_cves |
CVE-2019-0036, CVE-2024-39556, CVE-2022-22208, CVE-2022-22220, CVE-2022-22244, CVE-2022-22197, CVE-2014-2714, CVE-2014-0616, CVE-2021-31372, CVE-2024-21591, CVE-2023-22391, CVE-2023-22395, CVE-2023-44194, CVE-2023-28975, CVE-2024-39555, CVE-2013-4686, CVE-2023-44176, CVE-2024-39511, CVE-2022-22224, CVE-2023-28963, CVE-2024-39549, CVE-2004-0468, CVE-2022-22163, CVE-2024-39514, CVE-2014-3818, CVE-2004-0230, CVE-2022-22173, CVE-2023-28962, CVE-2014-2712, CVE-2023-44197, CVE-2022-22245, CVE-2022-22243, CVE-2023-36841, CVE-2023-44182, CVE-2022-22241, CVE-2022-22156, CVE-2024-21594, CVE-2022-22181, CVE-2022-22242, CVE-2023-44185, CVE-2023-44184, CVE-2022-22215, CVE-2023-44175, CVE-2023-44177, CVE-2022-22162, CVE-2024-39528, CVE-2023-36839, CVE-2023-44201, CVE-2023-36843, CVE-2013-6618, CVE-2022-22238, CVE-2023-28964, CVE-2024-30380, CVE-2024-39558, CVE-2024-30397, CVE-2023-36842, CVE-2014-0613, CVE-2013-7313, CVE-2013-6014, CVE-2023-44186, CVE-2014-0615, CVE-2021-31362, CVE-2013-4689, CVE-2013-6170, CVE-2023-28979, CVE-2023-22407, CVE-2023-36840, CVE-2022-22246, CVE-2023-44178, CVE-2023-4481, CVE-2023-22406, CVE-2022-22214, CVE-2024-39517 |
{} |
heuristics/extracted_sars |
ASE_REQ.2, ATE_FUN.1, ATE_DPT.1, ASE_OBJ.2, ASE_ECD.1, ADV_FSP.3, ATE_IND.2, AVA_VAN.2, ALC_DVS.1, ALC_CMS.3, ASE_SPD.1, ADV_ARC.1, AGD_PRE.1, ASE_INT.1, ADV_TDS.2, ALC_LCD.1, ATE_COV.2, AGD_OPE.1, ASE_TSS.1, ALC_CMC.3, ALC_DEL.1, ALC_FLR.3, ASE_CCL.1 |
AGD_OPE.1, ASE_TSS.1, ASE_OBJ.1, AGD_PRE.1, ADV_FSP.1, ALC_CMS.1, ASE_ECD.1, ASE_REQ.1, AVA_VAN.1, ALC_CMC.1, ASE_INT.1, ATE_IND.1, ASE_CCL.1 |
heuristics/extracted_versions |
9.3 |
3.5, 12.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
CRP258 |
{} |
heuristics/report_references/directly_referencing |
CRP237 |
{} |
heuristics/report_references/indirectly_referenced_by |
CRP258 |
{} |
heuristics/report_references/indirectly_referencing |
CRP237 |
{} |
heuristics/scheme_data |
|
- category: Network Device, Network Switch, Router
- certification_date: 07.03.2014
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 29.05.2016
- id: CCEVS-VR-VID10517
- product: Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5
- scheme: US
- url: https://www.niap-ccevs.org/product/10517
- vendor: Juniper Networks, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
ac9abe3d5c5a31f0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
[CRP248] JUNOS 9.3R1.pdf |
st_vid10517-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10517-2014
- cert_item: Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T- Series Core Routers and EX-Series Ethernet Switches running Junos 12.1R3.5
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10517-2014: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 3
- EAL3 augmented: 2
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CRYPTO: 1
- A.EAUTH: 1
- A.LOCATE: 1
- A.NOEVIL: 1
- A.TIME: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Bhavin
- /CreationDate: D:20140328093222Z00'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20140328093222Z00'00'
- /Producer: GPL Ghostscript 9.06
- /Title: Microsoft Word - T556 - CR v1.0.doc
- pdf_file_size_bytes: 953617
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /Author: Leidos
- /Company: Leidos
- /CreationDate: D:20140310131529-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /ModDate: D:20140310131543-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140310171504
- /Subject: Juniper Junos NDPP
- /Title: Validation Report
- /_NewReviewCycle:
- pdf_file_size_bytes: 119090
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
JUNOS 9.3R1.pdf |
st_vid10517-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3: 6
- EAL3 augmented: 5
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 8
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 7
- FAU_ARP.1.1: 1
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAA.1: 7
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF.1: 12
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ROL.1: 7
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 1
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 16
- FMT_MOF.1: 2
- FMT_MSA.1: 3
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 43
- FMT_MTD.1: 6
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FPT:
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_TSE.1: 7
- FTA_TSE.1.1: 1
- FTP:
|
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 2
- FCS_CKM.2: 1
- FCS_CKM.4: 6
- FCS_CKM_EXT.4: 10
- FCS_COP.1: 20
- FCS_COP.1.1: 4
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT.1: 6
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FDP:
- FDP_ITC.1: 6
- FDP_ITC.2: 5
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT.1: 7
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 7
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 1
- FIA_UIA_EXT.1: 8
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 3
- FMT:
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 3
- FPT_APW_EXT.1.1: 3
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TRP.1: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_EXT_SSL.1: 2
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 2
- FTA_SSL_EXT.1.1: 2
- FTA_SSL_EXT.4: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CRYPTO: 4
- A.EAUTH: 2
- A.LOCATE: 4
- A.NOEVIL: 3
- A.TIME: 4
- O:
- O.ACCESS: 14
- O.AMANAGE: 17
- O.AUDIT: 17
- O.EADMIN: 8
- O.EAL: 4
- O.FLOW: 11
- O.PROTECT: 17
- O.ROLBAK: 4
- OE:
- OE.ADMIN: 3
- OE.CRYPTO: 4
- OE.EAUTH: 4
- OE.PHYSICAL: 3
- OE.TIME: 4
- T:
- T.CONFLOSS: 5
- T.MANDAT: 4
- T.NOAUDIT: 2
- T.OPS: 7
- T.PRIVIL: 7
- T.ROUTE: 10
- T.THREAT: 4
|
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.DISPLAY_BANNER: 1
- O.PROTECTED_COMMUNICATIONS: 1
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 3
- Key exchange: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS140: 1
- FIPS197: 1
- NIST:
- RFC:
- RFC 2404: 1
- RFC 2406: 1
- RFC 2409: 1
- RFC 2451: 1
- RFC 4251: 2
- RFC 4252: 1
- RFC 4253: 2
- RFC 4254: 1
- RFC 4741: 1
- RFC2404: 1
- RFC2406: 1
- RFC2409: 1
- RFC2451: 1
- RFC4253: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: • All: 1
- out of scope: 2
- prior to any exchange. This covers all services used to exchange information, including telnet (out of scope), SSH, SSL, and FTP 2 . Authentication services can be handled either internally (user selected: 1
|
- OutOfScope:
- Line Card network interface components) which simply deal with physical interfaces mechanics are out of scope. Security Target Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge: 1
- SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
- including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20090113155600Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120106145421Z
- /Producer: GPL Ghostscript 8.15
- /Subject: Security Target for Juniper Networks M7i, M10i, M40e, M120, M320, T320, T640, T1600, MX240, MX480 and MX960 Services Routers and EX3200, EX4200 Switches running JUNOS 9.3R1
- /Title: JUNOS 9.3R1 ST
- pdf_file_size_bytes: 254683
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: ISL-netbook
- /CreationDate: D:20140513092401+01'00'
- /Creator: PDFCreator Version 1.7.2
- /Keywords:
- /ModDate: D:20140603093259-04'00'
- /Producer: GPL Ghostscript 9.10
- /Subject:
- /Title: [ST] juniper-junos-12 1R3.6-stv1.7 (140512) - clean
- pdf_file_size_bytes: 529913
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 49
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |