This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320. Certificate Number: 2013/85 |
Ricoh Aficio SP 5200S/5210SF/5210SR, Savin SP 5200S/5210SF/5210SR, Lanier SP 5200S/5210SF/5210SR, nashuatec SP 5200S/5210SF/5210SR, Rex-Rotary SP 5200S/5210SF/5210SR, Gestetner SP 5200S/5210SF/5210SR all of above with Facsimile Function Version: - Software: System/Copy 2.02, Network Support 10.63, Fax 02.00.00, RemoteFax 01.00.00, NetworkDocBox 1.04, Web Support 1.02, Web Uapl 1.02, animation 1.01, Scanner 01.03, Printer 1.02.1, PCL 1.02, PCL Font 1.05, Data Erase Std 1.01m, GWFCU3-24(WW) 02.00.00, Engine A2.0:20, Engine(Scanner) 1.01:00, OpePanel 1.02, LANG0 1.02, LANG1 1.02 Hardware: Ic Key 01020714, Ic Hdd 01 JISEC-CC-CRP-C0366 |
|
---|---|---|
name | Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320. | Ricoh Aficio SP 5200S/5210SF/5210SR, Savin SP 5200S/5210SF/5210SR, Lanier SP 5200S/5210SF/5210SR, nashuatec SP 5200S/5210SF/5210SR, Rex-Rotary SP 5200S/5210SF/5210SR, Gestetner SP 5200S/5210SF/5210SR all of above with Facsimile Function Version: - Software: System/Copy 2.02, Network Support 10.63, Fax 02.00.00, RemoteFax 01.00.00, NetworkDocBox 1.04, Web Support 1.02, Web Uapl 1.02, animation 1.01, Scanner 01.03, Printer 1.02.1, PCL 1.02, PCL Font 1.05, Data Erase Std 1.01m, GWFCU3-24(WW) 02.00.00, Engine A2.0:20, Engine(Scanner) 1.01:00, OpePanel 1.02, LANG0 1.02, LANG1 1.02 Hardware: Ic Key 01020714, Ic Hdd 01 |
category | Network and Network-Related Devices and Systems | Multi-Function Devices |
scheme | AU | JP |
not_valid_after | 01.09.2019 | 07.02.2017 |
not_valid_before | 06.09.2013 | 30.08.2012 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS_CR.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0366_erpt.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS_ST.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0366_est.pdf |
manufacturer | Juniper Networks, Inc. | Ricoh Company, Ltd. |
manufacturer_web | https://www.juniper.net/ | https://www.ricoh.com/ |
security_level | {} | EAL3+, ALC_FLR.2 |
dgst | 190a0e55abcc41f1 | 0190ccc92fdb2382 |
heuristics/cert_id | Certificate Number: 2013/85 | JISEC-CC-CRP-C0366 |
heuristics/cpe_matches | cpe:2.3:o:juniper:junos:12.1:-:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:12.1x44:-:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2013-4689, CVE-2023-36840, CVE-2014-0615, CVE-2004-0230, CVE-2014-0613, CVE-2022-22220, CVE-2014-6449, CVE-2017-2349, CVE-2024-39511, CVE-2015-3004, CVE-2014-6378, CVE-2014-6450, CVE-2023-44177, CVE-2004-0468, CVE-2023-44176, CVE-2013-4686, CVE-2023-4481, CVE-2023-44178, CVE-2023-44182, CVE-2014-2712, CVE-2014-3818, CVE-2014-3821, CVE-2023-28962, CVE-2024-39514, CVE-2023-44197, CVE-2024-39555, CVE-2022-22245, CVE-2013-7313, CVE-2023-22406, CVE-2025-21590, CVE-2024-30380, CVE-2014-3816, CVE-2015-5358, CVE-2023-22391, CVE-2024-39549, CVE-2015-5359, CVE-2023-44186, CVE-2013-6618, CVE-2016-1261, CVE-2023-44194, CVE-2023-36841, CVE-2022-22156, CVE-2023-36842, CVE-2015-3003, CVE-2022-22181, CVE-2014-2711, CVE-2023-22395, CVE-2022-22246, CVE-2022-22241, CVE-2014-2713, CVE-2024-21591, CVE-2021-31372, CVE-2023-28964, CVE-2021-31362, CVE-2013-6014, CVE-2014-0616, CVE-2022-22244, CVE-2023-28975, CVE-2023-44201, CVE-2014-6379, CVE-2015-7752, CVE-2022-22208, CVE-2023-28963, CVE-2024-39556, CVE-2014-3819, CVE-2016-1258, CVE-2023-44175, CVE-2015-5360, CVE-2014-6447, CVE-2023-36839, CVE-2022-22238, CVE-2024-39517, CVE-2022-22163, CVE-2016-1256, CVE-2022-22243, CVE-2024-30397, CVE-2023-36843, CVE-2014-6384, CVE-2022-22224, CVE-2022-22197, CVE-2024-39528, CVE-2022-22215, CVE-2019-0036, CVE-2023-44184, CVE-2016-4923, CVE-2015-5362, CVE-2013-6012, CVE-2023-22407, CVE-2022-22173, CVE-2022-22214, CVE-2023-28979, CVE-2024-39558, CVE-2024-21594, CVE-2014-6385, CVE-2022-22242, CVE-2014-6380, CVE-2014-2714, CVE-2022-22162, CVE-2023-44185, CVE-2014-6386 | {} |
heuristics/extracted_sars | ATE_IND.1, ALC_CMC.1, AGD_PRE.1, AVA_VAN.1, ADV_FSP.1, ALC_CMS.1, AGD_OPE.1 | ALC_CMC.3, ALC_DEL.1, ADV_TDS.2, AGD_OPE.1, ADV_FSP.3, ALC_CMS.3, ATE_DPT.1, ATE_FUN.1, ASE_CCL.1, ALC_LCD.1, ASE_REQ.2, AGD_PRE.1, ASE_TSS.1, ASE_SPD.1, ASE_ECD.1, ALC_DVS.1, ALC_FLR.2, ATE_IND.2, AVA_VAN.2, ATE_COV.2, ADV_ARC.1, ASE_INT.1, ASE_OBJ.2 |
heuristics/extracted_versions | 12.1, 15.5 | 1.01, 2.02, 01.00.00, 1.05, 1.02.1, 1.02, 02.00.00, 01.03, 10.63, 1.04, 2.0 |
heuristics/protection_profiles | d7508f508083d040, ac9abe3d5c5a31f0 | 32475ccb695b1644 |
maintenance_updates |
|
|
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf |
pdf_data/report_filename | JUNOS_CR.pdf | c0366_erpt.pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | JUNOS_ST.pdf | c0366_est.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |