Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320.
Certificate Number: 2013/85
Following MFP with Fax Option JAPAN: MFP: imagio MP 6001 SP,imagio MP 7501 SP Fax Option: imagio FAX Unit Type 18 Overseas: MFP: Ricoh Aficio MP 6001 SP, Ricoh Aficio MP 7001 SP, Ricoh Aficio MP 8001 SP, Ricoh Aficio MP 9001 SP, Savin 9060sp, Savin 9070sp, Savin 9080sp, Savin 9090sp, Lanier LD360sp, Lanier LD370sp, Lanier LD380sp, Lanier LD390sp, Lanier MP 6001 SP, Lanier MP 7001 SP, Lanier MP 8001 SP, Lanier MP 9001 SP, Gestetner MP 6001 SP,Gestetner MP 7001 SP, Gestetner MP 8001 SP,Gestetner MP 9001 SP, nashuatec MP 6001 SP, nashuatec MP 7001 SP, nashuatec MP 8001 SP,nashuatec MP 9001 SP, Rex-Rotary MP 6001 SP,Rex-Rotary MP 7001 SP, Rex-Rotary MP 8001 SP,Rex-Rotary MP 9001 SP, infotec MP 6001 SP,infotec MP 7001 SP, infotec MP 8001 SP,infotec MP 9001 SP Fax Option: Option Type 9001 MFP Version: Software System/Copy 1.15 Network Support 8.65 Scanner 01.19 Printer 1.15 Fax 02.00.00 Web Support 1.09 Web Uapl 1.05 Network Doc Box 1.04 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-16(WW) 02.00.00
JISEC-CC-CRP-C0274
name Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320. Following MFP with Fax Option JAPAN: MFP: imagio MP 6001 SP,imagio MP 7501 SP Fax Option: imagio FAX Unit Type 18 Overseas: MFP: Ricoh Aficio MP 6001 SP, Ricoh Aficio MP 7001 SP, Ricoh Aficio MP 8001 SP, Ricoh Aficio MP 9001 SP, Savin 9060sp, Savin 9070sp, Savin 9080sp, Savin 9090sp, Lanier LD360sp, Lanier LD370sp, Lanier LD380sp, Lanier LD390sp, Lanier MP 6001 SP, Lanier MP 7001 SP, Lanier MP 8001 SP, Lanier MP 9001 SP, Gestetner MP 6001 SP,Gestetner MP 7001 SP, Gestetner MP 8001 SP,Gestetner MP 9001 SP, nashuatec MP 6001 SP, nashuatec MP 7001 SP, nashuatec MP 8001 SP,nashuatec MP 9001 SP, Rex-Rotary MP 6001 SP,Rex-Rotary MP 7001 SP, Rex-Rotary MP 8001 SP,Rex-Rotary MP 9001 SP, infotec MP 6001 SP,infotec MP 7001 SP, infotec MP 8001 SP,infotec MP 9001 SP Fax Option: Option Type 9001 MFP Version: Software System/Copy 1.15 Network Support 8.65 Scanner 01.19 Printer 1.15 Fax 02.00.00 Web Support 1.09 Web Uapl 1.05 Network Doc Box 1.04 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-16(WW) 02.00.00
category Network and Network-Related Devices and Systems Multi-Function Devices
scheme AU JP
not_valid_after 01.09.2019 01.10.2015
not_valid_before 06.09.2013 28.09.2010
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS_CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0274_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS_ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0274_est.pdf
manufacturer Juniper Networks, Inc. Ricoh Company, Ltd.
manufacturer_web https://www.juniper.net/ https://www.ricoh.com/
security_level {} EAL3
dgst 190a0e55abcc41f1 97e4283cc2be0953
heuristics/cert_id Certificate Number: 2013/85 JISEC-CC-CRP-C0274
heuristics/cpe_matches cpe:2.3:o:juniper:junos:12.1x44:d15:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:12.1:-:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:12.1x44:-:*:*:*:*:*:* {}
heuristics/related_cves CVE-2023-44175, CVE-2014-2713, CVE-2013-4686, CVE-2015-5362, CVE-2016-1261, CVE-2024-39549, CVE-2014-3819, CVE-2016-1256, CVE-2014-6450, CVE-2023-28975, CVE-2023-36840, CVE-2022-22238, CVE-2014-6378, CVE-2022-22156, CVE-2023-44186, CVE-2022-22181, CVE-2013-7313, CVE-2014-6449, CVE-2021-31372, CVE-2023-22406, CVE-2015-5359, CVE-2014-0616, CVE-2022-22224, CVE-2014-6379, CVE-2014-0613, CVE-2023-22391, CVE-2013-6618, CVE-2022-22244, CVE-2022-22208, CVE-2014-3818, CVE-2022-22245, CVE-2014-6447, CVE-2023-44185, CVE-2022-22163, CVE-2022-22215, CVE-2015-3003, CVE-2023-28963, CVE-2022-22173, CVE-2022-22220, CVE-2022-22197, CVE-2023-44201, CVE-2014-2712, CVE-2024-21591, CVE-2023-28979, CVE-2023-22395, CVE-2014-6386, CVE-2015-5358, CVE-2022-22243, CVE-2023-44184, CVE-2022-22242, CVE-2013-4689, CVE-2023-36842, CVE-2015-3004, CVE-2023-44182, CVE-2016-1258, CVE-2022-22241, CVE-2015-5360, CVE-2016-4923, CVE-2023-44197, CVE-2023-4481, CVE-2004-0468, CVE-2023-28962, CVE-2024-21594, CVE-2014-2711, CVE-2023-44177, CVE-2014-6384, CVE-2017-2349, CVE-2019-0036, CVE-2022-22246, CVE-2014-3821, CVE-2023-36839, CVE-2004-0230, CVE-2014-2714, CVE-2024-39528, CVE-2015-7752, CVE-2023-44176, CVE-2023-36843, CVE-2013-6012, CVE-2022-22214, CVE-2014-6380, CVE-2021-31362, CVE-2014-3816, CVE-2014-0615, CVE-2014-6385, CVE-2022-22162, CVE-2023-28964, CVE-2023-44194, CVE-2023-44178, CVE-2023-22407, CVE-2023-36841, CVE-2013-6014 {}
heuristics/extracted_sars AGD_PRE.1, ALC_CMS.1, ADV_FSP.1, AVA_VAN.1, AGD_OPE.1, ATE_IND.1, ALC_CMC.1 ASE_INT.1, ATE_FUN.1, ALC_DVS.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_CMC.3, ATE_IND.2, ASE_SPD.1, ASE_OBJ.2, ADV_TDS.2, ATE_COV.2, ALC_CMS.3, ASE_REQ.2, ADV_ARC.1, ALC_DEL.1, ATE_DPT.1, AGD_OPE.1, ALC_LCD.1, ASE_ECD.1, ADV_FSP.3, AVA_VAN.2
heuristics/extracted_versions 15.5, 12.1 1.05, 1.15, 02.00.00, 1.09, 8.65, 01.19, 1.04
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0274
  • certification_date: 01.09.2010
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0274_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP which can digitize and manage as well as print and fax paper documents. It also provides a secure environment for using copier, scanner, printer, document server, and fax (optional) functions. TOE security functionality The major security functions of the TOE are: - Audit, which creates audit logs of security events. - Identification and Authentication, which identifies and authenticates users. - Document Data Access Control, which controls each users operation of documents. - Stored Data Protection, which encrypts stored document data on hard disk. - Network Communication Data Protection, which encrypts network communications. - Security Management, which provides total management of the security function settings. - Service Mode Lock, which controls the maintenance functions. - Telephone Line Intrusion Protection, which permits fax only communication. - MFP Control Software Verification, which checks the integrity of the software.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: Following MFP with Fax Option JAPAN: MFP: imagio MP 6001 SP, imagio MP 7501 SP Fax Option: imagio FAX Unit Type 18 Overseas: MFP: Ricoh Aficio MP 6001 SP, Ricoh Aficio MP 7001 SP, Ricoh Aficio MP 8001 SP, Ricoh Aficio MP 9001 SP, Savin 9060sp, Savin 9070sp, Savin 9080sp, Savin 9090sp, Lanier LD360sp, Lanier LD370sp, Lanier LD380sp, Lanier LD390sp, Lanier MP 6001 SP, Lanier MP 7001 SP, Lanier MP 8001 SP, Lanier MP 9001 SP, Gestetner MP 6001 SP, Gestetner MP 7001 SP, Gestetner MP 8001 SP, Gestetner MP 9001 SP, nashuatec MP 6001 SP, nashuatec MP 7001 SP, nashuatec MP 8001 SP, nashuatec MP 9001 SP, Rex-Rotary MP 6001 SP, Rex-Rotary MP 7001 SP, Rex-Rotary MP 8001 SP, Rex-Rotary MP 9001 SP, infotec MP 6001 SP, infotec MP 7001 SP, infotec MP 8001 SP, infotec MP 9001 SP Fax Option: Fax Option Type 9001
    • product_type: Multi Function Product
    • report_link: https://www.ipa.go.jp/en/security/c0274_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0274_est.pdf
    • toe_version: MFP Version : Software System/Copy 1.15 Network Support 8.65 Scanner 01.19 Printer 1.15 Fax 02.00.00 Web Support 1.09 Web Uapl 1.05 Network Doc Box 1.04 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-16(WW) 02.00.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.10.2015
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: MFP: imagio MP 6001 SP, imagio MP 7501 SP Fax Option: imagio FAX Unit Type 18
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0274_it0292.html
  • toe_overseas_name: Following MFP with Fax Option MFP: Ricoh Aficio MP 6001 SP, Ricoh Aficio MP 7001 SP, Ricoh Aficio MP 8001 SP, Ricoh Aficio MP 9001 SP, Savin 9060sp, Savin 9070sp, Savin 9080sp, Savin 9090sp, Lanier LD360sp, Lanier LD370sp, Lanier LD380sp, Lanier LD390sp, Lanier MP 6001 SP, Lanier MP 7001 SP, Lanier MP 8001 SP, Lanier MP 9001 SP, Gestetner MP 6001 SP, Gestetner MP 7001 SP, Gestetner MP 8001 SP, Gestetner MP 9001 SP, nashuatec MP 6001 SP, nashuatec MP 7001 SP, nashuatec MP 8001 SP, nashuatec MP 9001 SP, < Cont. >
protection_profiles
pdf_data/report_filename JUNOS_CR.pdf c0274_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • AU:
    • Certification Report 2013/85: 1
  • FR:
    • Certification Report 2013/85: 1
  • JP:
    • CRP-C0274-01: 1
    • Certification No. C0274: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.NETWORK: 1
    • A.SUPERVISOR: 1
  • T:
    • T.ABUSE_SEC_MNG: 3
    • T.FAX_LINE: 3
    • T.ILLEGAL_USE: 4
    • T.SALVAGE: 3
    • T.TRANSIT: 3
    • T.UNAUTH_ACCESS: 7
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 9
    • TLS:
      • TLS: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/tee_name
  • other:
    • T6: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • BSI-AIS 31: 2
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • FIPS:
    • FIPS PUB 197: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Flow Control; Identification and Authentication – note that Telnet and FTP are considered to be out of scope; Security Management; Protection of the TSF; TOE Access; Trusted Path/Channel; and : 1
    • out of scope: 1
  • ConfidentialDocument:
    • users, receives the document data from client computers which are connected via Network, stores the confidential document data into HDD of the TOE, and performs outputting by print and delivery. Therefore, the TOE is a: 1
pdf_data/report_metadata
  • /Author: ACA
  • /Company: Department of Defence
  • /CreationDate: D:20130906112243+10'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /ModDate: D:20130906112248+10'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /SourceModified: D:20130906012109
  • /Title:
  • pdf_file_size_bytes: 82439
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author:
  • /CreationDate: D:20110302164536+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /ModDate: D:20110302164555+09'00'
  • /Producer: Acrobat Distiller 8.2.3 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 347696
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 48
pdf_data/st_filename JUNOS_ST.pdf c0274_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 6
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT.1: 6
    • FAU_STG_EXT.1.1: 1
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.1.1: 1
    • FCS_CKM_EXT.4: 5
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 22
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 4
    • FCS_SSH_EXT: 1
    • FCS_SSH_EXT.1: 5
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
  • FDP:
    • FDP_RIP.2: 5
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 5
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.5: 1
    • FIA_UIA_EXT.1: 6
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 5
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 1
    • FPT_APW_EXT.1: 4
    • FPT_APW_EXT.1.1: 1
    • FPT_SKP_EXT: 1
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 5
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 5
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 5
    • FTA_SSL_EXT.1: 6
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.4.1: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 1
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ADF.1: 1
    • FDP_IFC.1: 12
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 6
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 18
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 10
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
    • FTP_TST.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECTIONS: 1
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.ADDRESS_FILTERING: 2
    • O.DISPLAY_BANNER: 1
    • O.PORT_FILTERING: 2
    • O.PROTECTED_COMMUNICATIONS: 2
    • O.RELATED_CONNECTION_FILTERING: 2
    • O.RESIDUAL_INFORMATION_CLEARING: 2
    • O.SESSION_LOCK: 2
    • O.STATEFUL_INSPECTION: 2
    • O.SYSTEM_MONITORING: 3
    • O.TOE_ADMINISTRATION: 3
    • O.TSF_SELF_TEST: 2
    • O.VERIFIABLE_UPDATES: 2
  • OE:
    • OE.CONNECTIONS: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.NETWORK_DISCLOSURE: 1
    • T.NETWORK_DOS: 1
    • T.NETWORK_MISUSE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
  • A:
    • A.ADMIN: 5
    • A.NETWORK: 5
    • A.SUPERVISOR: 4
  • O:
    • O.AUDIT: 16
    • O.DOC_ACC: 9
    • O.GENUINE: 9
    • O.LINE: 2
    • O.LINE_PROTECT: 7
    • O.MANAGE: 11
    • O.MEM: 11
    • O.NET: 10
  • OE:
    • OE.ADMIN: 3
    • OE.NETWORK: 3
    • OE.SUPERVISOR: 3
  • T:
    • T.ABUSE_SEC_MNG: 4
    • T.FAX_LINE: 3
    • T.ILLEGAL_USE: 4
    • T.SALVAGE: 3
    • T.TRANSIT: 4
    • T.UNAUTH_ACCESS: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • 3DES:
      • TDEA: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 7
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 3
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 2
  • SSH:
    • SSH: 51
  • TLS:
    • SSL:
      • SSL: 3
  • VPN:
    • VPN: 1
  • TLS:
    • SSL:
      • SSL: 9
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RBG: 2
    • RNG: 5
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CCM:
    • CCM: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • RFC:
    • RFC 2460: 2
    • RFC 3513: 2
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 2
    • RFC 4254: 1
    • RFC 4443: 2
    • RFC 5735: 2
    • RFC 768: 2
    • RFC 791: 2
    • RFC 792: 2
    • RFC 793: 2
    • RFC 959: 2
    • RFC2410: 1
    • RFC4253: 2
  • BSI:
    • BSI-AIS31: 3
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2006-09-002: 1
    • CCMB-2007-09-0004: 1
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
  • FIPS:
    • FIPS197: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Document Version 2.1 ©Juniper Networks, Inc: 1
    • including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Document Version 2.1 ©Juniper Networks, Inc. Page 12 of 56 Security Target: Juniper Networks, Inc: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Apex Assurance Group
  • /Client: Juniper Networks, Inc.
  • /Company: Apex
  • /CreationDate: D:20130905114107+10'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /DocVersion: 2.1
  • /ModDate: D:20130905114123+10'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /SourceModified: D:20130905013924
  • /Subject: JUNOS 12.1 X44 D15.5 for SRX Series Platforms
  • /Title: Security Target
  • pdf_file_size_bytes: 872150
  • pdf_hyperlinks: http://www.juniper.net/, http://www.apexassurance.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
  • /Author: p000266068
  • /CreationDate: D:20110223182103
  • /Creator: Mar-C4_ST_ENG_20110223.doc - Microsoft Word
  • /Producer: Acrobat PDFWriter 5.0 Windows NT
  • /Title: Mar-C4_ST_ENG_20110223.doc
  • pdf_file_size_bytes: 2449170
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 83
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different