Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Juniper EX4300 with JUNOS 14.1X53d30
CCEVS-VR-VID-10662-2015
CONEXA 3.0, SW: v3.80.0-cc, HW V01.00 & V01.01
BSI-DSZ-CC-0918-V6-2024
name Juniper EX4300 with JUNOS 14.1X53d30 CONEXA 3.0, SW: v3.80.0-cc, HW V01.00 & V01.01
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme US DE
status archived active
not_valid_after 10.12.2017 07.02.2032
not_valid_before 10.12.2015 08.02.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10662-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V6c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10662-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V6a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10662-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V6b_pdf.pdf
manufacturer HPE Juniper Networking Theben Smart Energy GmbH
manufacturer_web https://www.juniper.net/ https://www.theben.de
security_level EAL1 EAL4+, ALC_FLR.2
dgst 3b362f3342155c54 df3f2ac26199d021
heuristics/cert_id CCEVS-VR-VID-10662-2015 BSI-DSZ-CC-0918-V6-2024
heuristics/cert_lab US BSI
heuristics/extracted_sars ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_OBJ.2, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ASE_REQ.2, ADV_FSP.1 ALC_LCD.1, ASE_CCL.1, ATE_FUN.1, ALC_FLR.2, AVA_VAN.5, AGD_OPE.1, ATE_COV.2, ASE_INT.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ASE_REQ.2, ADV_FSP.4, ADV_ARC.1, ADV_IMP.1
heuristics/extracted_versions 14.1 3.0, 01.01, 3.80.0, 01.00
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0918-V7-2025
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0918-V5-2023, BSI-DSZ-CC-0957-V2-2016
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0918-V8-2025, BSI-DSZ-CC-0918-V7-2025
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0918-V2-2021, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0918-V3-2022, BSI-DSZ-CC-0918-V5-2023, BSI-DSZ-CC-0918-V4-2022, BSI-DSZ-CC-0957-2015, BSI-DSZ-CC-0918-2020, BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0845-V2-2013
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10662/
  • categories: ['Network Device']
  • category: Network Device
  • certification_date: 10.12.2015
  • evaluation_facility: UL Verification Services
  • expiration_date: 10.12.2017
  • id: CCEVS-VR-VID10662
  • product: Juniper EX4300 with JUNOS 14.1X53d30
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10662
  • vendor: HPE Juniper Networking
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0957-V2-2016
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0978-2016
heuristics/protection_profiles ac9abe3d5c5a31f0 {}
maintenance_updates

protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf {}
pdf_data/cert_filename st_vid10662-ci.pdf 0918V6c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10662-2015: 1
  • DE:
    • BSI-DSZ-CC-0918-V6-2024: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20151218141842-05'00'
  • /ModDate: D:20151218141918-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 177843
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa"
  • /Subject: Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben, Conexa
  • /Title: Certification Report BSI-DSZ-CC-0918-V6-2024
  • pdf_file_size_bytes: 337823
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10662-vr.pdf 0918V6a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10662-2015
    • cert_item: Juniper Networks, Inc. Juniper Networks EX4300 Switch Running Junos OS 14.1X53-D30
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2 and AVA_VAN.5 valid until: 07 February 2032
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0918-V6-2024
    • cert_item: CONEXA 3.0 SW: v3.80.0-cc, HW V01.00 & V01.01
    • cert_lab: BSI
    • developer: Theben Smart Energy GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10662-2015: 1
  • DE:
    • BSI-DSZ-CC-0918-V5-: 1
    • BSI-DSZ-CC-0918-V5-2023: 2
    • BSI-DSZ-CC-0918-V6-2024: 14
    • BSI-DSZ-CC-0957-V2-2016: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0073-2014: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMS.4: 2
    • ALC_FLR: 3
    • ALC_FLR.2: 5
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
pdf_data/report_keywords/eval_facility
  • TSystems:
    • T-Systems International: 1
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • ECC:
    • ECC:
      • ECC: 4
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 9
    • SSHv2: 3
  • TLS:
    • SSL:
      • SSL: 2
  • SSH:
    • SSH: 3
  • TLS:
    • TLS:
      • TLS: 4
      • TLS 1.2: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 1
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 3
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 2
  • Brainpool:
    • brainpoolP256r1: 1
    • brainpoolP384r1: 1
    • brainpoolP512r1: 1
  • NIST:
    • secp256r1: 1
    • secp384r1: 1
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2004-0468: 1
    • CVE-2006-3529: 1
    • CVE-2007-6372: 1
    • CVE-2013-4684: 1
    • CVE-2013-4686: 1
    • CVE-2013-4687: 1
    • CVE-2013-4688: 1
    • CVE-2013-6170: 1
    • CVE-2014-0612: 1
    • CVE-2014-0613: 1
    • CVE-2014-0614: 1
    • CVE-2014-0616: 1
    • CVE-2014-0618: 1
    • CVE-2014-2713: 1
    • CVE-2014-2714: 1
    • CVE-2014-3815: 1
    • CVE-2014-3817: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
    • BSI TR-02102-1: 1
    • BSI TR-03109-1: 1
    • BSI TR-03109-3: 1
    • BSI TR-03116: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • BSI:
    • AIS 32: 1
    • AIS 34: 2
    • AIS 38: 1
    • AIS 46: 2
    • AIS 48: 2
  • FIPS:
    • FIPS 180-4: 4
    • FIPS 197: 7
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC 2104: 3
    • RFC 3394: 3
    • RFC 4493: 6
    • RFC 5084: 3
    • RFC 5114: 3
    • RFC 5246: 3
    • RFC 5289: 3
    • RFC 5639: 3
    • RFC5246: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration: 1
    • Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration. 7 4.5 Security Management The TOE provides an: 1
    • out of scope: 1
  • ConfidentialDocument:
    • 3.0 (ALC_CMS.4) FÜR FIRMWARE VERSION 3.80.0-cc, 2024-01-19, Theben Smart Energy GmbH (confidential document) [11] Handbuch CONEXA 3.0 für Gateway Administrator, Version 2.12.1, 2023-09-04, Theben Smart: 1
    • ALC_CMS.4 Konfigurationsliste Smart Meter Gateway CONEXA 3.0 Version 1.0, Theben Smart Energy GmbH (confidential document) [10] Configuration list for the TOE SW, “ASSURANCE LIFE CYCLE – CONFIGURATION MANAGEMENT” DER: 1
    • Report – Smart Meter Gateway CONEXA 3.0, Version 1.0, 2024-01- 23, Theben Smart Energy GmbH (confidential document) [20] Technische Richtlinie BSI TR-03109-1 Anforderungen an die Interoperabilität der: 1
    • Smart Energy GmbH [7] ETR Summary CONEXA 1.5, Version 2, 31.01.2024, TÜV Informationstechnik GmbH, (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
pdf_data/st_filename st_vid10662-st.pdf 0918V6b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0957-V2-2016: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0073: 1
    • BSI-CC-PP-0077: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 5
    • EAL 4 augmented: 2
    • EAL4: 1
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 6
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 1
    • FAU_STG_EXT.1: 11
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 1
    • FCS_CKM.4: 7
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 20
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 46
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSH_EXT.1: 14
    • FCS_SSH_EXT.1.1: 2
    • FCS_SSH_EXT.1.2: 2
    • FCS_SSH_EXT.1.3: 2
    • FCS_SSH_EXT.1.4: 2
    • FCS_SSH_EXT.1.5: 2
    • FCS_SSH_EXT.1.6: 2
    • FCS_SSH_EXT.1.7: 2
    • FCS_TLS_EXT.1: 2
  • FDP:
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.2: 5
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_PMG_EXT.1: 11
    • FIA_PMG_EXT.1.1: 2
    • FIA_PSK_EXT.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 3
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 11
    • FIA_UAU_EXT.2.1: 2
    • FIA_UIA_EXT.1: 17
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
    • FIA_UID.1: 5
  • FMT:
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.2: 5
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 9
    • FPT_APW_EXT.1.1: 4
    • FPT_APW_EXT.1.2: 2
    • FPT_SKP_EXT.1: 11
    • FPT_SKP_EXT.1.1: 2
    • FPT_SSP.1: 1
    • FPT_SSP.2: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TRP.1: 1
    • FPT_TST.1: 1
    • FPT_TST_EXT.1: 11
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT.1: 11
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 2
  • FTA:
    • FTA_EXT_SSL.1: 1
    • FTA_SSL: 1
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 9
    • FTA_SSL_EXT.1.1: 3
    • FTA_SSL_EXT.4: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP: 10
    • FAU_ARP.1: 1
    • FAU_GEN: 38
    • FAU_GEN.1: 22
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAA: 11
    • FAU_SAA.1: 4
    • FAU_SAR: 30
    • FAU_SAR.1: 7
    • FAU_STG: 32
    • FAU_STG.1: 8
    • FAU_STG.2: 15
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.3: 3
    • FAU_STG.4: 3
  • FCO:
    • FCO_NRO: 3
    • FCO_NRO.1: 1
    • FCO_NRO.2: 9
    • FCO_NRO.2.1: 1
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 1
  • FCS:
    • FCS_CKM: 44
    • FCS_CKM.1: 16
    • FCS_CKM.2: 6
    • FCS_CKM.4: 32
    • FCS_CKM.4.1: 1
    • FCS_COP: 63
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 9
    • FDP_ACC.2: 11
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 11
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 3
    • FDP_IFC: 29
    • FDP_IFC.1: 12
    • FDP_IFC.2: 4
    • FDP_IFF: 25
    • FDP_IFF.1: 24
    • FDP_IFF.1.3: 1
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_RIP: 2
    • FDP_RIP.1: 1
    • FDP_RIP.2: 9
    • FDP_RIP.2.1: 1
    • FDP_SDI: 2
    • FDP_SDI.1: 1
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 1
    • FIA_UID: 3
    • FIA_UID.1: 8
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
    • FIA_USB: 3
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 1
    • FMT_MSA: 64
    • FMT_MSA.1: 9
    • FMT_MSA.3: 12
    • FMT_SMF: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR: 3
    • FMT_SMR.1: 30
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_CON: 6
    • FPR_CON.1: 10
    • FPR_CON.1.1: 3
    • FPR_CON.1.2: 5
    • FPR_PSE: 2
    • FPR_PSE.1: 8
    • FPR_PSE.1.1: 3
    • FPR_PSE.1.2: 2
    • FPR_PSE.1.3: 2
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP: 3
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_RPL: 3
    • FPT_RPL.1: 8
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM: 3
    • FPT_STM.1: 18
    • FPT_STM.1.1: 1
    • FPT_TST: 3
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 30
    • FTP_ITC.1: 9
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.DISPLAY_BANNER: 1
    • O.PROTECTED_COMMUNICATIONS: 1
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.SESSION_LOCK: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
  • OE:
    • OE.SM: 4
  • OSP:
    • OSP.SM: 5
pdf_data/st_keywords/eval_facility
  • TSystems:
    • T-Systems International: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 6
  • AES_competition:
    • AES:
      • AES: 7
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 2
  • ECC:
    • ECC:
      • ECC: 5
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 2
    • SHA2:
      • SHA-2: 5
      • SHA-256: 5
      • SHA-512: 3
      • SHA256: 2
  • SHA:
    • SHA2:
      • SHA-256: 12
      • SHA-384: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 2
  • MAC:
    • MAC: 9
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 2
  • SSH:
    • SSH: 73
    • SSHv2: 10
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 3
  • TLS:
    • TLS:
      • TLS: 62
      • TLS 1.2: 5
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 4
    • RNG: 6
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 6
    • P-384: 4
    • P-521: 4
  • NIST:
    • NIST P-256: 3
    • NIST P-384: 3
    • P-256: 3
    • P-384: 3
    • secp256r1: 3
    • secp384r1: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
    • physical tampering: 4
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03109: 1
    • BSI TR-03109-1: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS PUB 186-3: 3
    • FIPS PUB 197: 1
    • FIPS140: 1
    • FIPS197: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
  • RFC:
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4254: 1
    • RFC 4741: 1
    • RFC 6668: 1
    • RFC4251: 1
    • RFC4252: 1
    • RFC4253: 3
    • RFC4254: 1
    • RFC5656: 3
    • RFC6668: 2
  • FIPS:
    • FIPS 140-2: 3
    • FIPS 180-4: 8
    • FIPS 197: 12
  • RFC:
    • RFC 2104: 6
    • RFC 2616: 5
    • RFC 3394: 3
    • RFC 4493: 8
    • RFC 5084: 4
    • RFC 5114: 5
    • RFC 5246: 7
    • RFC 5289: 6
    • RFC 5639: 5
    • RFC 5905: 4
    • RFC5246: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
    • i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled: 1
    • including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
    • out of scope: 2
    • the HTTP traffic arrives (i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled. This service can only: 1
pdf_data/st_metadata
  • /Author: Denise Cater
  • /CreationDate: D:20151210100004Z
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20151217154306-05'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Junos OS 13.3R1.8, Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20
  • /Title: Security Target
  • pdf_file_size_bytes: 1346035
  • pdf_hyperlinks: http://www.juniper.net/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different