name |
Juniper Networks M/T/J series Routers |
Symantec™ Network Access Control Version 11.0 |
category |
Network and Network-Related Devices and Systems |
Access Control Devices and Systems |
scheme |
UK |
CA |
status |
archived |
archived |
not_valid_after |
05.03.2013 |
28.09.2015 |
not_valid_before |
01.04.2007 |
15.07.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP237.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/snacv110-cert-e.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS%208%201R1%20ST%20v1%200.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/snacv110-sec-e.pdf |
manufacturer |
Juniper Networks, Inc. |
Symantec Corporation |
manufacturer_web |
https://www.juniper.net/ |
https://www.symantec.com |
security_level |
EAL3+, ALC_FLR.3 |
EAL2+, ALC_FLR.2, AVA_MSU.1 |
dgst |
449de5c1b966be87 |
7a4d21e544032cb2 |
heuristics/cert_id |
CRP237 |
383-4-92 |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
cpe:2.3:a:symantec:network_access_control:11.0.6300:*:*:*:*:*:*:*, cpe:2.3:a:symantec:network_access_control:11.0.6000:*:*:*:*:*:*:*, cpe:2.3:a:symantec:network_access_control:11.0.7100:*:*:*:*:*:*:*, cpe:2.3:a:symantec:network_access_control:11.0.6200:*:*:*:*:*:*:*, cpe:2.3:a:symantec:network_access_control:11.0.7000:*:*:*:*:*:*:*, cpe:2.3:a:symantec:network_access_control:11.0.6100:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2012-0289 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2013-4689, CVE-2024-39555, CVE-2023-28975, CVE-2022-22242, CVE-2023-36840, CVE-2022-22244, CVE-2014-3818, CVE-2024-30380, CVE-2019-0036, CVE-2024-39549, CVE-2022-22208, CVE-2021-31372, CVE-2022-22214, CVE-2024-39511, CVE-2023-28962, CVE-2024-39514, CVE-2023-36841, CVE-2024-39558, CVE-2013-6618, CVE-2023-44182, CVE-2023-28979, CVE-2022-22241, CVE-2014-0613, CVE-2023-44184, CVE-2023-44175, CVE-2022-22243, CVE-2013-4686, CVE-2014-0615, CVE-2023-44186, CVE-2023-22406, CVE-2023-36839, CVE-2022-22224, CVE-2022-22238, CVE-2014-2712, CVE-2023-28964, CVE-2023-44177, CVE-2024-39556, CVE-2022-22181, CVE-2022-22162, CVE-2022-22163, CVE-2023-28963, CVE-2004-0230, CVE-2023-36842, CVE-2023-44194, CVE-2004-0468, CVE-2022-22220, CVE-2023-44201, CVE-2023-44197, CVE-2014-0616, CVE-2013-6014, CVE-2024-21594, CVE-2024-39517, CVE-2024-21591, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2013-6170, CVE-2021-31362, CVE-2022-22197, CVE-2022-22245, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2022-22246, CVE-2023-22395, CVE-2023-36843, CVE-2023-44185, CVE-2014-2714, CVE-2023-22391, CVE-2023-44176 |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_MSU.1, ATE_IND.2, AGD_ADM.1, AVA_VLA.1, ALC_FLR.3, ATE_DPT.1, AVA_SOF.1 |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, AVA_MSU.1, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2 |
heuristics/extracted_versions |
- |
11.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
CRP248 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
CRP248, CRP258 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP237.pdf |
snacv110-cert-e.pdf |
pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-92
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 1
- EAL3 augmented: 1
|
- EAL:
- EAL 2: 5
- EAL 2 augmented: 1
- EAL 2+: 3
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CRYPTO: 1
- A.EAUTH: 1
- A.LOCATE: 1
- A.NOEVIL: 1
- A.TIME: 1
|
|
pdf_data/report_keywords/vendor |
|
- Microsoft:
- Microsoft: 9
- Microsoft Corporation: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2005-08-001: 1
- CCIMB-2005-08-002: 1
- CCIMB-2005-08-003: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: leithe
- /CreationDate: D:20070503115940Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20070514111611+01'00'
- /Producer: GPL Ghostscript 8.15
- /Title: Microsoft Word - LFS T532 CR 10.doc
- pdf_file_size_bytes: 654197
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_AMCPP_Date: [AM_AMCPP_Date]
- /AM_AMCPP_Doc#: [AM_AMCPP_Doc#]
- /AM_AMCPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [AM_IAR_Date]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [AM_ST Date]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author:
- /CC Version: 2.3
- /CC date: August 2005
- /CEM Version: 2.3
- /CEM date: August 2005
- /CR_Date: 25 June 2008
- /CR_Version: 1.0
- /Client City: Cupertino
- /Client Country: USA
- /Client Full Name: Symantec Corporation
- /Client Postal Code: 95014
- /Client Postal ZIP Code:
- /Client Short Name: Fortress
- /Client State: California
- /Client State/Prov:
- /Client Street: 20330 Stevens Creek Blvd.
- /Client Street Address:
- /CreationDate: D:20080730133619-04'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer: Symantec Corporation
- /Developer Long Name: Symantec Corporation
- /Developer Short Name: Symantec
- /Developer_caps: SYMANTEC CORPORATION
- /Doc#: 1569-000-D002
- /EAL: EAL 2+
- /EAL Base: 2
- /EAL Level: 2+
- /EAL Level Base: 2
- /EAL Long: EAL 2 Augmented
- /EAL Short: EAL 2+
- /EAL_base: EAL 2
- /ETPRoc_Date: day month yyyy
- /ETPlan_Doc#: 1573-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: [0.0]
- /ETPlan_date: day month yyyy
- /ETProcRes_Date: day month yyyy
- /ETProcRes_Doc#: 1573-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: [0.0]
- /ETProc_Doc#: 1573-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: [0.0]
- /ETReport_Date: 25 June 2008
- /ETReport_Doc#: 1573-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_Version: 1.1
- /EWP_Date: 17 October 2007
- /EWP_Doc#: 1573-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.2
- /Eval number: 383-4-92
- /Eval_End_Date: dd month yyyy
- /Eval_Start_Date: dd month yyyy
- /ModDate: D:20080730134213-04'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ProjectNumber: 1573
- /ST_Date: June 19, 2008
- /ST_Title: Security Target: Symantec™ Network Access Control Version 11.0
- /ST_Version: 1.6
- /SV City: Mountainview
- /SVR_Date: [day month yyyy]
- /SVR_Doc#: 1573-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: [0.0]
- /SV_City: [site vist city/cities]
- /Security Classification: EWA-Canada & Symantec Proprietary
- /SourceModified: D:20080729191505
- /Sponsor: Symantec Corporation
- /Sponsor - Noun:
- /Sponsor City: Cupertino
- /Sponsor Country: USA
- /Sponsor Postal Code: 95014
- /Sponsor State: California
- /Sponsor Street: 20330 Stevens Creek Blvd.
- /Sponsor_caps: SYMANTEC CORPORATION
- /TOE: Symantec™ Network Access Control Version 11.0
- /TOE Line1: [TOE Line1 - enter later for PCR or web page]
- /TOE Line2: [TOE Line2 - enter later for PCR or web page]
- /TOE Line3: [TOE Line3 - enter later for PCR or web page]
- /TOE Line4: [TOE Line4 - enter later for PCR or web page]
- /TOE Line5: [TOE Line5 - enter later for PCR or web page]
- /TOE Short: Symantec™ Network Access Control
- /TOE Short with version: SNAC Version 11.0
- /TOE Short-NoTM: [TOE Short, no version, no trademarks]
- /TOE Version: 11.0
- /TOE with version: Symantec™ Network Access Control Version 11.0
- /TOE-NoTM: [TOE Name, no version, no trademarks]
- /TOE_caps: SYMANTEC ENDPOINT PROTECTION
- /Title: Microsoft Word - snacv110-cert-e
- /Version: 0.4
- /Version date: 12 April 2007
- /_AdHocReviewCycleID: -187140885
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: White, Debra E.
- /_EmailSubject: Partial Post to full Post
- pdf_file_size_bytes: 126851
- pdf_hyperlinks: http://www.commoncriteriaportal.es /, http://www.cse-cst.gc.ca/services/common-criteria/trusted-products-e.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
JUNOS 8 1R1 ST v1 0.pdf |
snacv110-sec-e.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 1
- EAL 3 augmented: 1
- EAL3: 7
- EAL3 augmented: 5
|
- EAL:
- EAL2: 2
- EAL2 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 2
- ALC:
- ALC_DVS.1: 2
- ALC_FLR.3: 10
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 4
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 7
- FAU_ARP.1.1: 1
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAA.1: 7
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF.1: 11
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ROL.1: 7
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 2
- FIA_UID.1: 1
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 16
- FMT_MOF.1: 2
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 41
- FMT_MTD.1: 6
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FPT:
- FPT_RVM.1: 7
- FPT_RVM.1.1: 1
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_TSE.1: 7
- FTA_TSE.1.1: 1
- FTP:
|
- FAU:
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 10
- FAU_GEN.2.1: 1
- FAU_SAR.1: 21
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.2: 10
- FAU_SAR.2.1: 1
- FAU_SAR.3: 12
- FAU_SAR.3.1: 1
- FAU_STG: 1
- FAU_STG.1: 18
- FAU_STG.1.1: 2
- FAU_STG.1.2: 2
- FAU_STG.4: 11
- FAU_STG.4.1: 1
- FDP:
- FDP_IFC.1: 12
- FDP_IFC.1.1: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PLA_EXP.1: 5
- FIA_PLA_EXP.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UID.1: 2
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 13
- FMT_MOF.1.1: 1
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 28
- FMT_MTD.1.1: 5
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FPT:
- FPT_ITT.1: 5
- FPT_ITT.1.1: 1
- FPT_RIP.1: 1
- FPT_RVM.1: 5
- FPT_RVM.1.1: 1
- FPT_SEP.1: 5
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL.1: 6
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CRYPTO: 4
- A.EAUTH: 2
- A.LOCATE: 4
- A.NOEVIL: 3
- A.TIME: 4
- O:
- O.ACCESS: 16
- O.AMANAGE: 18
- O.AUDIT: 17
- O.EADMIN: 9
- O.EAL: 6
- O.FLOW: 12
- O.MANAGE: 1
- O.PROTECT: 19
- O.ROLBAK: 4
- OE:
- OE.ADMIN: 3
- OE.CRYPTO: 4
- OE.EAUTH: 4
- OE.PHYSICAL: 3
- OE.TIME: 4
- T:
- T.CONFLOSS: 5
- T.MANDAT: 4
- T.NOAUDIT: 2
- T.OPS: 7
- T.PRIVIL: 7
- T.ROUTE: 10
- T.THREAT: 4
|
- A:
- A.AUDIT_BACKUP: 1
- A.NOEVIL: 1
- A.NO_EVIL: 2
- A.PHYSICAL: 1
- A.SECURE_COMMS: 4
- O:
- O.ADMIN_ROLE: 5
- O.AUDIT_: 1
- O.AUDIT_GENERATION: 2
- O.AUDIT_PROTECTI: 1
- O.AUDIT_PROTECTION: 4
- O.AUDIT_REVIEW: 3
- O.CORRECT_TSF_OPERATIO: 1
- O.MANAGE: 5
- O.UNAUTH_ENDPOI: 1
- O.UNAUTH_ENDPOINT: 1
- OE:
- OE.AUDIT_ALARM: 4
- OE.AUDIT_BACKUP: 3
- OE.AUDIT_STORAGE: 4
- OE.DISPLAY_BANNE: 1
- OE.DISPLAY_BANNER: 2
- OE.DOMAIN_: 2
- OE.DOMAIN_SEPARATION: 3
- OE.NO_BYPASS: 5
- OE.NO_EVIL: 3
- OE.PHYSICAL: 3
- OE.RESIDUAL_: 2
- OE.RESIDUAL_INFORMATION: 3
- OE.SECURE_COMMS: 4
- OE.TIME_STAMPS: 3
- OE.TOE_ACCESS: 4
- T:
- T.AUDIT_: 1
- T.AUDIT_COMPROMISE: 1
- T.TSF_COMPROMIS: 1
- T.TSF_COMPROMISE: 3
- T.UNAUTH_ENDPOI: 1
- T._AUDIT_COMPROMISE: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- accidental or deliberate corruption via use of digitally signed binaries. 2.4.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: • All: 1
- out of scope: 2
- prior to any exchange. This covers all services used to exchange information, including telnet (out of scope), SSH, SSL, and FTP 1 . Authentication services can be handled either internally (user selected: 1
|
|
pdf_data/st_metadata |
- /Author: CESG
- /CreationDate: D:20070420105539Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120106151752Z
- /Producer: GPL Ghostscript 8.15
- /Subject: Security Target for Juniper Networks M/T/J Series Families of Service Routers running JUNOS 8.1R1
- /Title: JUNOS 8.1R1 ST v1_0.doc
- pdf_file_size_bytes: 231235
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 41
|
- /Author: Apex Assurance Group
- /CreationDate: D:20080619192513Z
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20080716160312-04'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Symantec™ Network Access Control Version 11.0
- /Title: Security Target for Common Criteria Evaluation
- pdf_file_size_bytes: 853391
- pdf_hyperlinks: http://www.symantec.com/, http://www.apexassurance.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |