This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
CZ6 production line on the NEC site in Yamaguchi, Japan ANSSI-CC-2001/11 |
JUNOS 12.3X48-D30 FOR SRX XLR PLATFORMSComponents: Hardware Platforms: SRX1400, SRX3400 and SRX3600; SRX5400, SRX5400E, SRX5600, SRX5600E, SRX5800 and SRX5800E with SPC-2-10-20 None |
|
---|---|---|
name | CZ6 production line on the NEC site in Yamaguchi, Japan | JUNOS 12.3X48-D30 FOR SRX XLR PLATFORMSComponents: Hardware Platforms: SRX1400, SRX3400 and SRX3600; SRX5400, SRX5400E, SRX5600, SRX5600E, SRX5800 and SRX5800E with SPC-2-10-20 |
category | Other Devices and Systems | Network and Network-Related Devices and Systems |
scheme | FR | AU |
not_valid_after | 01.09.2019 | 21.12.2021 |
not_valid_before | 01.01.2001 | 21.12.2016 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2001_11.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T042%20_Junos%2012.3X48-%20NDPP-FW-IPS_%20Certification%20Report%20v1.0(1)%20-%20ST%20ref%20update%20only.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2001_11.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20(ISSX1056-2)%20Junos%2012.3%20X48%20NDPP%20FW%20IPS%20ST%20v1.2%20(1).pdf |
manufacturer | NEC Yamaguchi Ltd, NEC SCAC | Juniper Networks, Inc. |
manufacturer_web | https://www.nec.com/ | https://www.juniper.net/ |
security_level | AVA_VLA.2, EAL1+ | {} |
dgst | 49d7db5e734754ff | 81d7a77f26d76917 |
heuristics/cert_id | ANSSI-CC-2001/11 | |
heuristics/cpe_matches | {} | cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* |
heuristics/extracted_sars | ASE_ENV.1, ADV_RCR.1, ADV_FSP.1, AVA_VLA.2, ASE_INT.1, ASE_SRE.1, ADV_HLD.2, ASE_TSS.1, ASE_OBJ.1, AGD_USR.1, ATE_IND.1, ADV_LLD.1, ALC_DVS.2, AGD_ADM.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_IMP.1 | {} |
heuristics/extracted_versions | - | 12.3 |
heuristics/protection_profiles | {} | f21e576d983cc1d7, d7508f508083d040, ac9abe3d5c5a31f0 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_ips_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/report_filename | 2001_11.pdf | |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id | ||
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr | ||
pdf_data/report_keywords/cc_claims | ||
pdf_data/report_keywords/vendor | ||
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto | ||
pdf_data/report_keywords/pq_crypto | ||
pdf_data/report_keywords/hash_function | ||
pdf_data/report_keywords/crypto_scheme | ||
pdf_data/report_keywords/crypto_protocol | ||
pdf_data/report_keywords/randomness | ||
pdf_data/report_keywords/cipher_mode | ||
pdf_data/report_keywords/ecc_curve | ||
pdf_data/report_keywords/crypto_engine | ||
pdf_data/report_keywords/tls_cipher_suite | ||
pdf_data/report_keywords/crypto_library | ||
pdf_data/report_keywords/vulnerability | ||
pdf_data/report_keywords/side_channel_analysis | ||
pdf_data/report_keywords/technical_report_id | ||
pdf_data/report_keywords/device_model | ||
pdf_data/report_keywords/tee_name | ||
pdf_data/report_keywords/os_name | ||
pdf_data/report_keywords/cplc_data | ||
pdf_data/report_keywords/ic_data_group | ||
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version | ||
pdf_data/report_keywords/javacard_api_const | ||
pdf_data/report_keywords/javacard_packages | ||
pdf_data/report_keywords/certification_process | ||
pdf_data/report_metadata |
|
|
pdf_data/st_filename | cible2001_11.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor | ||
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto | ||
pdf_data/st_keywords/asymmetric_crypto | ||
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function | ||
pdf_data/st_keywords/crypto_scheme | ||
pdf_data/st_keywords/crypto_protocol | ||
pdf_data/st_keywords/randomness | ||
pdf_data/st_keywords/cipher_mode | ||
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library | ||
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis | ||
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id | ||
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/report/convert_ok | True | False |
state/report/download_ok | True | False |
state/report/extract_ok | True | False |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | True | False |
state/st/download_ok | True | False |
state/st/extract_ok | True | False |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |