name |
Symfoware Server Enterprise extended Edtion 4.0 |
JUNOS 12.3X48-D30 FOR SRX XLR PLATFORMSComponents: Hardware Platforms: SRX1400, SRX3400 and SRX3600; SRX5400, SRX5400E, SRX5600, SRX5600E, SRX5800 and SRX5800E with SPC-2-10-20 |
category |
Databases |
Network and Network-Related Devices and Systems |
scheme |
JP |
AU |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
21.12.2021 |
not_valid_before |
26.11.2003 |
21.12.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/files/epfiles/EFS-T042%20_Junos%2012.3X48-%20NDPP-FW-IPS_%20%20Certification%20Report%20v1.0(1)%20-%20ST%20ref%20update%20only.pdf |
st_link |
|
https://www.commoncriteriaportal.org/files/epfiles/Juniper%20(ISSX1056-2)%20Junos%2012.3%20X48%20NDPP%20FW%20%20IPS%20ST%20v1.2%20(1).pdf |
manufacturer |
Fujitsu Limited |
Juniper Networks, Inc. |
manufacturer_web |
https://www.fujitsu.com/ |
|
security_level |
EAL4 |
{} |
dgst |
505e2adba5d4a6cf |
5f25b223a6fe6321 |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
Certificate Number: 2016/104 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
heuristics/extracted_versions |
4.0 |
12.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0133
- certification_date: 01.11.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION The TOE enables users to manage operations to execute jobs based on predefined daily schedule on distributed servers on enterprise internal networks. The TOE also enables users to manage those operations in a secure manner although systems are becoming diverse and getting complex. The TOE defines “Job execution based on predefined daily schedule” process and its related resources as protected resources. The TOE provides following security functions to prohibit unauthorized access to the protected resources. - "Extended user authentication function" to identify and authenticate users. - "Access control function" to restrict user operations to authorized users - "Audit log output function" to verify user operations - "Password protection function" to protect passwords from being sniffed sent over enterprise internal networks
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Systemwalker Operation Manager Enterprise Edition
- product_type: IT Product (Operation and maintenance supporting software)
- toe_version: V13.2.0 (Linux for Itanium)
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0133_it7150.html
- toe_japan_name: Systemwalker Operation Manager Enterprise Edition V13.2.0 (Linux for Itanium)
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0003.pdf |
EFS-T042 _Junos 12.3X48- NDPP-FW-IPS_ Certification Report v1.0(1) - ST ref update only.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- AU:
- Certification Report 2016/104: 1
- FR:
- Certification Report 2016/104: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: ACA
- /Company: Department of Defence
- /CreationDate: D:20170221144208+11'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /ModDate: D:20170221144226+11'00'
- /Objective-Classification: [Inherited - Unclassified]
- /Objective-CreationStamp: D:20161221
- /Objective-Id: R28394488
- /Objective-IsApproved: 0
- /Objective-IsPublished: 0
- /Objective-ModificationStamp: D:20161221
- /Objective-Owner: Caulfield, Terence (MR)(ASD)
- /Objective-Parent: Certification
- /Objective-Path: Objective Global Folder - PROD:Defence Business Units:Intelligence and Security Group:Australian Signals Directorate:ASD : Australian Signals Directorate:CISD:ASCS:CS-PD1:Evaluations:ACA:Australasn Certn Auth:Certification:Operations:AISEP Certification R
- /Objective-State: Being Edited
- /Objective-Title: EFS-T042 _Junos 12.3X48- NDPP-FW-IPS_ Certification Report v0.2
- /Objective-Version: 0.4
- /Objective-VersionNumber: 4
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /SourceModified: D:20170221034024
- /Title:
- pdf_file_size_bytes: 90266
- pdf_hyperlinks: https://www.juniper.net/
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
|
Juniper (ISSX1056-2) Junos 12.3 X48 NDPP FW IPS ST v1.2 (1).pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.1.1: 1
- FCS_CKM_EXT.4: 5
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 22
- FCS_COP.1.1: 5
- FCS_RBG_EXT.1: 6
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT: 1
- FCS_SSH_EXT.1: 4
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 2
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 2
- FCS_SSH_EXT.1.6: 2
- FCS_SSH_EXT.1.7: 2
- FDP:
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT.1: 5
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.5: 1
- FIA_UIA_EXT.1: 7
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 2
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 6
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 1
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.ADDRESS_FILTERING: 2
- O.DISPLAY_BANNER: 1
- O.IPSANALYZE: 2
- O.IPSREACT: 2
- O.IPSSENSE: 1
- O.PORT_FILTERING: 2
- O.PROTECTED_COMMUNICATIONS: 2
- O.RELATED_CONNECTION_FILTERING: 2
- O.RESIDUAL_INFORMATION_CLEARING: 2
- O.SESSION_LOCK: 2
- O.STATEFUL_INSPECTION: 2
- O.SYSTEM_MONITORING: 4
- O.TOE_ADMINISTRATION: 4
- O.TSF_SELF_TEST: 2
- O.VERIFIABLE_UPDATES: 2
- OE:
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.NETWORK_DISCLOSURE: 1
- T.NETWORK_DOS: 1
- T.NETWORK_MISUSE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 2
- SHA-384: 1
- SHA-512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 1
- Key exchange: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 24
- IKEv1: 11
- IKEv2: 8
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS PUB 186-2: 1
- FIPS PUB 186-3: 6
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 3
- NIST SP 800-56B: 1
- RFC:
- RFC 2409: 2
- RFC 2460: 3
- RFC 2463: 1
- RFC 3513: 2
- RFC 3602: 2
- RFC 4109: 2
- RFC 4253: 1
- RFC 4301: 2
- RFC 4303: 1
- RFC 4306: 2
- RFC 4443: 2
- RFC 4868: 4
- RFC 4945: 1
- RFC 5280: 1
- RFC 5735: 2
- RFC 6379: 1
- RFC 768: 3
- RFC 791: 3
- RFC 792: 3
- RFC 793: 3
- RFC 959: 2
- RFC4253: 2
- RFC5656: 1
- RFC6668: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- FTP), and Secure Socket Layer (SSL) are out of scope. Security Target - Junos 12.3 X48-D30 for SRX XLR Platforms (NDPP, TFFWEP, IPSEP: 1
- out of scope: 1
- to exchange information. Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope. Security Target - Junos 12.3 X48-D30 for SRX XLR Platforms (NDPP, TFFWEP, IPSEP) Version 1.2 Page: 1
|
pdf_data/st_metadata |
|
- /Author: BAE Systems Applied Intelligence
- /Client: Juniper Networks, Inc.
- /Company: BAE Systems Applied Intelligence
- /CreationDate: D:20170220165036+11'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /DocVersion: 1.2
- /EApproved: Van Nguyen (Juniper)
- /EAuthor: BAE Systems Applied Intelligence
- /ECompany_Identity: Juniper Networks, Inc
- /EDocument_Issue_Date: 09 February 2017
- /EDocument_Reference: Juniper_ST_
- /EDocument_Status: Released
- /EDocument_Title: Junos 12.3 X48-D30 for SRX XLR Platforms (NDPP, TFFWEP, IPSEP)
- /EDocument_Version: 1.2
- /EProject_Name: Security Target
- /EReport_Type : CC - Security Target
- /ModDate: D:20170220165107+11'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /SourceModified: D:20170220053644
- /Subject: Junos 12.3 X48-D30 for SRX XLR Platforms
- /TOE: Junos 12.3 X48-D30 for SRX XLR Platforms
- /Title: Security Target
- pdf_file_size_bytes: 575665
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |