Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series
None
Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running JUNOS 11.2S4
CCEVS-VR-VID-10402-2013
name RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running JUNOS 11.2S4
category Boundary Protection Devices and Systems Detection Devices and Systems
scheme TR US
not_valid_after 27.03.2017 22.04.2015
not_valid_before 15.03.2013 22.04.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20CERTIFICATION%20REPORT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10402-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20ST-%20v0.9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10402-st.pdf
manufacturer RIOREY Incorporated Juniper Networks, Inc.
manufacturer_web https://www.riorey.com/ https://www.juniper.net/
security_level EAL4+, ALC_FLR.1 EAL4+, ALC_FLR.2
dgst 53265b9d283d6074 32c0f398615e577f
heuristics/cert_id CCEVS-VR-VID-10402-2013
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:h:juniper:ln1000:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ALC_CMS.4, AVA_VAN.3, ATE_FUN.1, ALC_DEL.1, ATE_IND.2, ADV_FSP.4, ALC_LCD.1, AGD_OPE.1, ADV_ARC.1, ADV_TDS.3, ATE_DPT.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1
heuristics/extracted_versions - 11.2
heuristics/scheme_data
  • category: Firewall, Router, Wireless Monitoring
  • certification_date: 22.04.2013
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 22.04.2015
  • id: CCEVS-VR-VID10402
  • product: Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running JUNOS 11.2S4
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10402
  • vendor: Juniper Networks, Inc.
pdf_data/report_filename RioRey CERTIFICATION REPORT.pdf st_vid10402-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10402-2013
    • cert_item: Juniper Networks LN1000-V Mobile Secure Router and SRX650 Services Gateway, Running Junos 11.2 R2S4
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10402-2013: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4+: 5
    • EAL4: 1
    • EAL4+: 1
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 5
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_sfr
  • FRU:
    • FRU_DDOS_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.NO_TOE_BYPASS: 1
    • A.PHYSICAL: 1
  • T:
    • T.ADDRESS_MASQUERADE: 1
    • T.ADMIN_ROGUE: 1
    • T.AUDIT_COMPROMISE: 1
    • T.CRYPTO_COMPROMISE: 1
    • T.EAVESDROP: 1
    • T.MALICIOUS_TSF_COMPROMISE: 1
    • T.MASQUERADE: 1
    • T.REPLAY: 1
    • T.RESIDUAL_DATA: 1
    • T.RESOURCE_EXHAUSTION: 1
    • T.SPOOFING: 1
    • T.UNATTENDED_SESSION: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_PEER: 1
    • T.UNIDENTIFIED_ACTIONS: 1
    • T.UNIDENTIFIED_INTRUSIONS: 1
    • T.UNKNOWN_STATE: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • SSH:
    • SSH: 6
  • TLS:
    • SSL:
      • SSL: 1
  • VPN:
    • VPN: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • FIPS:
    • FIPS 140-2: 2
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_metadata
  • /Author: Tse
  • /CreationDate: D:20130318153433-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130318153433-04'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 1
  • pdf_file_size_bytes: 511380
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Author: SAIC
  • /CreationDate: D:20130502131855
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130502131855
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Validation Report
  • /Title: Juniper Networks
  • pdf_file_size_bytes: 338979
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename RioRey ST- v0.9.pdf st_vid10402-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL4: 2
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC.1: 13
    • ADV_FSP.1: 2
    • ADV_FSP.2: 2
    • ADV_FSP.4: 13
    • ADV_IMP.1: 10
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 18
  • AGD:
    • AGD_OPE.1: 13
    • AGD_PRE.1: 8
  • ALC:
    • ALC_CMC.4: 16
    • ALC_CMS.1: 1
    • ALC_CMS.4: 7
    • ALC_DEL.1: 6
    • ALC_DVS.1: 7
    • ALC_FLR.2: 16
    • ALC_LCD.1: 8
    • ALC_TAT.1: 9
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 6
    • ATE_DPT.1: 7
    • ATE_FUN.1: 12
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 13
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 12
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FAU:
    • FAU_ARP: 5
    • FAU_ARP.1: 13
    • FAU_ARP.1.1: 1
    • FAU_GEN: 14
    • FAU_GEN.1: 4
    • FAU_GEN.2: 1
    • FAU_SAA: 10
    • FAU_SAA.1: 2
    • FAU_SAR.1: 16
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 15
    • FAU_SAR.2.1: 2
    • FAU_SAR.3: 16
    • FAU_SAR.3.1: 2
    • FAU_SEL: 15
    • FAU_SEL.1: 2
    • FAU_STG: 30
    • FAU_STG.1: 2
    • FAU_STG.2: 1
    • FAU_STG.3: 6
    • FAU_STG.3.1: 1
    • FAU_UAU.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 6
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 28
    • FCS_COP.1.1: 4
  • FDP:
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 12
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 3
    • FDP_RIP.2: 6
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 6
    • FIA_AFL.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 15
    • FIA_ATD.1.1: 2
    • FIA_UAU: 5
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 1
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 76
    • FMT_MOF.1.1: 11
    • FMT_MSA: 14
    • FMT_MSA.1: 1
    • FMT_MSA.2: 5
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 29
    • FMT_MTD.1.1: 6
    • FMT_MTD.2: 21
    • FMT_MTD.2.1: 3
    • FMT_MTD.2.2: 3
    • FMT_REV: 5
    • FMT_REV.1: 9
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 5
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_RCV.2: 6
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 6
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TRP.1: 2
    • FPT_TST: 1
    • FPT_TST.1: 16
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
    • FPT_TST_EXP.1: 1
    • FPT_TST_EXP.1.1: 1
    • FPT_TST_EXP.1.2: 1
  • FRU:
    • FRU_RSA.1: 10
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_SSL: 11
    • FTA_SSL.1: 2
    • FTA_SSL.2: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL.3: 11
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE.1: 5
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 16
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 3
    • FTP_TRP.1: 14
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 3
    • FTP_TRP.1.3: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 6
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
  • A:
    • A.NO_GENERAL_PURPOSE: 2
    • A.NO_TOE: 1
    • A.NO_TOE_BYPASS: 1
    • A.PHYSICAL: 2
  • O:
    • O.ADMIN_ROLE: 6
    • O.AUDIT_GENERATION: 5
    • O.AUDIT_PROTECTION: 3
    • O.AUDIT_REVIEW: 4
    • O.CORRECT_: 2
    • O.CORRECT_TSF_OPERATION: 2
    • O.CRYPTOGRAPHIC_FUNCTIONS: 4
    • O.CRYPTOGRAPHY_: 1
    • O.CRYPTOGRAPHY_VALIDATED: 3
    • O.DISPLAY_BANNER: 6
    • O.IDS_AUDIT_GENERATION: 3
    • O.IDS_AUDIT_REVIEW: 4
    • O.MAINT_MODE: 4
    • O.MANAGE: 4
    • O.MEDIATE_INFORMATION_FLOW: 6
    • O.PEER_AUTHENTICATION: 5
    • O.PROTECT_IN_TRANSIT: 4
    • O.PROTOCOL: 1
    • O.PROTOCOLS: 5
    • O.REPLAY_DETECTION: 5
    • O.RESIDUAL_INFORMATION: 11
    • O.RESOURCE_SHARING: 4
    • O.ROBUST_TOE_ACCESS: 9
    • O.TIME_STAMPS: 4
    • O.TRUSTED_PATH: 8
  • OE:
    • OE.CRYPTANALYTIC: 2
    • OE.MANAGEMENT: 1
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 2
  • T:
    • T.ADDRESS_MASQUERADE: 2
    • T.ADMIN_ERROR: 1
    • T.ADMIN_ROGUE: 3
    • T.AUDIT_COMPROMISE: 2
    • T.CRYPTO_COMPROMISE: 2
    • T.EAVESDROP: 2
    • T.MALICIOUS_TSF_COMPROMISE: 2
    • T.MASQUERADE: 2
    • T.REPLAY: 2
    • T.RESIDUAL_DATA: 2
    • T.RESOURCE_EXHAUSTION: 2
    • T.SPOOFING: 2
    • T.UNATTENDED_SESSION: 2
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_PEER: 2
    • T.UNIDENTIFIED_ACTIONS: 2
    • T.UNIDENTIFIED_INTRUSIONS: 2
    • T.UNKNOWN_STATE: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDEA: 3
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 13
    • DSA:
      • DSA: 7
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KEX:
    • Key Exchange: 11
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • IKE:
    • IKE: 28
    • IKEv1: 1
  • IPsec:
    • IPsec: 20
  • SSH:
    • SSH: 27
    • SSHv2: 6
  • TLS:
    • SSL:
      • SSL: 2
  • VPN:
    • VPN: 9
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 2
  • RNG:
    • RNG: 11
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 1
  • CCM:
    • CCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-256: 1
    • P-256: 3
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
  • FIPS:
    • FIPS 140-2: 15
    • FIPS 186-2: 1
    • FIPS PUB 140-2: 4
    • FIPS PUB 171: 1
    • FIPS PUB 180-2: 1
    • FIPS PUB 186-3: 1
  • NIST:
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 4
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 1
    • RFC 2409: 10
    • RFC 2451: 1
    • RFC 4251: 1
    • RFC 4252: 1
    • RFC 4253: 1
    • RFC 4271: 3
    • RFC 4301: 1
    • RFC 4302: 1
    • RFC 4303: 1
    • RFC 4305: 1
    • RFC2409: 1
  • X509:
    • X.509: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
  • OutOfScope:
    • SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Authentication services can be handled either internally (user selected passwords: 1
    • including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Authentication services can be handled either internally (user selected passwords) or through a: 1
    • out of scope: 1
pdf_data/st_metadata
  • /CreationDate: D:20130328162641+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130328162641+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1068348
  • pdf_hyperlinks: https://tools.ietf.org/html/rfc6151
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
  • /Author: Seth Ross, Jane Medefesser
  • /CreationDate: D:20130502131822
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130502131822
  • /Producer: Microsoft® Office Word 2007
  • /Subject: LN1000-V Mobile Secure Router and SRX650 Services Gateway
  • /Title: Security Target
  • pdf_file_size_bytes: 2108087
  • pdf_hyperlinks: http://www.juniper.net/, http://tools.ietf.org/html/rfc2409
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 156
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different