This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
EMC RecoverPoint version 3.4 383-4-159 |
JUNOS 12.3X48-D30 FOR SRX XLR PLATFORMSComponents: Hardware Platforms: SRX1400, SRX3400 and SRX3600; SRX5400, SRX5400E, SRX5600, SRX5600E, SRX5800 and SRX5800E with SPC-2-10-20 None |
|
---|---|---|
name | EMC RecoverPoint version 3.4 | JUNOS 12.3X48-D30 FOR SRX XLR PLATFORMSComponents: Hardware Platforms: SRX1400, SRX3400 and SRX3600; SRX5400, SRX5400E, SRX5600, SRX5600E, SRX5800 and SRX5800E with SPC-2-10-20 |
category | Other Devices and Systems | Network and Network-Related Devices and Systems |
scheme | CA | AU |
not_valid_after | 15.05.2017 | 21.12.2021 |
not_valid_before | 10.06.2011 | 21.12.2016 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-159%20CR%20v1.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T042%20_Junos%2012.3X48-%20NDPP-FW-IPS_%20Certification%20Report%20v1.0(1)%20-%20ST%20ref%20update%20only.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-159%20ST%20v0.6.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20(ISSX1056-2)%20Junos%2012.3%20X48%20NDPP%20FW%20IPS%20ST%20v1.2%20(1).pdf |
manufacturer | EMC Corporation | Juniper Networks, Inc. |
manufacturer_web | https://www.emc.com/ | https://www.juniper.net/ |
security_level | EAL2+, ALC_FLR.2 | {} |
dgst | 6080112bd3e26278 | 81d7a77f26d76917 |
heuristics/cert_id | 383-4-159 | |
heuristics/cert_lab | CANADA | [] |
heuristics/cpe_matches | {} | cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*, cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 | {} |
heuristics/extracted_versions | 3.4 | 12.3 |
heuristics/protection_profiles | {} | f21e576d983cc1d7, d7508f508083d040, ac9abe3d5c5a31f0 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_ips_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/report_filename | 383-4-159 CR v1.0e.pdf | |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id | ||
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr | ||
pdf_data/report_keywords/cc_claims | ||
pdf_data/report_keywords/vendor | ||
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto | ||
pdf_data/report_keywords/asymmetric_crypto | ||
pdf_data/report_keywords/pq_crypto | ||
pdf_data/report_keywords/hash_function | ||
pdf_data/report_keywords/crypto_scheme | ||
pdf_data/report_keywords/crypto_protocol | ||
pdf_data/report_keywords/randomness | ||
pdf_data/report_keywords/cipher_mode | ||
pdf_data/report_keywords/ecc_curve | ||
pdf_data/report_keywords/crypto_engine | ||
pdf_data/report_keywords/tls_cipher_suite | ||
pdf_data/report_keywords/crypto_library | ||
pdf_data/report_keywords/vulnerability | ||
pdf_data/report_keywords/side_channel_analysis | ||
pdf_data/report_keywords/technical_report_id | ||
pdf_data/report_keywords/device_model | ||
pdf_data/report_keywords/tee_name | ||
pdf_data/report_keywords/os_name | ||
pdf_data/report_keywords/cplc_data | ||
pdf_data/report_keywords/ic_data_group | ||
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version | ||
pdf_data/report_keywords/javacard_api_const | ||
pdf_data/report_keywords/javacard_packages | ||
pdf_data/report_keywords/certification_process | ||
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 383-4-159 ST v0.6.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor | ||
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto | ||
pdf_data/st_keywords/asymmetric_crypto | ||
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function | ||
pdf_data/st_keywords/crypto_scheme | ||
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness | ||
pdf_data/st_keywords/cipher_mode | ||
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis | ||
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id | ||
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/report/convert_ok | True | False |
state/report/download_ok | True | False |
state/report/extract_ok | True | False |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | True | False |
state/st/download_ok | True | False |
state/st/extract_ok | True | False |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |