name |
PR/SM for IBM z13 EC GA1 Driver Level D22H |
JUNIPER NETWORKS, INC JUNOS 15.1X49-D60 |
category |
Operating Systems |
Network and Network-Related Devices and Systems |
scheme |
DE |
AU |
status |
archived |
archived |
not_valid_after |
15.10.2020 |
07.02.2022 |
not_valid_before |
15.10.2015 |
07.02.2017 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0953a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T043_Junos%2015.1X49%20for%20SRX%20platforms%20-%20NDPP-FW-VPN-IPS_%20Certification%20Report%20v1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0953b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper-ISSX1056-2-Junos15.1X49-NDPP-FW-IPS-ST-SRX-v1.0%20(1).pdf |
manufacturer |
IBM Corporation |
Juniper Networks, Inc. |
manufacturer_web |
https://www.ibm.com |
https://www.juniper.net/ |
security_level |
EAL5+, AVA_VAN.5, ALC_TAT.3, ATE_FUN.2, ALC_FLR.3 |
{} |
dgst |
7bc03fce81366b24 |
5fef5dbf556048cf |
heuristics/cert_id |
BSI-DSZ-CC-0953-2015 |
Certificate Number: 2017/105 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:o:juniper:junos:15.1x49-d60:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:15.1x49:-:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2018-0019, CVE-2023-36840, CVE-2019-0036, CVE-2020-1639, CVE-2014-6450, CVE-2023-36841, CVE-2017-2347, CVE-2018-0062, CVE-2023-36839, CVE-2019-0053, CVE-2022-22238, CVE-2022-22181, CVE-2023-28963, CVE-2018-0003, CVE-2020-1641, CVE-2018-0031, CVE-2023-44197, CVE-2023-44201, CVE-2024-21594, CVE-2017-2313, CVE-2019-0073, CVE-2017-2314, CVE-2017-10618, CVE-2020-1602, CVE-2019-0047, CVE-2017-10613, CVE-2019-0061, CVE-2022-22244, CVE-2024-39549, CVE-2020-1656, CVE-2023-0026, CVE-2023-28962, CVE-2024-39514, CVE-2020-1630, CVE-2020-1657, CVE-2023-28979, CVE-2022-22241, CVE-2020-1605, CVE-2022-22243, CVE-2023-44186, CVE-2018-0052, CVE-2023-36842, CVE-2004-0468, CVE-2023-44194, CVE-2017-2348, CVE-2018-0021, CVE-2024-21591, CVE-2025-21590, CVE-2015-7752, CVE-2018-0022, CVE-2020-10188, CVE-2017-2303, CVE-2019-0013, CVE-2023-44185, CVE-2020-1684, CVE-2024-39528, CVE-2022-22215, CVE-2021-31355, CVE-2023-28975, CVE-2022-22242, CVE-2015-5362, CVE-2021-31372, CVE-2017-2312, CVE-2024-39558, CVE-2023-44182, CVE-2021-0215, CVE-2023-44184, CVE-2022-22224, CVE-2024-39556, CVE-2020-1600, CVE-2018-0004, CVE-2018-0051, CVE-2022-22220, CVE-2018-0007, CVE-2017-2301, CVE-2023-4481, CVE-2018-0055, CVE-2022-22245, CVE-2017-2344, CVE-2022-22197, CVE-2023-44178, CVE-2015-7751, CVE-2024-30397, CVE-2023-22395, CVE-2022-22246, CVE-2020-1643, CVE-2019-0039, CVE-2015-5360, CVE-2019-0012, CVE-2023-44176, CVE-2023-22407, CVE-2024-39555, CVE-2020-1631, CVE-2018-0017, CVE-2024-30380, CVE-2017-10621, CVE-2022-22208, CVE-2017-2345, CVE-2019-0035, CVE-2017-10602, CVE-2024-39511, CVE-2016-4922, CVE-2023-44175, CVE-2018-15505, CVE-2023-22406, CVE-2023-28964, CVE-2023-44177, CVE-2004-0230, CVE-2018-0029, CVE-2018-0060, CVE-2018-0061, CVE-2024-39517, CVE-2022-22156, CVE-2021-31362, CVE-2017-2302, CVE-2020-1637, CVE-2020-1609, CVE-2022-22173, CVE-2019-0037, CVE-2023-36843, CVE-2023-22391, CVE-2016-1264 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_FLR.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.4, ASE_REQ.2, ALC_DVS.1, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
heuristics/extracted_versions |
- |
15.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1005-2016 |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0900-2014 |
{} |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1101-2019, BSI-DSZ-CC-1109-2019, BSI-DSZ-CC-1186-2023, BSI-DSZ-CC-1222-2024, BSI-DSZ-CC-1160-2021, BSI-DSZ-CC-1133-2020, BSI-DSZ-CC-1048-2018, BSI-DSZ-CC-1005-2016 |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0715-2011, BSI-DSZ-CC-0793-2012, BSI-DSZ-CC-0846-2013, BSI-DSZ-CC-0900-2014 |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
bb67fb1b4f10e7a5, f21e576d983cc1d7, d7508f508083d040, ac9abe3d5c5a31f0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_ips_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0953a_pdf.pdf |
EFS-T043_Junos 15.1X49 for SRX platforms - NDPP-FW-VPN-IPS_ Certification Report v1.0.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_FLR.3, ALC_TAT.3, ATE_FUN.2, AVA_VAN.5 SOGIS Recognition Agreement for components up to EAL 4
- cc_version: Product specific Security Target Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-0953-2015
- cert_item: PR/SM for IBM z13 EC GA1 Driver Level D22H
- cert_lab: BSI
- developer: IBM Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0900-2014: 3
- BSI-DSZ-CC-0953-2015: 19
|
- AU:
- Certification Report 2017/105: 1
- FR:
- Certification Report 2017/105: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 12
- EAL 5: 13
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 3
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 3
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 7
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 3
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 7
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 7
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 32: 1
- AIS 34: 2
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Report, Version 2, 2015-09-24, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] z13 Hardware Management Console Operations Guide Version 2.13.0, Version 2.13.0, March 2015: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20151116094942+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0953, PR/SM, Firmware IBM z13 EC GA1, Driver Level D22H"
- /ModDate: D:20151118115624+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Zertifzierung
- /Title: Certification Report BSI-DSZ-CC-0953-2015
- pdf_file_size_bytes: 1184217
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
- /Author: ACA
- /Company: Department of Defence
- /CreationDate: D:20170221112617+11'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /ModDate: D:20170221112621+11'00'
- /Objective-Classification: [Inherited - Unclassified]
- /Objective-CreationStamp: D:20170207
- /Objective-Id: R28764936
- /Objective-IsApproved: 0
- /Objective-IsPublished: 0
- /Objective-ModificationStamp: D:20170221
- /Objective-Owner: Caulfield, Terence (MR)(ASD)
- /Objective-Parent: Certification
- /Objective-Path: Objective Global Folder - PROD:Defence Business Units:Strategic Policy and Intelligence Group:Australian Signals Directorate:ASD : Australian Signals Directorate:CISD:ASCS:CS-PD1:Evaluations:ACA:Australasn Certn Auth:Certification:Operations:AISEP Certifi
- /Objective-State: Being Edited
- /Objective-Title: EFS-T043_Junos 15.1X49 for SRX platforms - NDPP-FW-VPN-IPS_ Certification Report v1.0
- /Objective-Version: 0.2
- /Objective-VersionNumber: 2
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /SourceModified: D:20170221002551
- /Title:
- pdf_file_size_bytes: 92765
- pdf_hyperlinks: https://www.juniper.net/
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
0953b_pdf.pdf |
Juniper-ISSX1056-2-Junos15.1X49-NDPP-FW-IPS-ST-SRX-v1.0 (1).pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.5: 2
- ADV_IMP.1: 2
- ADV_INT.2: 2
- ADV_TDS.4: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_FLR.3: 4
- ALC_LCD.1: 2
- ALC_TAT.3: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.3: 2
- ATE_FUN.2: 4
- ATE_IND.2: 2
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 3
- FDP_ACC.1.1: 2
- FDP_ACC.2: 25
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 43
- FDP_ACF.1: 14
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 17
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_RIP.2: 8
- FDP_RIP.2.1: 1
- FIA:
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 27
- FMT_MSA.1: 13
- FMT_MSA.3: 13
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 4
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 13
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TRC.1: 6
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_RSA.1: 7
- FRU_RSA.1.1: 1
- FTA:
- FTA_TSE.1: 10
- FTA_TSE.1.1: 1
|
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 2
- FCS_CKM_EXT.4: 6
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 23
- FCS_COP.1.1: 5
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT.1: 1
- FDP:
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT.1: 8
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_PSK_EXT.1.4: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.5: 1
- FIA_UIA_EXT.1: 6
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 2
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 1
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_SKP_EXT: 1
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.1.2: 1
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 2
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 6
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.ADDRESS_FILTERING: 3
- O.AUTHENTICATION: 2
- O.CRYPTOGRAPHIC_FUNCTIONS: 2
- O.DISPLAY_BANNER: 1
- O.FAIL_SECURE: 2
- O.IPSANALYZE: 2
- O.IPSREACT: 2
- O.IPSSENSE: 1
- O.PORT_FILTERING: 2
- O.PROTECTED_COMMUNICATIONS: 2
- O.RELATED_CONNECTION_FILTERING: 2
- O.RESIDUAL_INFORMATION_CLEARING: 2
- O.SESSION_LOCK: 2
- O.STATEFUL_INSPECTION: 2
- O.SYSTEM_MONITORING: 4
- O.TOE_ADMINISTRATION: 5
- O.TSF_SELF_TEST: 2
- O.VERIFIABLE_UPDATES: 2
- OE:
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.DATA_INTEGRITY: 1
- T.NETWORK_DISCLOSURE: 1
- T.NETWORK_DOS: 1
- T.NETWORK_MISUSE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 2
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 28
- IKEv1: 15
- IKEv2: 12
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS PUB 186-2: 1
- FIPS PUB 186-3: 8
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 1
- RFC:
- RFC 2409: 2
- RFC 2460: 4
- RFC 2463: 1
- RFC 2560: 1
- RFC 2986: 1
- RFC 3513: 2
- RFC 3602: 1
- RFC 4106: 1
- RFC 4109: 2
- RFC 4301: 2
- RFC 4303: 1
- RFC 4306: 2
- RFC 4443: 2
- RFC 4868: 4
- RFC 4945: 2
- RFC 5280: 2
- RFC 5735: 2
- RFC 5759: 1
- RFC 6379: 1
- RFC 768: 4
- RFC 791: 4
- RFC 792: 3
- RFC 793: 4
- RFC 959: 2
- RFC5282: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- prior to any exchange. SSH, Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope. Security Management The TOE provides an authorized Administrator role that is responsible for: the: 1
|
pdf_data/st_metadata |
- /Author: Robert Nasser, Clemens Wittinger (generated by CCTool version 2.8.1.3)
- /CreationDate: D:20151014085838Z
- /Creator: Unknown
- /Keywords: access control, identification, authentication, audit, object reuse, z, LPAR, logical partitioning, isolation, PR/SM, LIC, cross-partition, HMC, SE
- /ModDate: D:20151014085838Z
- /Producer: XEP 4.23
- /Subject: PR/SM for IBM z13 EC GA1 Driver Level D22H
- /Title: Security Target for PR/SM for IBM z13 EC GA1 (version 14.6 as of 2015-07-29)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 729778
- pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
- /Author: BAE Systems Applied Intelligence
- /Client: Juniper Networks, Inc.
- /Company: Apex
- /CreationDate: D:20170221112406+11'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /DocVersion: 1.0
- /EApproved: Van Nguyen (Juniper)
- /EAuthor: BAE Systems Applied Intelligence
- /ECompany_Identity: Juniper Networks, Inc
- /EDocument_Issue_Date: 24 January 2017
- /EDocument_Reference: Junos_15.1X49-D60_ST_
- /EDocument_Status: Released
- /EDocument_Title: Junos 15.1X49-D60 for SRX platforms (NDPP, TFFWEP, VPNEP, IPSEP)
- /EDocument_Version: 1.0
- /EProject_Name: Security Target
- /EReport_Type : CC - Security Target
- /ModDate: D:20170221112428+11'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /SourceModified: D:20170221002322
- /Subject: Junos 15.1X49-D60 for SRX Platforms
- /TOE: Junos 15.1 X49-D60 for SRX platforms
- /Title: Security Target
- pdf_file_size_bytes: 478748
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 92
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |