Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Avaya VoIP PBX System based on the Communication Manager 5.1
BSI-DSZ-CC-0540-2009
Juniper Networks Junos Pulse Access Control Service 4.2 R4
ISCB-5-RPT-C039-CR-v1a
name Avaya VoIP PBX System based on the Communication Manager 5.1 Juniper Networks Junos Pulse Access Control Service 4.2 R4
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme DE MY
not_valid_after 01.09.2019 05.08.2018
not_valid_before 27.03.2009 05.08.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0540a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C039-CR-v1a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0540b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JNPR%20UAC%204.2R4%20EAL3%20ST%20v1.3.pdf
manufacturer Avaya GmbH & Co. KG Juniper Networks, Inc.
manufacturer_web https://www.avaya.com/de/ https://www.juniper.net/
security_level ASE_SPD.1, ADV_FSP.2, ASE_OBJ.2, ASE_REQ.2, EAL1+ EAL3+, ALC_FLR.2
dgst 7ffe542d7171483d 1c02d4a2e04d2b29
heuristics/cert_id BSI-DSZ-CC-0540-2009 ISCB-5-RPT-C039-CR-v1a
heuristics/cert_lab BSI []
heuristics/cpe_matches {} cpe:2.3:o:juniper:junos:4.2:*:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_pulse_access_control_service:4.2:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2023-28975, CVE-2013-4689, CVE-2024-39555, CVE-2022-22242, CVE-2023-36840, CVE-2022-22244, CVE-2022-22214, CVE-2019-0036, CVE-2024-30380, CVE-2024-39549, CVE-2022-22208, CVE-2021-31372, CVE-2024-39511, CVE-2023-28962, CVE-2024-39558, CVE-2023-36841, CVE-2013-6618, CVE-2024-39514, CVE-2023-44182, CVE-2023-28979, CVE-2022-22241, CVE-2023-44175, CVE-2023-44184, CVE-2022-22243, CVE-2013-5650, CVE-2023-22406, CVE-2023-44186, CVE-2023-36839, CVE-2022-22224, CVE-2022-22238, CVE-2022-22181, CVE-2023-28964, CVE-2023-44177, CVE-2022-22163, CVE-2024-39556, CVE-2022-22162, CVE-2023-28963, CVE-2004-0230, CVE-2023-36842, CVE-2004-0468, CVE-2023-44194, CVE-2023-44197, CVE-2023-44201, CVE-2022-22220, CVE-2024-21591, CVE-2024-39517, CVE-2024-21594, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2021-31362, CVE-2022-22245, CVE-2022-22197, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2022-22246, CVE-2023-22395, CVE-2023-36843, CVE-2023-44185, CVE-2023-22391, CVE-2023-44176
heuristics/extracted_sars ALC_LCD.2, ALC_CMC.1, ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ASE_ECD.1, APE_ECD.1, ASE_TSS.1, ASE_SPD.1, AVA_VAN.1, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, ATE_FUN.2, AGD_OPE.1, AGD_PRE.1, APE_REQ.2, ATE_IND.1, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, APE_INT.1, APE_SPD.1, ALC_CMS.1, APE_OBJ.2, ASE_CCL.1, ADV_TDS.6, ATE_COV.3, ADV_SPM.1 ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions 5.1 4.2
pdf_data/report_filename 0540a.pdf ISCB-5-RPT-C039-CR-v1a.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0540-2009
    • cert_item: Avaya VoIP PBX System based on the Communication Manager 5.1
    • cert_lab: BSI
    • developer: Avaya GmbH & Co. KG sponsored by Avaya Inc
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0540: 1
    • BSI-DSZ-CC-0540-2009: 16
  • MY:
    • ISCB-5-RPT-C039-CR-v1a: 31
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
    • EAL 1 augmented: 3
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 6
    • EAL1+: 2
    • EAL2: 3
    • EAL3: 4
    • EAL4: 4
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL3: 6
    • EAL3 augmented: 1
    • EAL3+: 5
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 5
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 2
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 5
    • ASE_REQ.1: 1
    • ASE_REQ.2: 5
    • ASE_SPD: 1
    • ASE_SPD.1: 5
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 2
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 2
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
  • ALC:
    • ALC_FLR.2: 10
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
    • FAU_UAU.2: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_IFF.1: 2
  • FIA:
    • FIA_ATD.1: 2
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 1
    • FMT_SMT.1: 1
  • FPT:
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • TDES: 5
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 197: 1
    • FIPS 46-3: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1.0, 2009-03-10, Evaluation Technical Report BSI-DSZ-CC-0540, CSC Deutschland Solutions GmbH, (confidential document) [8] Configuration list for the TOE, Version 1.0, 2009-03-09, Avaya VoIP PBX System Configuration: 1
    • Avaya GmbH & Co KG (confidential document) [9] Guidance CD “Communication Manager 5.0”, Publication Date: January 2008 [10] Guidance CD: 1
  • OutOfScope:
    • TOE but relevant for the operation. Also here, the network devices like switches and routers are out of scope. This holds also valid for the connection to the internet (the SIP trunk) and the required network: 1
    • may implement some security features like IEEE 802.1X network device authentication. They are out of scope. Their existence and their security features can be assumed. The protection zone “Server” contains: 1
    • out of scope: 2
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20090421135047+02'00'
  • /Creator: Writer
  • /Keywords: "Avaya VoIP PBX Systembased on the Communication Manager 5.1, Avaya GmbH & Co. KG, Avaya Inc., BSI-DSZ-CC-0540-2009"
  • /ModDate: D:20090504155601+02'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0540-2009
  • pdf_file_size_bytes: 856495
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20130806134853+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: Juniper Networks
  • /Document Type: REPORT
  • /Identifier: ISCB-5-RPT-C039-CR-v1a
  • /Index: MyCB_TMP_011
  • /Keywords: UAC
  • /ModDate: D:20130806134906+08'00'
  • /Phase: External
  • /Producer: Adobe PDF Library 10.0
  • /Project Code: C039
  • /Released: 5 August 2013
  • /ST Title: Security Target: Juniper Networks Junos Pulse Access Control Service 4.2 R4
  • /ST Version: v1.3
  • /SourceModified: D:20130806054834
  • /Sponsor: Juniper Networks
  • /Subject: Juniper Networks Junos Pulse Access Control Service 4.2 R4
  • /TOE Name: Juniper Networks Junos Pulse Access Control Service
  • /TOE Version: 4.2 R4
  • /Title: C039 Certification Report
  • /Version: v1a
  • pdf_file_size_bytes: 341341
  • pdf_hyperlinks: http://www.cybersecurity.my/mycc, mailto:[email protected]
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 32
pdf_data/st_filename 0540b.pdf JNPR UAC 4.2R4 EAL3 ST v1.3.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0540: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 1 augmented: 1
    • EAL1: 1
    • EAL2: 1
  • EAL:
    • EAL3: 6
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 4
    • ADV_FSP.2: 7
  • AGD:
    • AGD_OPE.1: 5
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 4
    • ASE_REQ.1: 2
    • ASE_REQ.2: 5
    • ASE_SPD.1: 3
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.3: 2
    • ADV_TDS.2: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.3: 2
    • ALC_CMS.3: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.2: 5
    • ALC_LCD.1: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 2
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FDP:
    • FDP_ACC.1: 17
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.1: 6
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 6
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 47
    • FDP_IFC.1.1: 3
    • FDP_IFF.1: 27
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_ITC.2: 6
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_ITT.1: 1
    • FDP_ITT.2: 6
    • FDP_ITT.2.1: 1
    • FDP_ITT.2.2: 1
    • FDP_RIP.1: 1
    • FDP_RIP.2: 6
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 10
    • FIA_UAU.2.1: 2
    • FIA_UAU.3: 6
    • FIA_UAU.3.1: 1
    • FIA_UAU.3.2: 1
    • FIA_UID.1: 21
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 14
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 35
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 50
    • FMT_SMF.1.1: 6
    • FMT_SMR.1: 44
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_STM.1: 2
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FTP:
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 6
    • FCS_COP: 1
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA: 3
    • FMT_MSA.1: 4
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 4
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 4
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 3
    • FMT_SMF: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 8
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 1
    • FPT_ITT.1: 4
    • FPT_ITT.1.1: 1
    • FPT_STM: 1
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 4
    • A.AVAILABLE: 3
    • A.DEVICES: 3
    • A.ERRMONITORING: 3
    • A.LOCATION: 3
    • A.PHYSICAL: 4
    • A.SECDEV: 3
    • A.SECNET: 3
    • A.USER: 3
    • A.VPN: 3
  • O:
    • O.AUTHENTICATE: 1
    • O.CONFCLIENT: 1
    • O.DISCLOSE: 1
    • O.LOGEXPORT: 1
    • O.MEDIATION: 1
    • O.RESTRICTION: 1
    • O.SELFPROTECT: 1
  • OE:
    • OE.ADMIN: 14
    • OE.AVAILABLE: 2
    • OE.DEVICES: 3
    • OE.ERRMONITORING: 5
    • OE.LOCATION: 5
    • OE.LOGOUT: 3
    • OE.NETMONITOR: 7
    • OE.OS: 3
    • OE.PHYSICAL: 9
    • OE.SECDEV: 2
    • OE.SECNET: 4
    • OE.USER: 2
    • OE.VPN: 4
  • OSP:
    • OSP.NETMONITOR: 3
    • OSP.OS: 4
  • A:
    • A.LOCATE: 3
    • A.NOEVIL: 2
  • O:
    • O.AMANAGE: 6
    • O.AUDIT: 7
    • O.ENCRYPT: 7
    • O.PROTECT: 5
    • O.SECKEY: 5
    • O.TOECOM: 4
    • O.UNAUTH_ENDPOINT: 6
  • OE:
    • OE.ADMIN: 3
    • OE.PHYSICAL: 3
  • T:
    • T.NOAUDIT: 2
    • T.OPS: 3
    • T.PRIVIL: 2
    • T.PROCOM: 3
    • T.TOECOM: 2
    • T.UNAUTH_ENDPOINT: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 6
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 14
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 197: 2
    • FIPS 46-3: 2
  • PKCS:
    • PKCS7: 1
  • RFC:
    • RFC 2246: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • TOE but relevant for the operation. Also here, the network devices like switches and routers are out of scope. This holds also valid for the connection to the internet (the SIP trunk) and the required network: 1
    • are held by us. In order to define the logical scope in detail, the following functions are out of scope of the TOE: Boarder protection of all external connections like SIP trunks or remote management: 1
    • may implement some security features like IEEE 802.1X network device authentication. They are out of scope. Their existence and their security features can be assumed. The protection zone “Server” contains: 1
    • out of scope: 3
pdf_data/st_metadata
  • /Author: Avaya GmbH & Co KG
  • /CreationDate: D:20090309164738Z
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: VoIP, CM 5.1, Communication Manager
  • /ModDate: D:20090407130547+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Common Criteria Evaluation
  • /Title: Avaya VoIP PBX System Security Target
  • pdf_file_size_bytes: 773349
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
  • /Author: Apex Assurance Group
  • /Client: Juniper Networks
  • /Company:
  • /CreationDate: D:20130722160254+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /DocVersion: 1.3
  • /ModDate: D:20130722160304+08'00'
  • /Producer: Adobe PDF Library 10.0
  • /Product Name: Junos Pulse Access Control Service
  • /Product Version: 4.2
  • /Rev: R4
  • /SourceModified: D:20130716035006
  • /Subject: Junos Pulse Access Control Service 4.2R4
  • /Title: Security Target
  • pdf_file_size_bytes: 504670
  • pdf_hyperlinks: http://www.juniper.net/, http://www.apexassurance.com/
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different