name |
Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches running JUNOS 11.4R2
|
Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5
|
category |
Network and Network-Related Devices and Systems
|
Network and Network-Related Devices and Systems
|
not_valid_before |
2012-10-22
|
2014-03-07
|
not_valid_after |
2018-04-19
|
2016-05-07
|
scheme |
CA
|
US
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/11.4_ST_1.0.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-st.pdf
|
status |
archived
|
archived
|
manufacturer |
Juniper Networks, Inc.
|
Juniper Networks, Inc.
|
manufacturer_web |
https://www.juniper.net/
|
https://www.juniper.net/
|
security_level |
EAL3+, ALC_FLR.3 |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-227%20CR%20v1.0e.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-vr.pdf
|
cert_link |
None
|
None
|
protection_profiles |
|
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Network Devices', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_nd_v1.1.pdf', 'pp_ids': frozenset({'PP_ND_V1.1'})}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2014, 5, 29), 'maintenance_title': 'Junos 12.1R3.6', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-add1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-st.pdf'}) |
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
2ee7c66079a40ba9b8f3b905c6480f5e1eb0fc73621c4a1aab13a6c3603b01c3
|
8524bcd5174242593d2d202a248c264fba531ad6aba6d6b990903573e45395df
|
state/report/txt_hash |
35f4539aae034fec82e5a1751e39ebd6c46c6c5f46070a200412dd3e40361f3d
|
f125f902d9949774368280436b4ffd68eb758cccea63271115fbf83867d83ab8
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
10ff6834072174907de63dc59c8c38f5766184ad23fac95fa94d77b0fe0ec1e0
|
3236d7c82fb966d22252fce041518d40e072a19d0c9699d74f79a64c8853c3fb
|
state/st/txt_hash |
32e391190d602645edb711d8b0dd6f7f5db98d540b5405645efc251b40f3198a
|
4ce522babfdf46c48ea73d2e93da5ee8357e67210a7911e259408e9ef5609c89
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
383-4-227
|
CCEVS-VR-VID-10517-2014
|
heuristics/cert_lab |
CANADA
|
US
|
heuristics/cpe_matches |
None
|
cpe:2.3:o:juniper:junos:12.1:r11:*:*:*:*:*:* |
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
11.4 |
12.1, 3.5 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
CVE-2022-22156, CVE-2023-44177, CVE-2023-44201, CVE-2023-44178, CVE-2024-21591, CVE-2022-22215, CVE-2022-22208, CVE-2024-39549, CVE-2023-36841, CVE-2022-22242, CVE-2023-36843, CVE-2014-3818, CVE-2014-2712, CVE-2023-28964, CVE-2014-2711, CVE-2022-22181, CVE-2023-44197, CVE-2014-6380, CVE-2022-22224, CVE-2014-6379, CVE-2014-3819, CVE-2013-4686, CVE-2004-0468, CVE-2021-31372, CVE-2023-44184, CVE-2022-22220, CVE-2022-22245, CVE-2023-22406, CVE-2013-7313, CVE-2024-39528, CVE-2021-31362, CVE-2023-44194, CVE-2023-28979, CVE-2022-22246, CVE-2022-22244, CVE-2023-28962, CVE-2014-3816, CVE-2013-4689, CVE-2022-22241, CVE-2014-2714, CVE-2022-22238, CVE-2022-22162, CVE-2023-44186, CVE-2014-2713, CVE-2024-21594, CVE-2022-22197, CVE-2013-6618, CVE-2022-22243, CVE-2023-36842, CVE-2023-28963, CVE-2023-44182, CVE-2004-0230, CVE-2022-22163, CVE-2023-22395, CVE-2023-44185, CVE-2023-36839, CVE-2023-36840, CVE-2023-44176, CVE-2019-0036, CVE-2022-22214, CVE-2023-44175, CVE-2023-4481, CVE-2022-22173, CVE-2023-22407, CVE-2023-28975, CVE-2013-6014, CVE-2023-22391 |
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
None
|
- product:
Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5
- id:
CCEVS-VR-VID10517
- url:
https://www.niap-ccevs.org/product/10517
- certification_date:
2014-03-07T00:03:00Z
- expiration_date:
2016-05-29T00:00:00Z
- category:
Network Device, Network Switch, Router
- vendor:
Juniper Networks, Inc.
- evaluation_facility:
Leidos Common Criteria Testing Laboratory
- scheme:
US
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
383-4-227 CR v1.0e.pdf
|
st_vid10517-vr.pdf
|
pdf_data/report_frontpage |
- CA:
- cert_id:
383-4-227-CR
- cert_lab:
CANADA
|
- US:
- cert_id:
CCEVS-VR-VID10517-2014
- cert_item:
Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T- Series Core Routers and EX-Series Ethernet Switches running Junos 12.1R3.5
- cert_lab:
US NIAP
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10517-2014:
1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.1:
1
- ALC_CMS.1:
1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sar/ALC |
|
- ALC_CMC.1:
1
- ALC_CMS.1:
1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 3+:
2
- EAL 3:
4
- EAL 3 augmented:
2
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_protocol/SSH/SSH |
3
|
8
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
46866
- pdf_is_encrypted:
False
- pdf_number_of_pages:
13
- /Author:
rbharland
- /CreationDate:
D:20121023105315-04'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20121023105315-04'00'
- /Producer:
Acrobat Distiller 9.0.0 (Windows)
- /Title:
Microsoft Word - 383-4-227 CR v1.0e.doc
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
119090
- pdf_is_encrypted:
False
- pdf_number_of_pages:
21
- /Author:
Leidos
- /Company: Leidos
- /CreationDate:
D:20140310131529-04'00'
- /Creator:
Acrobat PDFMaker 10.1 for Word
- /ModDate:
D:20140310131543-04'00'
- /Producer:
Adobe PDF Library 10.0
- /SourceModified: D:20140310171504
- /Subject: Juniper Junos NDPP
- /Title:
Validation Report
- /_NewReviewCycle:
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
rbharland
|
Leidos
|
pdf_data/report_metadata//CreationDate |
D:20121023105315-04'00'
|
D:20140310131529-04'00'
|
pdf_data/report_metadata//Creator |
PScript5.dll Version 5.2.2
|
Acrobat PDFMaker 10.1 for Word
|
pdf_data/report_metadata//ModDate |
D:20121023105315-04'00'
|
D:20140310131543-04'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 9.0.0 (Windows)
|
Adobe PDF Library 10.0
|
pdf_data/report_metadata//Title |
Microsoft Word - 383-4-227 CR v1.0e.doc
|
Validation Report
|
pdf_data/report_metadata/pdf_file_size_bytes |
46866
|
119090
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
13
|
21
|
pdf_data/st_filename |
11.4_ST_1.0.pdf
|
st_vid10517-st.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.LOCATE:
4
- A.NOEVIL:
3
- A.EAUTH:
2
- A.TIME:
4
- A.CRYPTO:
4
- A.NWCOMP:
2
|
- A.NO_GENERAL_PURPOSE:
1
- A.PHYSICAL:
1
- A.TRUSTED_ADMIN:
1
|
pdf_data/st_keywords/cc_claims/O |
- O.FLOW:
11
- O.PROTECT:
15
- O.EADMIN:
8
- O.ACCESS:
14
- O.ROLBAK:
6
- O.AUDIT:
13
- O.CONN:
6
|
- O.PROTECTED_COMMUNICATIONS:
1
- O.VERIFIABLE_UPDATES:
1
- O.SYSTEM_MONITORING:
1
- O.DISPLAY_BANNER:
1
- O.TOE_ADMINISTRATION:
1
- O.RESIDUAL_INFORMATION_CLEARING:
1
- O.SESSION_LOCK:
1
- O.TSF_SELF_TEST:
1
|
pdf_data/st_keywords/cc_claims/OE |
- OE.EAUTH: 3
- OE.TIME: 3
- OE.CRYPTO: 3
- OE.PHYSICAL:
3
- OE.ADMIN: 3
- OE.NWCOMP: 3
|
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL:
1
- OE.TRUSTED_ADMIN: 1
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL |
3
|
1
|
pdf_data/st_keywords/cc_claims/T |
- T.ROUTE:
9
- T.PRIVIL:
7
- T.OPS:
8
- T.MANDAT:
3
- T.CONFLOSS:
5
- T.NOAUDIT:
2
|
- T.ADMIN_ERROR:
1
- T.TSF_FAILURE:
1
- T.UNDETECTED_ACTIONS:
1
- T.UNAUTHORIZED_ACCESS:
1
- T.UNAUTHORIZED_UPDATE:
1
- T.USER_DATA_REUSE:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.3:
1
- ADV_TDS.2:
1
|
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.3:
7
- ALC_CMC.3:
1
- ALC_CMS.3:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
1
|
- ALC_CMC.1:
1
- ALC_CMS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1: 1
- ASE_OBJ.2: 1
- ASE_ECD.1:
1
- ASE_REQ.2: 1
- ASE_TSS.1:
1
|
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_OBJ.1: 1
- ASE_ECD.1:
1
- ASE_REQ.1: 1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3:
5
- EAL3 augmented:
4
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
6
- FAU_ARP.1:
6
- FAU_SAR.1:
5
- FAU_GEN.2:
5
- FAU_SAA.1:
5
- FAU_STG.1:
5
- FAU_ARP.1.1:
1
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAA.1.1:
1
- FAU_SAA.1.2:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FDP:
- FDP_IFC.1:
5
- FDP_IFF.1:
6
- FDP_ROL.1:
5
- FDP_IFC.1.1:
1
- FDP_IFF.1.1:
1
- FDP_IFF.1.2:
1
- FDP_IFF.1.3:
1
- FDP_IFF.1.4:
1
- FDP_IFF.1.5:
1
- FDP_ROL.1.1:
1
- FDP_ROL.1.2:
1
- FIA:
- FIA_ATD.1:
5
- FIA_SOS.1:
5
- FIA_UAU.2:
8
- FIA_UAU.5:
5
- FIA_UID.2:
7
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.2.1:
1
- FIA_UAU.1:
2
- FIA_UID.2.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UID.1:
1
- FMT:
- FMT_SMF.1:
7
- FMT_MSA.3:
10
- FMT_MTD.1:
7
- FMT_MOF:
10
- FMT_MTD:
32
- FMT_SMR.1:
5
- FMT_MOF.1:
2
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.1:
3
- FPT:
- FPT_STM.1:
5
- FPT_STM.1.1:
1
- FTA:
- FTA_TSE.1:
5
- FTA_TSE.1.1:
1
|
- FAU:
- FAU_GEN.1:
8
- FAU_GEN.2:
5
- FAU_STG_EXT.1:
5
- FAU_GEN.1.1:
2
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_STG_EXT.1.1:
1
- FCS:
- FCS_CKM.1:
15
- FCS_CKM_EXT.4:
10
- FCS_COP.1:
20
- FCS_RBG_EXT.1:
4
- FCS_SSH_EXT.1:
6
- FCS_CKM.1.1:
2
- FCS_COP.1.1:
4
- FCS_RBG_EXT.1.1:
1
- FCS_RBG_EXT.1.2:
1
- FCS_SSH_EXT.1.1:
1
- FCS_SSH_EXT.1.2:
1
- FCS_SSH_EXT.1.3:
1
- FCS_SSH_EXT.1.4:
1
- FCS_SSH_EXT.1.5:
1
- FCS_SSH_EXT.1.6:
1
- FCS_SSH_EXT.1.7:
1
- FCS_CKM.2:
1
- FCS_CKM.4:
6
- FDP:
- FDP_RIP.2:
5
- FDP_RIP.2.1:
1
- FDP_ITC.1:
6
- FDP_ITC.2:
5
- FIA:
- FIA_PMG_EXT.1:
7
- FIA_UIA_EXT.1:
8
- FIA_UAU_EXT.2:
7
- FIA_UAU.7:
4
- FIA_PMG_EXT.1.1:
1
- FIA_UIA_EXT.1.1:
1
- FIA_UIA_EXT.1.2:
1
- FIA_UAU_EXT.2.1:
1
- FIA_UAU.7.1:
1
- FIA_UID.1:
3
- FIA_UIA_EXT:
1
- FIA_UAU.1:
1
- FMT:
- FMT_MTD.1:
5
- FMT_SMF.1:
6
- FMT_SMR.2:
5
- FMT_SMR.1:
2
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.2.1:
1
- FMT_SMR.2.2:
1
- FMT_SMR.2.3:
1
- FPT:
- FPT_SKP_EXT.1:
5
- FPT_APW_EXT.1.1:
3
- FPT_STM.1:
7
- FPT_TUD_EXT.1:
4
- FPT_TST_EXT.1:
5
- FPT_SKP_EXT.1.1:
1
- FPT_APW_EXT.1:
3
- FPT_APW_EXT.1.2:
1
- FPT_STM.1.1:
1
- FPT_TUD_EXT.1.1:
1
- FPT_TUD_EXT.1.2:
1
- FPT_TUD_EXT.1.3:
1
- FPT_TST_EXT.1.1:
1
- FPT_TRP.1:
1
- FTA:
- FTA_EXT_SSL.1:
2
- FTA_SSL.3:
5
- FTA_SSL.4:
4
- FTA_TAB.1:
6
- FTA_SSL_EXT.1:
2
- FTA_SSL_EXT.1.1:
2
- FTA_SSL.3.1:
1
- FTA_SSL_EXT.4:
1
- FTA_SSL.4.1:
1
- FTA_TAB.1.1:
1
- FTP:
- FTP_ITC.1:
7
- FTP_TRP.1:
4
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
1
- FTP_TRP.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
6
- FAU_ARP.1: 6
- FAU_SAR.1: 5
- FAU_GEN.2:
5
- FAU_SAA.1: 5
- FAU_STG.1: 5
- FAU_ARP.1.1: 1
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
|
- FAU_GEN.1:
8
- FAU_GEN.2:
5
- FAU_STG_EXT.1: 5
- FAU_GEN.1.1:
2
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_STG_EXT.1.1: 1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
6
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 |
5
|
5
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_IFC.1:
5
- FDP_IFF.1:
6
- FDP_ROL.1:
5
- FDP_IFC.1.1:
1
- FDP_IFF.1.1:
1
- FDP_IFF.1.2:
1
- FDP_IFF.1.3:
1
- FDP_IFF.1.4:
1
- FDP_IFF.1.5:
1
- FDP_ROL.1.1:
1
- FDP_ROL.1.2:
1
|
- FDP_RIP.2:
5
- FDP_RIP.2.1:
1
- FDP_ITC.1:
6
- FDP_ITC.2:
5
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_ATD.1: 5
- FIA_SOS.1: 5
- FIA_UAU.2: 8
- FIA_UAU.5: 5
- FIA_UID.2: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.2.1: 1
- FIA_UAU.1:
2
- FIA_UID.2.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1:
1
|
- FIA_PMG_EXT.1: 7
- FIA_UIA_EXT.1: 8
- FIA_UAU_EXT.2: 7
- FIA_UAU.7: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UAU_EXT.2.1: 1
- FIA_UAU.7.1: 1
- FIA_UID.1:
3
- FIA_UIA_EXT: 1
- FIA_UAU.1:
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_SMF.1:
7
- FMT_MSA.3: 10
- FMT_MTD.1:
7
- FMT_MOF: 10
- FMT_MTD: 32
- FMT_SMR.1:
5
- FMT_MOF.1: 2
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_MSA.1: 3
|
- FMT_MTD.1:
5
- FMT_SMF.1:
6
- FMT_SMR.2: 5
- FMT_SMR.1:
2
- FMT_MTD.1.1: 1
- FMT_SMF.1.1:
1
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
7
|
5
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
7
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
5
|
2
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_STM.1:
5
- FPT_STM.1.1:
1
|
- FPT_SKP_EXT.1: 5
- FPT_APW_EXT.1.1: 3
- FPT_STM.1:
7
- FPT_TUD_EXT.1: 4
- FPT_TST_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_APW_EXT.1: 3
- FPT_APW_EXT.1.2: 1
- FPT_STM.1.1:
1
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TST_EXT.1.1: 1
- FPT_TRP.1: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
5
|
7
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTA |
- FTA_TSE.1:
5
- FTA_TSE.1.1:
1
|
- FTA_EXT_SSL.1:
2
- FTA_SSL.3:
5
- FTA_SSL.4:
4
- FTA_TAB.1:
6
- FTA_SSL_EXT.1:
2
- FTA_SSL_EXT.1.1:
2
- FTA_SSL.3.1:
1
- FTA_SSL_EXT.4:
1
- FTA_SSL.4.1:
1
- FTA_TAB.1.1:
1
|
pdf_data/st_keywords/certification_process/OutOfScope |
- out of scope:
3
- which are out of scope), and SSH (which is provided by the operational environment: 1
- perspective. 4 The lower layers of the PFE which simply deal with physical interfaces mechanics are out of scope. Security Target for Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal: 1
- This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be: 1
- accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: All: 1
|
- out of scope:
2
- SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
- Line Card network interface components) which simply deal with physical interfaces mechanics are out of scope. Security Target Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge: 1
- including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
|
pdf_data/st_keywords/certification_process/OutOfScope/out of scope |
3
|
2
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- SSH:
- TLS:
- IKE:
- IPsec:
- VPN:
|
pdf_data/st_keywords/crypto_protocol/SSH/SSH |
13
|
46
|
pdf_data/st_keywords/crypto_protocol/TLS/SSL/SSL |
2
|
3
|
pdf_data/st_keywords/crypto_scheme |
|
- MAC:
- KEX:
- Key exchange:
1
- Key Exchange:
3
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
- FIPS:
- FIPS PUB 197:
1
- FIPS PUB 186-2:
1
- FIPS140:
1
- FIPS197:
1
- NIST:
- RFC:
- RFC 4253:
2
- RFC 4741:
1
- RFC4253:
2
- RFC 4251:
2
- RFC 4252:
1
- RFC 4254:
1
- RFC2451:
1
- RFC 2451:
1
- RFC2409:
1
- RFC 2409:
1
- RFC2406:
1
- RFC 2406:
1
- RFC2404:
1
- RFC 2404:
1
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
- CCMB-2009-07-001: 1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2009-07-002 |
1
|
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2009-07-003 |
1
|
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2009-07-004 |
1
|
1
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
797777
- pdf_is_encrypted:
False
- pdf_number_of_pages:
39
- /Title:
JUNOS 11.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches
- /Author:
Juniper
- /Subject:
EAL3 Security Target
- /Creator:
Microsoft® Word 2010
- /CreationDate:
D:20121001140620+01'00'
- /ModDate:
D:20121001140620+01'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
529913
- pdf_is_encrypted:
False
- pdf_number_of_pages:
49
- /Author:
ISL-netbook
- /CreationDate:
D:20140513092401+01'00'
- /Creator:
PDFCreator Version 1.7.2
- /Keywords:
- /ModDate:
D:20140603093259-04'00'
- /Producer:
GPL Ghostscript 9.10
- /Subject:
- /Title:
[ST] juniper-junos-12 1R3.6-stv1.7 (140512) - clean
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
Juniper
|
ISL-netbook
|
pdf_data/st_metadata//CreationDate |
D:20121001140620+01'00'
|
D:20140513092401+01'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2010
|
PDFCreator Version 1.7.2
|
pdf_data/st_metadata//ModDate |
D:20121001140620+01'00'
|
D:20140603093259-04'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2010
|
GPL Ghostscript 9.10
|
pdf_data/st_metadata//Subject |
EAL3 Security Target
|
|
pdf_data/st_metadata//Title |
JUNOS 11.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches
|
[ST] juniper-junos-12 1R3.6-stv1.7 (140512) - clean
|
pdf_data/st_metadata/pdf_file_size_bytes |
797777
|
529913
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
39
|
49
|
dgst |
86a9c759d0c212a7
|
c99465e61767d10a
|