Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches running JUNOS 11.4R2
383-4-227
Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5
CCEVS-VR-VID-10517-2014
name Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches running JUNOS 11.4R2 Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5
not_valid_before 2012-10-22 2014-03-07
not_valid_after 2018-04-19 2016-05-07
scheme CA US
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/11.4_ST_1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-st.pdf
security_level EAL3+, ALC_FLR.3
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-227%20CR%20v1.0e.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-vr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Network Devices', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_nd_v1.1.pdf', 'pp_ids': frozenset({'PP_ND_V1.1'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2014, 5, 29), 'maintenance_title': 'Junos 12.1R3.6', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-add1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-st.pdf'})
state/report/pdf_hash 2ee7c66079a40ba9b8f3b905c6480f5e1eb0fc73621c4a1aab13a6c3603b01c3 8524bcd5174242593d2d202a248c264fba531ad6aba6d6b990903573e45395df
state/report/txt_hash 35f4539aae034fec82e5a1751e39ebd6c46c6c5f46070a200412dd3e40361f3d f125f902d9949774368280436b4ffd68eb758cccea63271115fbf83867d83ab8
state/st/pdf_hash 10ff6834072174907de63dc59c8c38f5766184ad23fac95fa94d77b0fe0ec1e0 3236d7c82fb966d22252fce041518d40e072a19d0c9699d74f79a64c8853c3fb
state/st/txt_hash 32e391190d602645edb711d8b0dd6f7f5db98d540b5405645efc251b40f3198a 4ce522babfdf46c48ea73d2e93da5ee8357e67210a7911e259408e9ef5609c89
heuristics/cert_id 383-4-227 CCEVS-VR-VID-10517-2014
heuristics/cert_lab CANADA US
heuristics/cpe_matches None cpe:2.3:o:juniper:junos:12.1:r11:*:*:*:*:*:*
heuristics/extracted_versions 11.4 12.1, 3.5
heuristics/related_cves None CVE-2022-22156, CVE-2023-44177, CVE-2023-44201, CVE-2023-44178, CVE-2024-21591, CVE-2022-22215, CVE-2022-22208, CVE-2024-39549, CVE-2023-36841, CVE-2022-22242, CVE-2023-36843, CVE-2014-3818, CVE-2014-2712, CVE-2023-28964, CVE-2014-2711, CVE-2022-22181, CVE-2023-44197, CVE-2014-6380, CVE-2022-22224, CVE-2014-6379, CVE-2014-3819, CVE-2013-4686, CVE-2004-0468, CVE-2021-31372, CVE-2023-44184, CVE-2022-22220, CVE-2022-22245, CVE-2023-22406, CVE-2013-7313, CVE-2024-39528, CVE-2021-31362, CVE-2023-44194, CVE-2023-28979, CVE-2022-22246, CVE-2022-22244, CVE-2023-28962, CVE-2014-3816, CVE-2013-4689, CVE-2022-22241, CVE-2014-2714, CVE-2022-22238, CVE-2022-22162, CVE-2023-44186, CVE-2014-2713, CVE-2024-21594, CVE-2022-22197, CVE-2013-6618, CVE-2022-22243, CVE-2023-36842, CVE-2023-28963, CVE-2023-44182, CVE-2004-0230, CVE-2022-22163, CVE-2023-22395, CVE-2023-44185, CVE-2023-36839, CVE-2023-36840, CVE-2023-44176, CVE-2019-0036, CVE-2022-22214, CVE-2023-44175, CVE-2023-4481, CVE-2022-22173, CVE-2023-22407, CVE-2023-28975, CVE-2013-6014, CVE-2023-22391
heuristics/scheme_data None
  • product: Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5
  • id: CCEVS-VR-VID10517
  • url: https://www.niap-ccevs.org/product/10517
  • certification_date: 2014-03-07T00:03:00Z
  • expiration_date: 2016-05-29T00:00:00Z
  • category: Network Device, Network Switch, Router
  • vendor: Juniper Networks, Inc.
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • scheme: US
pdf_data/report_filename 383-4-227 CR v1.0e.pdf st_vid10517-vr.pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-227-CR
    • cert_lab: CANADA
  • US:
    • cert_id: CCEVS-VR-VID10517-2014
    • cert_item: Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T- Series Core Routers and EX-Series Ethernet Switches running Junos 12.1R3.5
    • cert_lab: US NIAP
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 2
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-227-CR: 1
  • US:
    • CCEVS-VR-VID10517-2014: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 2
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.3: 2
  • ALC_CMC.1: 1
  • ALC_CMS.1: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3+: 2
    • EAL 3: 4
    • EAL 3 augmented: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • SSH:
    • SSH: 8
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/crypto_protocol/SSH/SSH 3 8
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 7
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 46866
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /Author: rbharland
  • /CreationDate: D:20121023105315-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20121023105315-04'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: Microsoft Word - 383-4-227 CR v1.0e.doc
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 119090
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author: Leidos
  • /Company: Leidos
  • /CreationDate: D:20140310131529-04'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /ModDate: D:20140310131543-04'00'
  • /Producer: Adobe PDF Library 10.0
  • /SourceModified: D:20140310171504
  • /Subject: Juniper Junos NDPP
  • /Title: Validation Report
  • /_NewReviewCycle:
  • pdf_hyperlinks:
pdf_data/report_metadata//Author rbharland Leidos
pdf_data/report_metadata//CreationDate D:20121023105315-04'00' D:20140310131529-04'00'
pdf_data/report_metadata//Creator PScript5.dll Version 5.2.2 Acrobat PDFMaker 10.1 for Word
pdf_data/report_metadata//ModDate D:20121023105315-04'00' D:20140310131543-04'00'
pdf_data/report_metadata//Producer Acrobat Distiller 9.0.0 (Windows) Adobe PDF Library 10.0
pdf_data/report_metadata//Title Microsoft Word - 383-4-227 CR v1.0e.doc Validation Report
pdf_data/report_metadata/pdf_file_size_bytes 46866 119090
pdf_data/report_metadata/pdf_number_of_pages 13 21
pdf_data/st_filename 11.4_ST_1.0.pdf st_vid10517-st.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 3
    • ECC:
      • ECC: 7
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
pdf_data/st_keywords/cc_claims/A
  • A.LOCATE: 4
  • A.NOEVIL: 3
  • A.EAUTH: 2
  • A.TIME: 4
  • A.CRYPTO: 4
  • A.NWCOMP: 2
  • A.NO_GENERAL_PURPOSE: 1
  • A.PHYSICAL: 1
  • A.TRUSTED_ADMIN: 1
pdf_data/st_keywords/cc_claims/O
  • O.FLOW: 11
  • O.PROTECT: 15
  • O.EADMIN: 8
  • O.ACCESS: 14
  • O.ROLBAK: 6
  • O.AUDIT: 13
  • O.CONN: 6
  • O.PROTECTED_COMMUNICATIONS: 1
  • O.VERIFIABLE_UPDATES: 1
  • O.SYSTEM_MONITORING: 1
  • O.DISPLAY_BANNER: 1
  • O.TOE_ADMINISTRATION: 1
  • O.RESIDUAL_INFORMATION_CLEARING: 1
  • O.SESSION_LOCK: 1
  • O.TSF_SELF_TEST: 1
pdf_data/st_keywords/cc_claims/OE
  • OE.EAUTH: 3
  • OE.TIME: 3
  • OE.CRYPTO: 3
  • OE.PHYSICAL: 3
  • OE.ADMIN: 3
  • OE.NWCOMP: 3
  • OE.NO_GENERAL_PURPOSE: 1
  • OE.PHYSICAL: 1
  • OE.TRUSTED_ADMIN: 1
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL 3 1
pdf_data/st_keywords/cc_claims/T
  • T.ROUTE: 9
  • T.PRIVIL: 7
  • T.OPS: 8
  • T.MANDAT: 3
  • T.CONFLOSS: 5
  • T.NOAUDIT: 2
  • T.ADMIN_ERROR: 1
  • T.TSF_FAILURE: 1
  • T.UNDETECTED_ACTIONS: 1
  • T.UNAUTHORIZED_ACCESS: 1
  • T.UNAUTHORIZED_UPDATE: 1
  • T.USER_DATA_REUSE: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 1
  • ADV_FSP.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.3: 7
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
  • ALC_CMC.1: 1
  • ALC_CMS.1: 1
pdf_data/st_keywords/cc_sar/ASE
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_OBJ.1: 1
  • ASE_ECD.1: 1
  • ASE_REQ.1: 1
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_IND.1: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 1
  • AVA_VAN.1: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 5
    • EAL3 augmented: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_ARP.1: 6
    • FAU_SAR.1: 5
    • FAU_GEN.2: 5
    • FAU_SAA.1: 5
    • FAU_STG.1: 5
    • FAU_ARP.1.1: 1
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FDP:
    • FDP_IFC.1: 5
    • FDP_IFF.1: 6
    • FDP_ROL.1: 5
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
  • FIA:
    • FIA_ATD.1: 5
    • FIA_SOS.1: 5
    • FIA_UAU.2: 8
    • FIA_UAU.5: 5
    • FIA_UID.2: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UAU.1: 2
    • FIA_UID.2.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_SMF.1: 7
    • FMT_MSA.3: 10
    • FMT_MTD.1: 7
    • FMT_MOF: 10
    • FMT_MTD: 32
    • FMT_SMR.1: 5
    • FMT_MOF.1: 2
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.1: 3
  • FPT:
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_TSE.1: 5
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_GEN.1: 8
    • FAU_GEN.2: 5
    • FAU_STG_EXT.1: 5
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT.1.1: 1
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM_EXT.4: 10
    • FCS_COP.1: 20
    • FCS_RBG_EXT.1: 4
    • FCS_SSH_EXT.1: 6
    • FCS_CKM.1.1: 2
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 6
  • FDP:
    • FDP_RIP.2: 5
    • FDP_RIP.2.1: 1
    • FDP_ITC.1: 6
    • FDP_ITC.2: 5
  • FIA:
    • FIA_PMG_EXT.1: 7
    • FIA_UIA_EXT.1: 8
    • FIA_UAU_EXT.2: 7
    • FIA_UAU.7: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 3
    • FIA_UIA_EXT: 1
    • FIA_UAU.1: 1
  • FMT:
    • FMT_MTD.1: 5
    • FMT_SMF.1: 6
    • FMT_SMR.2: 5
    • FMT_SMR.1: 2
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_SKP_EXT.1: 5
    • FPT_APW_EXT.1.1: 3
    • FPT_STM.1: 7
    • FPT_TUD_EXT.1: 4
    • FPT_TST_EXT.1: 5
    • FPT_SKP_EXT.1.1: 1
    • FPT_APW_EXT.1: 3
    • FPT_APW_EXT.1.2: 1
    • FPT_STM.1.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TST_EXT.1.1: 1
    • FPT_TRP.1: 1
  • FTA:
    • FTA_EXT_SSL.1: 2
    • FTA_SSL.3: 5
    • FTA_SSL.4: 4
    • FTA_TAB.1: 6
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 2
    • FTA_SSL.3.1: 1
    • FTA_SSL_EXT.4: 1
    • FTA_SSL.4.1: 1
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_TRP.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN.1: 6
  • FAU_ARP.1: 6
  • FAU_SAR.1: 5
  • FAU_GEN.2: 5
  • FAU_SAA.1: 5
  • FAU_STG.1: 5
  • FAU_ARP.1.1: 1
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAA.1.1: 1
  • FAU_SAA.1.2: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_GEN.1: 8
  • FAU_GEN.2: 5
  • FAU_STG_EXT.1: 5
  • FAU_GEN.1.1: 2
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_STG_EXT.1.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 6 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 1 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_IFC.1: 5
  • FDP_IFF.1: 6
  • FDP_ROL.1: 5
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_ROL.1.1: 1
  • FDP_ROL.1.2: 1
  • FDP_RIP.2: 5
  • FDP_RIP.2.1: 1
  • FDP_ITC.1: 6
  • FDP_ITC.2: 5
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_ATD.1: 5
  • FIA_SOS.1: 5
  • FIA_UAU.2: 8
  • FIA_UAU.5: 5
  • FIA_UID.2: 7
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UAU.1: 2
  • FIA_UID.2.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UID.1: 1
  • FIA_PMG_EXT.1: 7
  • FIA_UIA_EXT.1: 8
  • FIA_UAU_EXT.2: 7
  • FIA_UAU.7: 4
  • FIA_PMG_EXT.1.1: 1
  • FIA_UIA_EXT.1.1: 1
  • FIA_UIA_EXT.1.2: 1
  • FIA_UAU_EXT.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1: 3
  • FIA_UIA_EXT: 1
  • FIA_UAU.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 1 3
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMF.1: 7
  • FMT_MSA.3: 10
  • FMT_MTD.1: 7
  • FMT_MOF: 10
  • FMT_MTD: 32
  • FMT_SMR.1: 5
  • FMT_MOF.1: 2
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.1: 3
  • FMT_MTD.1: 5
  • FMT_SMF.1: 6
  • FMT_SMR.2: 5
  • FMT_SMR.1: 2
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.2.1: 1
  • FMT_SMR.2.2: 1
  • FMT_SMR.2.3: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 7 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 7 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 5 2
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 5
  • FPT_STM.1.1: 1
  • FPT_SKP_EXT.1: 5
  • FPT_APW_EXT.1.1: 3
  • FPT_STM.1: 7
  • FPT_TUD_EXT.1: 4
  • FPT_TST_EXT.1: 5
  • FPT_SKP_EXT.1.1: 1
  • FPT_APW_EXT.1: 3
  • FPT_APW_EXT.1.2: 1
  • FPT_STM.1.1: 1
  • FPT_TUD_EXT.1.1: 1
  • FPT_TUD_EXT.1.2: 1
  • FPT_TUD_EXT.1.3: 1
  • FPT_TST_EXT.1.1: 1
  • FPT_TRP.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 5 7
pdf_data/st_keywords/cc_sfr/FTA
  • FTA_TSE.1: 5
  • FTA_TSE.1.1: 1
  • FTA_EXT_SSL.1: 2
  • FTA_SSL.3: 5
  • FTA_SSL.4: 4
  • FTA_TAB.1: 6
  • FTA_SSL_EXT.1: 2
  • FTA_SSL_EXT.1.1: 2
  • FTA_SSL.3.1: 1
  • FTA_SSL_EXT.4: 1
  • FTA_SSL.4.1: 1
  • FTA_TAB.1.1: 1
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 3
  • which are out of scope), and SSH (which is provided by the operational environment: 1
  • perspective. 4 The lower layers of the PFE which simply deal with physical interfaces mechanics are out of scope. Security Target for Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal: 1
  • This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be: 1
  • accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: All: 1
  • out of scope: 2
  • SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
  • Line Card network interface components) which simply deal with physical interfaces mechanics are out of scope. Security Target Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge: 1
  • including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
pdf_data/st_keywords/certification_process/OutOfScope/out of scope 3 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CCM:
    • CCM: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 13
  • TLS:
    • SSL:
      • SSL: 2
  • SSH:
    • SSH: 46
  • TLS:
    • SSL:
      • SSL: 3
  • IKE:
    • IKE: 2
  • IPsec:
    • IPsec: 4
  • VPN:
    • VPN: 1
pdf_data/st_keywords/crypto_protocol/SSH/SSH 13 46
pdf_data/st_keywords/crypto_protocol/TLS/SSL/SSL 2 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KEX:
    • Key exchange: 1
    • Key Exchange: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 2
    • SHA2:
      • SHA-256: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 6
    • RBG: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS PUB 197: 1
    • FIPS PUB 186-2: 1
    • FIPS140: 1
    • FIPS197: 1
  • NIST:
    • NIST SP 800-38A: 1
  • RFC:
    • RFC 4253: 2
    • RFC 4741: 1
    • RFC4253: 2
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4254: 1
    • RFC2451: 1
    • RFC 2451: 1
    • RFC2409: 1
    • RFC 2409: 1
    • RFC2406: 1
    • RFC 2406: 1
    • RFC2404: 1
    • RFC 2404: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • TDEA: 1
  • constructions:
    • MAC:
      • HMAC: 4
pdf_data/st_metadata
  • pdf_file_size_bytes: 797777
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 39
  • /Title: JUNOS 11.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches
  • /Author: Juniper
  • /Subject: EAL3 Security Target
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20121001140620+01'00'
  • /ModDate: D:20121001140620+01'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 529913
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 49
  • /Author: ISL-netbook
  • /CreationDate: D:20140513092401+01'00'
  • /Creator: PDFCreator Version 1.7.2
  • /Keywords:
  • /ModDate: D:20140603093259-04'00'
  • /Producer: GPL Ghostscript 9.10
  • /Subject:
  • /Title: [ST] juniper-junos-12 1R3.6-stv1.7 (140512) - clean
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Juniper ISL-netbook
pdf_data/st_metadata//CreationDate D:20121001140620+01'00' D:20140513092401+01'00'
pdf_data/st_metadata//Creator Microsoft® Word 2010 PDFCreator Version 1.7.2
pdf_data/st_metadata//ModDate D:20121001140620+01'00' D:20140603093259-04'00'
pdf_data/st_metadata//Producer Microsoft® Word 2010 GPL Ghostscript 9.10
pdf_data/st_metadata//Subject EAL3 Security Target
pdf_data/st_metadata//Title JUNOS 11.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches [ST] juniper-junos-12 1R3.6-stv1.7 (140512) - clean
pdf_data/st_metadata/pdf_file_size_bytes 797777 529913
pdf_data/st_metadata/pdf_number_of_pages 39 49
dgst 86a9c759d0c212a7 c99465e61767d10a