name |
BAE Systems STOP™ 8.8.2 |
Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5 |
category |
Operating Systems |
Network and Network-Related Devices and Systems |
scheme |
CA |
US |
status |
active |
archived |
not_valid_after |
15.09.2028 |
07.05.2016 |
not_valid_before |
15.09.2023 |
07.03.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/553-EWA%20CT%20v1.0.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/553-EWA%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/553-EWA%20ST%20v0.24.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-st.pdf |
manufacturer |
BAE Systems |
Juniper Networks, Inc. |
manufacturer_web |
https://www.baesystems.com |
https://www.juniper.net/ |
security_level |
{} |
{} |
dgst |
8a5ef8e5642a483d |
c99465e61767d10a |
heuristics/cert_id |
553-EWA |
CCEVS-VR-VID-10517-2014 |
heuristics/cert_lab |
CANADA |
US |
heuristics/cpe_matches |
{} |
cpe:2.3:o:juniper:junos:12.1:r11:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2023-28975, CVE-2013-4689, CVE-2024-39555, CVE-2022-22242, CVE-2023-36840, CVE-2014-3818, CVE-2022-22214, CVE-2022-22244, CVE-2019-0036, CVE-2024-39549, CVE-2022-22208, CVE-2024-30380, CVE-2021-31372, CVE-2024-39511, CVE-2023-28962, CVE-2024-39558, CVE-2023-36841, CVE-2013-6618, CVE-2024-39514, CVE-2023-44182, CVE-2023-28979, CVE-2022-22241, CVE-2023-44175, CVE-2023-44184, CVE-2022-22243, CVE-2013-4686, CVE-2023-22406, CVE-2023-44186, CVE-2023-36839, CVE-2022-22224, CVE-2022-22238, CVE-2014-2712, CVE-2023-28964, CVE-2023-44177, CVE-2022-22181, CVE-2022-22163, CVE-2022-22162, CVE-2024-39556, CVE-2023-28963, CVE-2004-0230, CVE-2023-36842, CVE-2004-0468, CVE-2023-44194, CVE-2023-44197, CVE-2023-44201, CVE-2022-22220, CVE-2013-6014, CVE-2024-21591, CVE-2024-39517, CVE-2024-21594, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2014-2713, CVE-2014-2711, CVE-2021-31362, CVE-2023-44176, CVE-2014-3819, CVE-2022-22245, CVE-2014-3816, CVE-2022-22197, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2022-22246, CVE-2023-22395, CVE-2023-36843, CVE-2023-44185, CVE-2014-2714, CVE-2023-22391, CVE-2014-6380, CVE-2014-6379 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
8.8.2 |
12.1, 3.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- certification_date: 15.09.2023
- level: PP_OS_V4.2.1
- product: BAE Systems STOP™ 8.8.2
- vendor: BAE Systems
|
- category: Network Device, Network Switch, Router
- certification_date: 07.03.2014
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 29.05.2016
- id: CCEVS-VR-VID10517
- product: Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5
- scheme: US
- url: https://www.niap-ccevs.org/product/10517
- vendor: Juniper Networks, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
e34797b67a3163c5 |
ac9abe3d5c5a31f0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/cert_filename |
553-EWA CT v1.0.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20230925152434-04'00'
- /Creator:
- /Keywords:
- /ModDate: D:20230925152502-05'00'
- /Producer: Foxit PDF Editor Printer Version 12.1.0.15345
- /Subject:
- /Title:
- pdf_file_size_bytes: 364620
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
553-EWA CR v1.0.pdf |
st_vid10517-vr.pdf |
pdf_data/report_frontpage |
- US:
- CA:
- cert_id: 553-EWA
- cert_lab: CANADA
|
- US:
- cert_id: CCEVS-VR-VID10517-2014
- cert_item: Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T- Series Core Routers and EX-Series Ethernet Switches running Junos 12.1R3.5
- cert_lab: US NIAP
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10517-2014: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. The user of the OS is not willfully negligent or hostile and uses the software in: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
|
- /Author: Leidos
- /Company: Leidos
- /CreationDate: D:20140310131529-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /ModDate: D:20140310131543-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140310171504
- /Subject: Juniper Junos NDPP
- /Title: Validation Report
- /_NewReviewCycle:
- pdf_file_size_bytes: 119090
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
553-EWA ST v0.24.pdf |
st_vid10517-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT: 1
- ALC_TSU_EXT.1: 8
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 3
- FCS_CKM_EXT.4.2: 1
- FCS_COP: 1
- FCS_COP.1: 40
- FCS_COP.1.1: 4
- FCS_DTLS_EXT.1: 1
- FCS_RBG_EXT.1: 9
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_STO_EXT.1: 7
- FCS_STO_EXT.1.1: 2
- FCS_TLSC_EXT.1: 8
- FCS_TLSC_EXT.1.1: 3
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FDP:
- FDP_ACF_EXT.1: 7
- FDP_ACF_EXT.1.1: 2
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT.1: 7
- FMT_MOF_EXT.1.1: 2
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 4
- FPT:
- FPT_ACF_EXT.1: 7
- FPT_ACF_EXT.1.1: 2
- FPT_ACF_EXT.1.2: 2
- FPT_ASLR_EXT.1: 7
- FPT_ASLR_EXT.1.1: 2
- FPT_SBOP_EXT.1: 7
- FPT_SBOP_EXT.1.1: 2
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.2: 6
- FPT_TUD_EXT.2.1: 2
- FPT_TUD_EXT.2.2: 2
- FTP:
- FTP_ITC_EXT.1: 11
- FTP_ITC_EXT.1.1: 2
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 2
- FCS_CKM.2: 1
- FCS_CKM.4: 6
- FCS_CKM_EXT.4: 10
- FCS_COP.1: 20
- FCS_COP.1.1: 4
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT.1: 6
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FDP:
- FDP_ITC.1: 6
- FDP_ITC.2: 5
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT.1: 7
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 7
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 1
- FIA_UIA_EXT.1: 8
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 3
- FMT:
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 3
- FPT_APW_EXT.1.1: 3
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TRP.1: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_EXT_SSL.1: 2
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 2
- FTA_SSL_EXT.1.1: 2
- FTA_SSL_EXT.4: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 4
- A.PROPER_: 2
- A.PROPER_ADMIN: 3
- A.PROPER_USER: 2
- O:
- O.ACCOUNTABILITY: 9
- O.INTEGRITY: 7
- O.MANAGEMENT: 9
- O.PROTECTED_: 2
- O.PROTECTED_COMMS: 8
- O.PROTECTED_STORAGE: 4
- OE:
- OE.PLATFORM: 4
- OE.PROPER_ADMIN: 4
- OE.PROPER_USER: 4
- T:
- T.LIMITED_: 1
- T.LIMITED_PHYSICAL_ACCESS: 1
- T.LOCAL_: 1
- T.LOCAL_ATTACK: 2
- T.NETWORK_: 2
- T.NETWORK_ATTACK: 6
- T.NETWORK_EAVESDROP: 3
|
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.DISPLAY_BANNER: 1
- O.PROTECTED_COMMUNICATIONS: 1
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 7
- AES-128: 1
- AES-256: 1
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 2
- DHE: 1
- Diffie-Hellman: 5
- DSA:
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 5
- SHA-512: 4
|
|
pdf_data/st_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 3
- Key exchange: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- PGP:
- SSH:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 38
- TLS 1.2: 2
- TLSv1.2: 1
- VPN:
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 10
- P-521: 8
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 3
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 186-4: 1
- FIPS 197: 1
- FIPS PUB 186-4: 4
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-57: 2
- NIST SP 800-90A: 1
- RFC:
- RFC 3526: 2
- RFC 5246: 12
- RFC 5280: 5
- RFC 5288: 8
- RFC 5289: 24
- RFC 5759: 1
- RFC 6066: 2
- RFC 6125: 2
- RFC 6960: 2
- RFC 6961: 2
- RFC 8603: 2
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS140: 1
- FIPS197: 1
- NIST:
- RFC:
- RFC 2404: 1
- RFC 2406: 1
- RFC 2409: 1
- RFC 2451: 1
- RFC 4251: 2
- RFC 4252: 1
- RFC 4253: 2
- RFC 4254: 1
- RFC 4741: 1
- RFC2404: 1
- RFC2406: 1
- RFC2409: 1
- RFC2451: 1
- RFC4253: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. Objectives: OE.PLATFORM The OS relies on being installed on trusted hardware: 1
- out of scope: 2
|
- OutOfScope:
- Line Card network interface components) which simply deal with physical interfaces mechanics are out of scope. Security Target Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge: 1
- SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
- including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
- out of scope: 2
|
pdf_data/st_metadata |
|
- /Author: ISL-netbook
- /CreationDate: D:20140513092401+01'00'
- /Creator: PDFCreator Version 1.7.2
- /Keywords:
- /ModDate: D:20140603093259-04'00'
- /Producer: GPL Ghostscript 9.10
- /Subject:
- /Title: [ST] juniper-junos-12 1R3.6-stv1.7 (140512) - clean
- pdf_file_size_bytes: 529913
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 49
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |