name |
STARCOS 3.4 ID Tachograph version C2 |
Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
NL |
US |
status |
active |
archived |
not_valid_after |
02.09.2025 |
07.05.2016 |
not_valid_before |
02.09.2010 |
07.03.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification_Report_NSCIB-CC-09-11192-CR2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/GDM_STA34_TACHO_ASE_Lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-st.pdf |
manufacturer |
G+D Mobile Security GmbH |
Juniper Networks, Inc. |
manufacturer_web |
https://www.gi-de.com/de/de/mobile-security/ |
https://www.juniper.net/ |
security_level |
ADV_IMP.2, EAL4+, ALC_DVS.2, AVA_VAN.5 |
{} |
dgst |
8e597216ef8fc1a9 |
c99465e61767d10a |
heuristics/cert_id |
NSCIB-CC-09-11192-CR2 |
CCEVS-VR-VID-10517-2014 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
cpe:2.3:o:juniper:junos:12.1:r11:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2023-28975, CVE-2013-4689, CVE-2024-39555, CVE-2022-22242, CVE-2023-36840, CVE-2014-3818, CVE-2022-22214, CVE-2022-22244, CVE-2019-0036, CVE-2024-39549, CVE-2022-22208, CVE-2024-30380, CVE-2021-31372, CVE-2024-39511, CVE-2023-28962, CVE-2024-39558, CVE-2023-36841, CVE-2013-6618, CVE-2024-39514, CVE-2023-44182, CVE-2023-28979, CVE-2022-22241, CVE-2023-44175, CVE-2023-44184, CVE-2022-22243, CVE-2013-4686, CVE-2023-22406, CVE-2023-44186, CVE-2023-36839, CVE-2022-22224, CVE-2022-22238, CVE-2014-2712, CVE-2023-28964, CVE-2023-44177, CVE-2022-22181, CVE-2022-22163, CVE-2022-22162, CVE-2024-39556, CVE-2023-28963, CVE-2004-0230, CVE-2023-36842, CVE-2004-0468, CVE-2023-44194, CVE-2023-44197, CVE-2023-44201, CVE-2022-22220, CVE-2013-6014, CVE-2024-21591, CVE-2024-39517, CVE-2024-21594, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2014-2713, CVE-2014-2711, CVE-2021-31362, CVE-2023-44176, CVE-2014-3819, CVE-2022-22245, CVE-2014-3816, CVE-2022-22197, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2022-22246, CVE-2023-22395, CVE-2023-36843, CVE-2023-44185, CVE-2014-2714, CVE-2023-22391, CVE-2014-6380, CVE-2014-6379 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.2, ATE_COV.2, ALC_TAT.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ADV_TDS.3, AVA_VLA.4, ADV_FSP.4, ATE_IND.2, ADV_SPM.1, AVA_MSU.3 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
3.4 |
12.1, 3.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2009/24 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2009/24, ANSSI-CC-2008/10, ANSSI-CC-2009/22, ANSSI-CC-2009/10 |
{} |
heuristics/scheme_data |
|
- category: Network Device, Network Switch, Router
- certification_date: 07.03.2014
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 29.05.2016
- id: CCEVS-VR-VID10517
- product: Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5
- scheme: US
- url: https://www.niap-ccevs.org/product/10517
- vendor: Juniper Networks, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
ac9abe3d5c5a31f0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
Certification_Report_NSCIB-CC-09-11192-CR2.pdf |
st_vid10517-vr.pdf |
pdf_data/report_frontpage |
|
- NL:
- US:
- cert_id: CCEVS-VR-VID10517-2014
- cert_item: Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T- Series Core Routers and EX-Series Ethernet Switches running Junos 12.1R3.5
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- NL:
- NSCIB-09-11192: 1
- NSCIB-CC-09-11192: 3
- NSCIB-CC-09-11192-CR: 1
- NSCIB-CC-09-11192-CR2: 16
|
- US:
- CCEVS-VR-VID10517-2014: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 4+: 1
- EAL4: 1
- EAL5+: 1
- EAL7: 1
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.4: 1
- ADV_IMP.2: 3
- ADV_TDS: 2
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.5: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS.2: 3
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- GD:
- G&D: 2
- Giesecke & Devrient: 5
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
- ATMEL:
- ATMEL AT90SC24036RCU: 3
- ATMEL ATV4/ATV4: 1
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20100903105626+02'00'
- /Creator: pdfFactory Pro www.pdffactory.com
- /Producer: pdfFactory Pro 3.22 (Windows XP Professional Dutch)
- /Title: Certification Report NSCIB-CC-09-11192-CR2.pdf
- pdf_file_size_bytes: 195336
- pdf_hyperlinks: http://www.commoncriteriaportal.org, mailto:[email protected]
- pdf_is_encrypted: True
- pdf_number_of_pages: 17
|
- /Author: Leidos
- /Company: Leidos
- /CreationDate: D:20140310131529-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /ModDate: D:20140310131543-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140310171504
- /Subject: Juniper Junos NDPP
- /Title: Validation Report
- /_NewReviewCycle:
- pdf_file_size_bytes: 119090
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
GDM_STA34_TACHO_ASE_Lite.pdf |
st_vid10517-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4+: 1
- EAL 5: 2
- EAL4: 10
- EAL4 augmented: 5
- EAL5: 2
- EAL5+: 2
- ITSEC:
|
|
pdf_data/st_keywords/cc_sar |
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 2
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADO_IGS.2: 2
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.2: 12
- ADV_SPM.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.5: 2
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 2
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 3
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.3: 1
- AVA_VAN.5: 11
- AVA_VLA.4: 4
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_DAU.1.1: 4
- FAU_GEN.1: 3
- FAU_SAA.1: 4
- FAU_SAA.1.1: 3
- FAU_SAA.1.2: 1
- FCO:
- FCO_NRO: 1
- FCO_NRO.1: 3
- FCO_NRO.1.1: 3
- FCO_NRO.1.2: 1
- FCO_NRO.1.3: 3
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 11
- FCS_CKM.1.1: 3
- FCS_CKM.2: 5
- FCS_CKM.2.1: 4
- FCS_CKM.4: 9
- FCS_CKM.4.1: 5
- FCS_COP: 1
- FCS_COP.1: 10
- FCS_COP.1.1: 8
- FCS_RND.1: 3
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 4
- FDP_ACC.2: 5
- FDP_ACC.2.1: 5
- FDP_ACC.2.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 4
- FDP_ACF.1.1: 6
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 2
- FDP_DAU.1: 4
- FDP_DAU.1.2: 3
- FDP_ETC: 1
- FDP_ETC.1: 2
- FDP_ETC.1.1: 4
- FDP_ETC.1.2: 1
- FDP_ETC.2: 4
- FDP_ETC.2.1: 4
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 3
- FDP_ETC.2.4: 2
- FDP_IFC.1: 5
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.1.1: 5
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 4
- FDP_ITC.2: 1
- FDP_RIP: 1
- FDP_RIP.1: 2
- FDP_RIP.1.1: 4
- FDP_SDI: 1
- FDP_SDI.2: 2
- FDP_SDI.2.1: 4
- FDP_SDI.2.2: 2
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 2
- FIA_AFL.1.1: 5
- FIA_AFL.1.2: 3
- FIA_ATD: 1
- FIA_ATD.1: 3
- FIA_ATD.1.1: 4
- FIA_UAU: 1
- FIA_UAU.1: 3
- FIA_UAU.1.1: 4
- FIA_UAU.1.2: 1
- FIA_UAU.3: 2
- FIA_UAU.3.1: 4
- FIA_UAU.3.2: 2
- FIA_UAU.4: 2
- FIA_UAU.4.1: 4
- FIA_UID: 2
- FIA_UID.1: 5
- FIA_UID.1.1: 4
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 2
- FIA_USB.1.1: 4
- FIA_USB.1.2: 2
- FIA_USB.1.3: 4
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 2
- FMT_MOF.1.1: 4
- FMT_MSA: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 4
- FMT_MSA.2: 6
- FMT_MSA.2.1: 1
- FMT_MSA.3: 3
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 4
- FMT_SMF.1: 4
- FMT_SMR: 1
- FMT_SMR.1: 6
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 1
- FPR_UNO.1: 2
- FPR_UNO.1.1: 4
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 9
- FPT_FLS.1.1: 4
- FPT_PHP: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 4
- FPT_TDC: 2
- FPT_TDC.1: 1
- FPT_TDC.1.1: 4
- FPT_TDC.1.2: 2
- FPT_TST: 2
- FPT_TST.1: 3
- FPT_TST.1.1: 4
- FPT_TST.1.2: 2
- FPT_TST.1.3: 3
- FRU:
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 3
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 3
- FTP_ITC.1.3: 3
|
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 2
- FCS_CKM.2: 1
- FCS_CKM.4: 6
- FCS_CKM_EXT.4: 10
- FCS_COP.1: 20
- FCS_COP.1.1: 4
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT.1: 6
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FDP:
- FDP_ITC.1: 6
- FDP_ITC.2: 5
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT.1: 7
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 7
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 1
- FIA_UIA_EXT.1: 8
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 3
- FMT:
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 3
- FPT_APW_EXT.1.1: 3
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TRP.1: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_EXT_SSL.1: 2
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 2
- FTA_SSL_EXT.1.1: 2
- FTA_SSL_EXT.4: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.CLON: 1
- O.DEV: 1
- O.DEV_DIS_ES: 4
- O.DLV_AUDIT: 1
- O.DLV_DATA: 1
- O.DLV_PROTECT: 1
- O.DLV_RESP: 1
- O.FLAW: 1
- O.INIT_ACS: 3
- O.MOD_MEMORY: 1
- O.OPERATE: 1
- O.RND: 1
- O.SOFT_DLV: 3
- O.TAMPER_ES: 2
- O.TEST_OPERATE: 1
- O.USE_DIAG: 1
- OT:
- OT.PERSONALIZATION: 1
- OT.TAMPER_ES: 13
- T:
- T.CLON: 2
- T.DIS_DEL: 2
- T.DIS_INFO: 2
- T.DIS_TEST_ES: 1
- T.MOD: 1
- T.MOD_DEL: 2
- T.MOD_EXE: 4
- T.MOD_LOAD: 4
- T.MOD_SHARE: 4
- T.MOD_SOFT: 2
- T.RND: 1
- T.T: 2
- T.T_CMD: 4
- T.T_ES: 4
- T.T_TOOLS: 1
|
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.DISPLAY_BANNER: 1
- O.PROTECTED_COMMUNICATIONS: 1
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 3
- Key exchange: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 2
- side channel: 1
- timing attacks: 1
- other:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- ISO:
- ISO/IEC 7816-8: 1
- ISO/IEC 9796-2: 1
- ISO/IEC 9798-3: 2
- PKCS:
- RFC:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS140: 1
- FIPS197: 1
- NIST:
- RFC:
- RFC 2404: 1
- RFC 2406: 1
- RFC 2409: 1
- RFC 2451: 1
- RFC 4251: 2
- RFC 4252: 1
- RFC 4253: 2
- RFC 4254: 1
- RFC 4741: 1
- RFC2404: 1
- RFC2406: 1
- RFC2409: 1
- RFC2451: 1
- RFC4253: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Line Card network interface components) which simply deal with physical interfaces mechanics are out of scope. Security Target Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge: 1
- SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
- including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: CSRD22/stut
- /Comments: Open
- /Company: GuD
- /CreationDate: D:20100629134954+02'00'
- /Creator: Acrobat PDFMaker 7.0 für Word
- /Keywords: Version 2.0 / Status 29.06.2010
- /ModDate: D:20100629134956+02'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Subject: Security Target Lite STARCOS 3.4 ID Tachograph C2
- /Title: Security Target Lite STARCOS 3.4 ID Tachograph C2
- pdf_file_size_bytes: 475709
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 70
|
- /Author: ISL-netbook
- /CreationDate: D:20140513092401+01'00'
- /Creator: PDFCreator Version 1.7.2
- /Keywords:
- /ModDate: D:20140603093259-04'00'
- /Producer: GPL Ghostscript 9.10
- /Subject:
- /Title: [ST] juniper-junos-12 1R3.6-stv1.7 (140512) - clean
- pdf_file_size_bytes: 529913
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 49
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |