Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches
383-4-188
Log Radar v3.2.15 with modules Console, Collector and Archiver
ISCB-5-RPT-C010-CR-v1a
name Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches Log Radar v3.2.15 with modules Console, Collector and Archiver
category Network and Network-Related Devices and Systems Detection Devices and Systems
scheme CA MY
not_valid_after 19.04.2018 01.09.2019
not_valid_before 10.08.2012 13.02.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20CR%20v1.0e.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C010-CR-v1a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20ST%20v2.2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LogRadar_ST-Document_v1-0R.pdf
manufacturer HPE Juniper Networking TecForte Sdn Bhd
manufacturer_web https://www.juniper.net/ https://www.tecforte.com
security_level ALC_FLR.3, EAL3+ EAL2
dgst 8e96ae99530fca1d 5e01e4eeaa77cb17
heuristics/cert_id 383-4-188 ISCB-5-RPT-C010-CR-v1a
heuristics/cert_lab CANADA []
heuristics/extracted_sars ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 10.4 3.2.15
heuristics/scheme_data
  • cert_no: 2013-002-C010
  • certification_date: 13.02.2013
  • developer: TecForte Sdn Bhd
  • enhanced:
    • assurance_level: EAL2
    • category: Detection Devices and Systems
    • cert_id: C010
    • certification_date: 13.02.2013
    • developer: Leong Wei Khuan Level 27, Quill 7,Jalan Stesen Sentral 5,Kuala Lumpur Sentral,50470 Kuala Lumpur,MALAYSIA. URL: http://www.tecforte.comEmail: [email protected]: +603 2776 6936Fax: +603 2776 6999
    • expiration_date: 13.02.2018
    • mutual_recognition: CCRA
    • product: Log Radar v3.2.15 with modules Console, Collector and Archiver
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C010/ISCB-5-RPT-C010-CR-v1a.pdf
    • scope: The Target of Evaluation (TOE) is Log Radar v3.2.15 with modules Console, Collector and Archiver; commonly referred as LogRadar. LogRadar is an automated software system used on enterprise data networks to centralise the storage and interpretation of logs, or events, generated by other devices or applications. Its key aims are to collect, normalise process and manage such information (logs) from a real time context. The modules included in the scope of the security evaluation and certification are: Console - acts as the interfacing point between user and TOE, Collector - its core function is to collect streams of data as and when they occur and process these device specific logs into a common and normalised form, and Archiver - functions as a backup daemon. In the context of the evaluation, the TOE is expected to provide the following major security features: Identification and authentication – the TOE provides user identification and authentication independent from the operating system on which it operates on. Security audit – the TOE records each individual user session and tracks each action within the session. Granular access control – the TOE allows users access permission within the application to be dynamically and granularly assigned via users and group memberships. Password management – the TOE provides a full password management function including the management of password policy rules as well as password expiry settings. Sessions management – the TOE maintain session management and restricts a single login for only a single valid session. Socket layer – the TOE runs on Secure Socket Layer (SSL) to protect its data when travelling thru the network. Import and export of configuration data – the TOE runs on Secure Socket Layer (SSL) to protect its data when travelling thru the network. Automated archive – the TOE provides a mechanism where the auto archival of aggregated reports, rawlogs and syslogs will be automatically hashed with MD-5 checksum, archived with AES encryption and stored at predetermined times. Real time syslog collection – the TOE provides the ability for authorised users to dynamically configure the TOE to listen to syslog streams from network devices, servers and/or any other supported applications.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C010/LogRadar_ST-Document_v1-0R.pdf
    • type: Automated software system used on enterprise data networks to centralise the storage and interpretation of logs, or events, generated by other devices or applications.
  • expiration_date: 13.02.2018
  • level: EAL2
  • product: Log Radar v3.2.15 with modules Console, Collector and Archiver
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/80
pdf_data/report_filename 383-4-188 CR v1.0e.pdf ISCB-5-RPT-C010-CR-v1a.pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-188-CR
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-188-CR: 1
  • MY:
    • ISCB-5-RPT-C010-CR-v1a: 31
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 4
    • EAL 3 augmented: 2
    • EAL 3+: 2
    • EAL3+: 1
  • EAL:
    • EAL2: 12
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 4
  • VPN:
    • VPN: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_metadata
  • /Author: User
  • /CCEF: CGI IT Security Evaluation & Test Facility
  • /CR date: 10 August 2012
  • /CR version: 1.0
  • /Certificate date: 10 August 2012
  • /CreationDate: D:20120810083649-04'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /Developer name: Juniper Networks, Inc.
  • /Document number: 383-4-188-CR
  • /ETR title, version, date: Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5 Common Criteria EAL3+ Evaluation Technical Report (ETR), Document Version 1.2,
  • /Evaluation completion date: 30 July 2012
  • /ModDate: D:20120810083654-04'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /ST Title: Juniper Networks Security Target for Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5
  • /ST date: 11 July 2012
  • /ST version: Version 2.2
  • /SourceModified: D:20120809122721
  • /Sponsor: Juniper Networks, Inc.
  • /TOE Version: 5.0
  • /TOE name and version: Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches
  • /TOE short name: JUNOS® 10.4R5
  • /Title: EAL 3 Evaluation of <TOE name and version>
  • pdf_file_size_bytes: 64990
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /Author: Norhazimah Abdul Malek
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20130218150743+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: TecForte Sdn Bhd
  • /Document Type: REPORT
  • /Identifier: ISCB-5-RPT-C010-CR-v1a
  • /Index: ISCB_TMP_011
  • /Keywords: Log Radar v3.2.15
  • /ModDate: D:20130218150748+08'00'
  • /Phase: External
  • /Producer: Adobe PDF Library 10.0
  • /Released: 13 February 2013
  • /ST: LogRadar Security Target
  • /ST Version: v1.0R
  • /SourceModified: D:20130218070717
  • /Sponsor: TecForte Sdn Bhd
  • /Subject: Log Radar v3.2.15 with modules Console, Collector and Archiver
  • /TOE: Log Radar
  • /TOE Name: LogRadar
  • /TOE Version: v3.2.15
  • /Title: C010 Certification Report
  • /Version: v1a
  • pdf_file_size_bytes: 476755
  • pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 31
pdf_data/st_filename 383-4-188 ST v2.2.pdf LogRadar_ST-Document_v1-0R.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 5
    • EAL3 augmented: 4
  • EAL:
    • EAL 2: 1
    • EAL2: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 7
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 6
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAA.1: 5
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 5
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FDP:
    • FDP_IFC.1: 5
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ROL.1: 5
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
  • FIA:
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 1
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 10
    • FMT_MOF.1: 2
    • FMT_MSA.1: 3
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 32
    • FMT_MTD.1: 7
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 5
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_TSE.1: 5
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_GEN.3: 15
    • FAU_GEN.3.1: 1
    • FAU_GEN.3.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_COP.1: 23
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 14
    • FDP_ACC.2: 8
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 2
    • FDP_ACF.1: 10
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 9
    • FDP_IFC.1.1: 1
    • FDP_IFC.2: 1
    • FDP_IFF: 2
    • FDP_IFF.1: 9
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 8
    • FIA_UAU: 1
    • FIA_UAU.1: 5
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 2
    • FMT_MSA: 3
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_REV: 2
    • FMT_REV.1: 6
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SAE: 1
    • FMT_SAE.1: 6
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
    • FMT_SMT: 1
  • FPT:
    • FPT_ETC: 4
    • FPT_ETC.2: 8
    • FPT_ETC.2.1: 1
    • FPT_ETC.2.2: 1
    • FPT_ETC.2.3: 1
    • FPT_ETC.2.4: 2
    • FPT_FMT: 1
    • FPT_ITC: 2
    • FPT_ITC.2: 8
    • FPT_ITC.2.1: 1
    • FPT_ITC.2.2: 1
    • FPT_ITC.2.3: 1
    • FPT_ITC.2.4: 1
    • FPT_ITC.2.5: 2
    • FPT_STM.1: 7
    • FPT_TDC: 1
  • FRU:
    • FRU_RSA: 1
    • FRU_RSA.1: 8
    • FRU_RSA.1.1: 1
    • FRU_SRA.1: 1
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_TRP: 1
    • FTP_TRP.1: 10
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CRYPTO: 4
    • A.EAUTH: 2
    • A.LOCATE: 4
    • A.NOEVIL: 3
    • A.NWCOMP: 2
    • A.TIME: 4
  • O:
    • O.ACCESS: 14
    • O.AUDIT: 13
    • O.CONN: 6
    • O.EADMIN: 8
    • O.FLOW: 11
    • O.PROTECT: 15
    • O.ROLBAK: 6
  • OE:
    • OE.ADMIN: 3
    • OE.CRYPTO: 3
    • OE.EAUTH: 3
    • OE.NWCOMP: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 3
  • T:
    • T.CONFLOSS: 5
    • T.MANDAT: 3
    • T.NOAUDIT: 2
    • T.OPS: 8
    • T.PRIVIL: 7
    • T.ROUTE: 9
  • A:
    • A.DIRECT: 2
    • A.INTEGR: 3
    • A.LOCATE: 3
    • A.MANAGE: 2
    • A.NOEVIL: 3
    • A.NOTRST: 2
    • A.PROTCT: 2
    • A.REM_OPER: 1
    • A.TIME: 6
  • O:
    • O.ACCESS: 19
    • O.AUDITS: 7
    • O.EADMIN: 12
    • O.EXPORT: 10
    • O.IDAUTH: 29
    • O.INTEGR: 6
    • O.PROTCT: 9
    • O.SECRMT: 2
    • O.TMSTMP: 2
  • OE:
    • OE.INSTAL: 4
    • OE.INSTALL: 1
    • OE.INTEGR: 5
    • OE.OFLOWS: 5
    • OE.PERSON: 7
    • OE.PHYCAL: 7
    • OE.TMSTMP: 6
  • T:
    • T.COMINT: 3
    • T.DLOSS: 5
    • T.IMPCON: 3
    • T.INFLUX: 3
    • T.INSECUSE: 3
    • T.INTEGR: 3
    • T.LOSSOF: 3
    • T.NOHALT: 3
    • T.PRIVIL: 3
    • T.UNATHDVCE: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 11
  • SHA:
    • SHA1:
      • SHA-1: 11
      • SHA1: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 13
  • TLS:
    • SSL:
      • SSL: 2
  • TLS:
    • SSL:
      • SSL: 4
  • VPN:
    • VPN: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • RFC:
    • RFC 1321: 2
    • RFC 3268: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be: 1
    • accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: All: 1
    • out of scope: 2
    • which are out of scope), and SSH (which is provided by the operational environment: 1
pdf_data/st_metadata
  • /Author: Juniper
  • /CreationDate: D:20120725095220-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20120725095220-04'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: EAL3 Security Target
  • /Title: JUNOS 10.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches
  • pdf_file_size_bytes: 817354
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 39
  • /Author: WKhuan
  • /Company:
  • /CreationDate: D:20130115175724+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /ModDate: D:20130115175735+08'00'
  • /Producer: Adobe PDF Library 10.0
  • /SourceModified: D:20130115013704
  • pdf_file_size_bytes: 614209
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 69
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different