name |
Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches |
Cisco Unified Wireless Network Solution composed of the following components: Cisco Aironet 1130, 1230, and 1240 AG Series Access Points; Cisco 4400 Series Wireless LAN Controllers; Cisco Catalyst 6500 Series Wireless Integrated Services Module (WiSM); Cisco Wireless Control System (WCS); Cisco Secure Access Control Server (ACS); Cisco 2710 Wireless Location |
category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
CA |
US |
status |
archived |
archived |
not_valid_after |
19.04.2018 |
20.07.2012 |
not_valid_before |
10.08.2012 |
25.03.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20CR%20v1.0e.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10324-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20ST%20v2.2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10324-st.pdf |
manufacturer |
Juniper Networks, Inc. |
Cisco Systems, Inc. |
manufacturer_web |
https://www.juniper.net/ |
https://www.cisco.com |
security_level |
EAL3+, ALC_FLR.3 |
ACM_SCP.1, ALC_FLR.2, AVA_MSU.1, EAL2+ |
dgst |
8e96ae99530fca1d |
c46fedfa2cf2d8a1 |
heuristics/cert_id |
383-4-188 |
CCEVS-VR-VID-10324-2009 |
heuristics/cert_lab |
CANADA |
US |
heuristics/cpe_matches |
cpe:2.3:o:juniper:junos:10.4s:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:* |
cpe:2.3:h:cisco:4400_wireless_lan_controller:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:catalyst_6500:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:1240:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2024-30397, CVE-2019-0036, CVE-2014-0616, CVE-2023-44177, CVE-2022-22197, CVE-2022-22245, CVE-2023-36840, CVE-2022-22224, CVE-2024-39511, CVE-2022-22215, CVE-2024-39514, CVE-2024-39558, CVE-2022-22208, CVE-2022-22241, CVE-2023-44197, CVE-2023-28975, CVE-2023-44182, CVE-2023-36843, CVE-2013-4686, CVE-2013-6014, CVE-2014-0615, CVE-2024-39549, CVE-2023-28962, CVE-2024-39555, CVE-2014-3818, CVE-2023-22406, CVE-2023-22391, CVE-2024-21591, CVE-2021-31362, CVE-2024-39517, CVE-2023-44184, CVE-2022-22162, CVE-2023-22395, CVE-2022-22246, CVE-2023-28964, CVE-2013-6170, CVE-2023-36839, CVE-2004-0230, CVE-2022-22244, CVE-2023-44186, CVE-2023-44201, CVE-2022-22173, CVE-2023-44185, CVE-2022-22242, CVE-2013-7313, CVE-2024-39556, CVE-2023-44178, CVE-2022-22238, CVE-2004-0468, CVE-2024-39528, CVE-2014-2712, CVE-2024-21594, CVE-2023-4481, CVE-2014-2714, CVE-2022-22243, CVE-2023-36842, CVE-2023-36841, CVE-2022-22156, CVE-2022-22214, CVE-2014-0613, CVE-2024-30380, CVE-2013-4689, CVE-2023-44176, CVE-2022-22163, CVE-2023-44175, CVE-2023-22407, CVE-2013-6618, CVE-2023-28979, CVE-2023-44194, CVE-2021-31372, CVE-2022-22220, CVE-2023-28963, CVE-2022-22181 |
CVE-2007-1258, CVE-2013-1235, CVE-2003-1002, CVE-2007-2038, CVE-2007-5134, CVE-2005-4258, CVE-2003-1001, CVE-2007-2041 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMC.3, ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ALC_FLR.3, ALC_DVS.1, ASE_REQ.2, ADV_TDS.2, ALC_CMS.3, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ALC_DEL.1, ADV_FSP.3, ASE_OBJ.2, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_LCD.1 |
ALC_FLR.2, ATE_IND.2, ADV_FSP.1, ATE_HLD.1, ADV_HLD.1, AGD_USR.1, AVA_SOF.1, ATE_FUN.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, ATE_COV.1, AVA_MSU.1, AVA_VLA.1 |
heuristics/extracted_versions |
10.4 |
2710, 6500, 1240, 4400, 1130, 1230 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
383-4-188 CR v1.0e.pdf |
st_vid10324-vr.pdf |
pdf_data/report_frontpage |
- US:
- CA:
- cert_id: 383-4-188-CR
- cert_lab: CANADA
|
- US:
- cert_id: CCEVS-VR-VID10324-2009
- cert_item: Cisco Systems, Inc., 170 West Tasman Dr., San Jose, CA 95134 Cisco Unified Wireless Network & Wireless Intrusion Detection System
- cert_lab: US NIAP
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10324-2009: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 3: 4
- EAL 3 augmented: 2
- EAL 3+: 2
- EAL3+: 1
|
- EAL:
- EAL 2: 8
- EAL 2 augmented: 4
- EAL 4: 1
- EAL2: 2
- EAL2 augmented: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 59
- Cisco Systems: 2
- Cisco Systems, Inc: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: User
- /CCEF: CGI IT Security Evaluation & Test Facility
- /CR date: 10 August 2012
- /CR version: 1.0
- /Certificate date: 10 August 2012
- /CreationDate: D:20120810083649-04'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /Developer name: Juniper Networks, Inc.
- /Document number: 383-4-188-CR
- /ETR title, version, date: Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5 Common Criteria EAL3+ Evaluation Technical Report (ETR), Document Version 1.2,
- /Evaluation completion date: 30 July 2012
- /ModDate: D:20120810083654-04'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /ST Title: Juniper Networks Security Target for Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5
- /ST date: 11 July 2012
- /ST version: Version 2.2
- /SourceModified: D:20120809122721
- /Sponsor: Juniper Networks, Inc.
- /TOE Version: 5.0
- /TOE name and version: Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches
- /TOE short name: JUNOS® 10.4R5
- /Title: EAL 3 Evaluation of <TOE name and version>
- pdf_file_size_bytes: 64990
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /Author: root
- /CreationDate: D:20090410185059
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20090410185059
- /Producer: Microsoft® Office Word 2007
- /Title: Validation Report for WLAN
- pdf_file_size_bytes: 345953
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
383-4-188 ST v2.2.pdf |
st_vid10324-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3: 5
- EAL3 augmented: 4
|
- EAL:
- EAL 4: 1
- EAL2: 11
- EAL2 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 7
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_CAP.2: 5
- ACM_CAP.3: 1
- ACM_SCP: 1
- ACM_SCP.1: 9
- ADO:
- ADO_DEL: 2
- ADO_DEL.1: 3
- ADO_IGS.1: 6
- ADV:
- ADV_FSP.1: 13
- ADV_HLD.1: 6
- ADV_RCR: 3
- ADV_RCR.1: 6
- ADV_SPM.1: 3
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 9
- AGD_USR: 2
- AGD_USR.1: 6
- ALC:
- ATE:
- ATE_COV: 1
- ATE_COV.1: 4
- ATE_FUN: 1
- ATE_FUN.1: 6
- ATE_HLD.1: 1
- ATE_IND.2: 5
- AVA:
- AVA_MSU: 2
- AVA_MSU.1: 7
- AVA_SOF: 1
- AVA_SOF.1: 5
- AVA_VLA: 2
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 6
- FAU_ARP.1.1: 1
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAA.1: 5
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_IFC.1: 5
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ROL.1: 5
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FIA:
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 1
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 10
- FMT_MOF.1: 2
- FMT_MSA.1: 3
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 32
- FMT_MTD.1: 7
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 5
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FTA:
- FTA_TSE.1: 5
- FTA_TSE.1.1: 1
|
- FAU:
- FAU_GEN.1: 31
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 10
- FAU_GEN.2.1: 1
- FAU_GEN_EXP.1: 12
- FAU_GEN_EXP.1.1: 3
- FAU_GEN_EXP.1.2: 1
- FAU_SAR.1: 29
- FAU_SAR.1.1: 3
- FAU_SAR.1.2: 2
- FAU_SAR.2: 23
- FAU_SAR.2.1: 3
- FAU_SAR.3: 16
- FAU_SAR.3.1: 2
- FAU_SEL.1: 11
- FAU_SEL.1.1: 3
- FAU_STG.1: 9
- FAU_STG.1.1: 2
- FAU_STG.1.2: 3
- FAU_STG.3: 8
- FAU_STG.3.1: 1
- FCS:
- FCS_BCM_EXP.1: 13
- FCS_BCM_EXP.1.1: 1
- FCS_BCM_EXP.1.2: 1
- FCS_BCM_EXP.1.3: 1
- FCS_CKM.1: 54
- FCS_CKM.1.1: 3
- FCS_CKM.2: 5
- FCS_CKM.4: 30
- FCS_CKM.4.1: 1
- FCS_CKM_EXP.2: 17
- FCS_CKM_EXP.2.1: 1
- FCS_COP.1: 31
- FCS_COP.1.1: 2
- FCS_COP_EXP.1: 16
- FCS_COP_EXP.1.1: 1
- FCS_COP_EXP.2: 22
- FCS_COP_EXP.2.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_IFC.1: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 2
- FDP_PUD_EXP: 1
- FDP_PUD_EXP.1: 12
- FDP_PUD_EXP.1.1: 2
- FDP_PUP_EXP.1: 1
- FDP_RIP.1: 20
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 21
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 29
- FIA_ATD.1.1: 3
- FIA_UAU: 6
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU_EXP.5: 25
- FIA_UAU_EXP.5.1: 2
- FIA_UAU_EXP.5.2: 2
- FIA_UID.1: 11
- FIA_UID.2: 29
- FIA_UID.2.1: 2
- FIA_USB.1: 22
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF: 6
- FMT_MOF.1: 34
- FMT_MOF.1.1: 4
- FMT_MSA: 1
- FMT_MSA.1: 2
- FMT_MSA.2: 29
- FMT_MSA.2.1: 1
- FMT_MTD.1: 39
- FMT_MTD.1.1: 4
- FMT_REV.1: 1
- FMT_SMF.1: 38
- FMT_SMF.1.1: 3
- FMT_SMR.1: 30
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.1: 13
- FPT_RVM.1: 18
- FPT_RVM.1.1: 2
- FPT_SEP.1: 18
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_STM_EXP.1: 15
- FPT_STM_EXP.1.1: 1
- FPT_TST: 3
- FPT_TST_EXP: 1
- FPT_TST_EXP.1: 10
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FPT_TST_EXP.1.3: 1
- FPT_TST_EXP.2: 12
- FPT_TST_EXP.2.1: 1
- FPT_TST_EXP.2.2: 1
- FTA:
- FTA_SSL.3: 11
- FTA_SSL.3.1: 1
- FTA_TAB: 1
- FTA_TAB.1: 10
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXP.1: 22
- FTP_ITC_EXP.1.1: 2
- FTP_ITC_EXP.1.2: 2
- FTP_ITC_EXP.1.3: 2
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CRYPTO: 4
- A.EAUTH: 2
- A.LOCATE: 4
- A.NOEVIL: 3
- A.NWCOMP: 2
- A.TIME: 4
- O:
- O.ACCESS: 14
- O.AUDIT: 13
- O.CONN: 6
- O.EADMIN: 8
- O.FLOW: 11
- O.PROTECT: 15
- O.ROLBAK: 6
- OE:
- OE.ADMIN: 3
- OE.CRYPTO: 3
- OE.EAUTH: 3
- OE.NWCOMP: 3
- OE.PHYSICAL: 3
- OE.TIME: 3
- T:
- T.CONFLOSS: 5
- T.MANDAT: 3
- T.NOAUDIT: 2
- T.OPS: 8
- T.PRIVIL: 7
- T.ROUTE: 9
|
- A:
- A.NO_EVIL: 2
- A.NO_GENERAL_: 1
- A.NO_GENERAL_PURPOSE: 1
- A.ONE_WCS_ADMIN: 3
- A.PHYSICAL: 2
- A.SYSLOG_ADMIN: 3
- A.SYSLOG_SEP: 5
- A.TOE_NO_BYPASS: 2
- O:
- O.ADMIN_GUIDANCE: 9
- O.AUDIT_GENERATION: 3
- O.CONFIGURATION_: 1
- O.CONFIGURATION_IDENTIFICATION: 8
- O.CORRECT_: 1
- O.CORRECT_TSF_: 1
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPHY: 10
- O.CRYPTOGRAPHY_: 1
- O.CRYPTOGRAPHY_VALIDATED: 4
- O.DISPLAY_BANNER: 8
- O.DOCUMENTED_: 1
- O.DOCUMENTED_DESIGN: 3
- O.FUNCTIONAL_TESTING: 1
- O.IDS_AUDIT_: 1
- O.IDS_AUDIT_GENERATION: 10
- O.MANAGE: 7
- O.MEDIATE: 10
- O.PARTIAL_: 1
- O.PARTIAL_FUNCTIONAL_TESTING: 3
- O.RESIDUAL_: 1
- O.RESIDUAL_INFORMATION: 10
- O.SELF_PROTECTION: 5
- O.TIME_STAMPS: 8
- O.TOE: 1
- O.TOE_ACCESS: 6
- O.VULNERABILITY_: 1
- O.VULNERABILITY_ANALYSIS: 7
- O.VULNERABILITY_ANALYSIS_TEST: 3
- OE:
- OE.AUDIT_PROTECTION: 6
- OE.AUDIT_REVIEW: 3
- OE.MANAGE: 8
- OE.NO_EVIL: 5
- OE.NO_GENERAL_PURPOSE: 5
- OE.ONE_WCS_ADMIN: 5
- OE.PHYSICAL: 2
- OE.PROTECT_MGMT_COMMS: 7
- OE.RESIDUAL_INFORMATION: 5
- OE.SELF_PROTECTION: 8
- OE.TIME_STAMPS: 4
- OE.TOE: 1
- OE.TOE_ACCESS: 7
- OE.TOE_NO_BYPASS: 6
- T:
- T.ACCIDENTAL_: 3
- T.ACCIDENTAL_ADMIN_: 1
- T.ACCIDENTAL_ADMIN_ERROR: 1
- T.ACCIDENTAL_CRYPTO_: 1
- T.MASQUERADE: 1
- T.POOR_: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 2
- T.POOR_TEST: 3
- T.RESIDUAL_DATA: 3
- T.TSF_COMPROMISE: 3
- T.UNATTENDED_: 2
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTH_ADMIN_: 1
- T.UNAUTH_ADMIN_ACCESS: 2
- T.UNIDENTIFIED_: 4
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 267
- Cisco Systems: 3
- Cisco Systems, Inc: 5
- Microsoft:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
- FIPS 140: 3
- FIPS 140-1: 1
- FIPS 140-2: 21
- FIPS 180-2: 1
- FIPS 46-3: 1
- FIPS PUB 140-2: 6
- FIPS PUB 180-2: 2
- FIPS PUB 46-3: 2
- NIST:
- RFC:
- RFC 2246: 1
- RFC 2284: 1
- RFC 2716: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be: 1
- accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: All: 1
- out of scope: 2
- which are out of scope), and SSH (which is provided by the operational environment: 1
|
|
pdf_data/st_metadata |
- /Author: Juniper
- /CreationDate: D:20120725095220-04'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20120725095220-04'00'
- /Producer: Microsoft® Word 2010
- /Subject: EAL3 Security Target
- /Title: JUNOS 10.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches
- pdf_file_size_bytes: 817354
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
- /Author: lholmqui
- /CreationDate: D:20090526110050-04'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20090526110251-04'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title: WLAN_ST.fm
- pdf_file_size_bytes: 672856
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 112
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |