name |
Junos OS 22.3R1 for ACX5448-M, EX4400-24T, EX4400-24P, EX4400-24MP, EX4400-48T, EX4400-48P, EX4400-48F, EX4400-48MP and QFX5120-YM
|
Junos OS 22.3R1 for ACX5448-M, EX4400-24T, EX4400-24P, EX4400-24MP, EX4400-48T, EX4400-48P, EX4400-48F, EX4400-48MP and QFX5120-YM
|
category |
Network and Network-Related Devices and Systems
|
Network and Network-Related Devices and Systems
|
not_valid_before |
2024-04-12
|
2024-04-12
|
not_valid_after |
2029-04-12
|
2029-04-12
|
scheme |
AU
|
AU
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20Junos%2022.3R1%20for%20ACX%205448-M,%20EX4400%20Series,%20QFX5120-YM%20MACsec%20Security%20Target%20v1.0.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20Junos%2022.3R1%20for%20ACX%205448-M,%20EX4400%20Series,%20QFX5120-YM%20MACsec%20Security%20Target%20v1.1.pdf
|
status |
active
|
active
|
manufacturer |
Juniper Networks, Inc.
|
Juniper Networks, Inc.
|
manufacturer_web |
https://www.juniper.net/
|
https://www.juniper.net/
|
security_level |
|
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2024-EFT-T032-CR-V1.0.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2024-EFT-T032-CR-V1.0.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2024_148_EFT-T032_Junos%20OS%2022.3R1%20for%20ACX5448-M,%20EX4400x%20and%20QFX5120-48YM_os.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2024_148_EFT-T032_Junos%20OS%2022.3R1%20for%20ACX5448-M,%20EX4400x%20and%20QFX5120-48YM_os.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'collaborative Protection Profile for Network Devices v2.2e', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'collaborative Protection Profile for Network Devices v2.2e', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
True
- convert_garbage:
True
- convert_ok:
True
- extract_ok:
True
- pdf_hash:
788bdde79396e6d18f883c300ac9c739c5ca883404ad5b2a414cd50f72dc6d62
- txt_hash:
c23cfe8902a0a835b8b5c6a37c83d8f52cf7b61b5e30000f1a724bb305f59582
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
True
- convert_garbage:
True
- convert_ok:
True
- extract_ok:
True
- pdf_hash:
788bdde79396e6d18f883c300ac9c739c5ca883404ad5b2a414cd50f72dc6d62
- txt_hash:
c23cfe8902a0a835b8b5c6a37c83d8f52cf7b61b5e30000f1a724bb305f59582
|
state/report |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
True
- convert_garbage:
False
- convert_ok:
True
- extract_ok:
True
- pdf_hash:
e220c438d04026df0d94c3f265be8e10539da5020a0ce01bd124f3f47f6d45f0
- txt_hash:
fee87ff6fc396514ad413dce80f44a6490252089392f7fa240d52380f188893c
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
True
- convert_garbage:
False
- convert_ok:
True
- extract_ok:
True
- pdf_hash:
e220c438d04026df0d94c3f265be8e10539da5020a0ce01bd124f3f47f6d45f0
- txt_hash:
fee87ff6fc396514ad413dce80f44a6490252089392f7fa240d52380f188893c
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
a01b70ae79a167d4768aa88c9b399f35e9e5006d7029ee333229403072f0cee2
|
3b8abfad4e8a24d41776ea629f14c67672cc04aeee36ee1a5d4f06b7447305a2
|
state/st/txt_hash |
4af82257358ceb854ec1b778ff2284dbe44427dd3305ee55d7d282db313ab31c
|
72c5e714f36f7746bcc21c3ef828306afebd2f6cd9353f42ce16cbf4af32f072
|
heuristics |
- _type:
sec_certs.sample.cc.CCCertificate.Heuristics
- extracted_versions:
22.3
- cpe_matches:
None
- verified_cpe_matches:
None
- related_cves:
None
- cert_lab:
None
- cert_id:
Certificate Number: 2024/148
- st_references:
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
- report_references:
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
- annotated_references:
None
- extracted_sars:
frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1})
- direct_transitive_cves:
None
- indirect_transitive_cves:
None
- scheme_data:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.Heuristics
- extracted_versions:
22.3
- cpe_matches:
None
- verified_cpe_matches:
None
- related_cves:
None
- cert_lab:
None
- cert_id:
Certificate Number: 2024/148
- st_references:
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
- report_references:
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
- annotated_references:
None
- extracted_sars:
frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}), frozendict({'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1})
- direct_transitive_cves:
None
- indirect_transitive_cves:
None
- scheme_data:
None
|
pdf_data/cert_filename |
AISEP_Certificate_2024_148_EFT-T032_Junos OS 22.3R1 for ACX5448-M, EX4400x and QFX5120-48YM_os.pdf
|
AISEP_Certificate_2024_148_EFT-T032_Junos OS 22.3R1 for ACX5448-M, EX4400x and QFX5120-48YM_os.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- AU:
- Certificate Number: 2024/148:
1
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
- cc_cert_id:
- AU:
- Certificate Number: 2024/148:
1
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
146621
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /CreationDate:
D:20240619174501+10'00'
- /ModDate:
D:20240619174501+10'00'
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
146621
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /CreationDate:
D:20240619174501+10'00'
- /ModDate:
D:20240619174501+10'00'
- pdf_hyperlinks:
|
pdf_data/report_filename |
AISEP-CC-CR-2024-EFT-T032-CR-V1.0.pdf
|
AISEP-CC-CR-2024-EFT-T032-CR-V1.0.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
3901523
- pdf_is_encrypted:
False
- pdf_number_of_pages:
17
- /CreationDate:
D:20240419175159+10'00'
- /ModDate:
D:20240419175159+10'00'
- pdf_hyperlinks:
https://www.commoncriteriaportal.org/, https://www.juniper.net/, https://www.cyber.gov.au/ism, https://www.juniper.net/documentation, https://www.juniper.net/customers/csc/management
|
- pdf_file_size_bytes:
3901523
- pdf_is_encrypted:
False
- pdf_number_of_pages:
17
- /CreationDate:
D:20240419175159+10'00'
- /ModDate:
D:20240419175159+10'00'
- pdf_hyperlinks:
https://www.commoncriteriaportal.org/, https://www.juniper.net/, https://www.cyber.gov.au/ism, https://www.juniper.net/documentation, https://www.juniper.net/customers/csc/management
|
pdf_data/st_filename |
Juniper Junos 22.3R1 for ACX 5448-M, EX4400 Series, QFX5120-YM MACsec Security Target v1.0.pdf
|
Juniper Junos 22.3R1 for ACX 5448-M, EX4400 Series, QFX5120-YM MACsec Security Target v1.1.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- O.CRYPTOGRAPHIC_FUNCTIONS:
1
- O.AUTHENTICATION:
1
- O.PORT_FILTERING:
1
- O.SYSTEM_MONITORING:
1
- O.AUTHORIZED_ADMINISTRATION:
1
- O.TSF_INTEGRITY:
1
- O.REPLAY_DETECTION:
1
- O.VERIFIABLE_UPDATES:
1
- T:
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS:
1
- T.WEAK_CRYPTOGRAPHY:
1
- T.UNTRUSTED_COMMUNICATION_CHANNELS:
2
- T.WEAK_AUTHENTICATION_ENDPOINTS:
1
- T.UPDATE_COMPROMISE:
1
- T.UNDETECTED_ACTIVITY:
1
- T.SECURITY_FUNCTIONALITY_COMPROMISE:
1
- T.PASSWORD_CRACKING:
1
- T.SECURITY_FUNCTIONALITY_FAILURE:
1
- T.NETWORK_ACCESS:
1
- T.DATA_INTEGRITY:
1
- A:
- A.PHYSICAL_PROTECTION:
1
- A.LIMITED_FUNCTIONALITY:
1
- A.TRUSTED_ADMINSTRATOR:
1
- A.REGULAR_UPDATES:
1
- A.ADMIN_CREDENTIALS_SECURE:
1
- A.RESIDUAL_INFORMATION:
1
- A.NO_THRU_TRAFFIC_PROTECTION:
1
- OE:
- OE.NO_THRU_TRAFFIC_PROTECTION:
2
- OE.PHYSICAL:
1
- OE.NO_GENERAL_PURPOSE:
1
- OE.TRUSTED_ADMIN:
1
- OE.UPDATES:
1
- OE.ADMIN_CREDENTIALS_SECURE:
1
- OE.RESIDUAL_INFORMATION:
1
|
- O:
- O.CRYPTOGRAPHIC_FUNCTIONS:
1
- O.AUTHENTICATION:
1
- O.PORT_FILTERING:
1
- O.SYSTEM_MONITORING:
1
- O.AUTHORIZED_ADMINISTRATION:
1
- O.TSF_INTEGRITY:
1
- O.REPLAY_DETECTION:
1
- O.VERIFIABLE_UPDATES:
1
- T:
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS:
1
- T.WEAK_CRYPTOGRAPHY:
1
- T.UNTRUSTED_COMMUNICATION_CHANNELS:
2
- T.WEAK_AUTHENTICATION_ENDPOINTS:
1
- T.UPDATE_COMPROMISE:
1
- T.UNDETECTED_ACTIVITY:
1
- T.SECURITY_FUNCTIONALITY_COMPROMISE:
1
- T.PASSWORD_CRACKING:
1
- T.SECURITY_FUNCTIONALITY_FAILURE:
1
- T.NETWORK_ACCESS:
1
- T.DATA_INTEGRITY:
1
- A:
- A.PHYSICAL_PROTECTION:
1
- A.LIMITED_FUNCTIONALITY:
1
- A.TRUSTED_ADMINSTRATOR:
1
- A.REGULAR_UPDATES:
1
- A.ADMIN_CREDENTIALS_SECURE:
1
- A.RESIDUAL_INFORMATION:
1
- A.NO_THRU_TRAFFIC_PROTECTION:
1
- OE:
- OE.NO_THRU_TRAFFIC_PROTECTION:
2
- OE.PHYSICAL:
1
- OE.NO_GENERAL_PURPOSE:
1
- OE.TRUSTED_ADMIN:
1
- OE.UPDATES:
1
- OE.ADMIN_CREDENTIALS_SECURE:
1
- OE.RESIDUAL_INFORMATION:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.1:
1
- ALC_CMS.1:
1
- ATE:
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.1:
1
- ASE_REQ.1:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ADV:
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.1:
1
- ALC_CMS.1:
1
- ATE:
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.1:
1
- ASE_REQ.1:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN:
2
- FAU_STG_EXT:
2
- FAU_GEN.1:
4
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
4
- FAU_STG_EXT.1:
3
- FAU_GEN.2.1:
1
- FAU_STG_EXT.1.1:
1
- FAU_STG_EXT.1.2:
1
- FAU_STG_EXT.1.3:
1
|
- FAU_GEN:
2
- FAU_STG_EXT:
2
- FAU_GEN.1:
4
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
4
- FAU_STG_EXT.1:
3
- FAU_GEN.2.1:
1
- FAU_STG_EXT.1.1:
1
- FAU_STG_EXT.1.2:
1
- FAU_STG_EXT.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM:
2
- FCS_COP:
21
- FCS_RBG_EXT.1:
7
- FCS_SSHS_EXT:
2
- FCS_MKA:
2
- FCS_TLSC_EXT.2.3:
1
- FCS_TLSC_EXT.1.1:
1
- FCS_TLSC_EXT.1:
1
- FCS_NTP_EXT.1.4:
2
- FCS_CKM.1:
7
- FCS_CKM.2:
4
- FCS_CKM.4:
4
- FCS_COP.1:
10
- FCS_SSHS_EXT.1:
7
- FCS_CKM.1.1:
1
- FCS_CKM.2.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
2
- FCS_RBG_EXT.1.1:
2
- FCS_RBG_EXT.1.2:
1
- FCS_SSHS_EXT.1.1:
1
- FCS_SSHS_EXT.1.2:
1
- FCS_SSHS_EXT.1.3:
1
- FCS_SSHS_EXT.1.4:
1
- FCS_SSHS_EXT.1.5:
1
- FCS_SSHS_EXT.1.6:
1
- FCS_SSHS_EXT.1.7:
1
- FCS_SSHS_EXT.1.8:
1
- FCS_MKA_EXT.1:
4
- FCS_MKA_EXT.1.1:
1
- FCS_MKA_EXT.1.2:
1
- FCS_MKA_EXT.1.3:
1
- FCS_MKA_EXT.1.4:
1
- FCS_MKA_EXT.1.5:
1
- FCS_MKA_EXT.1.6:
1
- FCS_MKA_EXT.1.7:
1
- FCS_MKA_EXT.1.8:
1
|
- FCS_CKM:
2
- FCS_COP:
21
- FCS_RBG_EXT.1:
7
- FCS_SSHS_EXT:
2
- FCS_MKA:
2
- FCS_TLSC_EXT.2.3:
1
- FCS_TLSC_EXT.1.1:
1
- FCS_TLSC_EXT.1:
1
- FCS_NTP_EXT.1.4:
2
- FCS_CKM.1:
7
- FCS_CKM.2:
4
- FCS_CKM.4:
4
- FCS_COP.1:
10
- FCS_SSHS_EXT.1:
7
- FCS_CKM.1.1:
1
- FCS_CKM.2.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
2
- FCS_RBG_EXT.1.1:
2
- FCS_RBG_EXT.1.2:
1
- FCS_SSHS_EXT.1.1:
1
- FCS_SSHS_EXT.1.2:
1
- FCS_SSHS_EXT.1.3:
1
- FCS_SSHS_EXT.1.4:
1
- FCS_SSHS_EXT.1.5:
1
- FCS_SSHS_EXT.1.6:
1
- FCS_SSHS_EXT.1.7:
1
- FCS_SSHS_EXT.1.8:
1
- FCS_MKA_EXT.1:
4
- FCS_MKA_EXT.1.1:
1
- FCS_MKA_EXT.1.2:
1
- FCS_MKA_EXT.1.3:
1
- FCS_MKA_EXT.1.4:
1
- FCS_MKA_EXT.1.5:
1
- FCS_MKA_EXT.1.6:
1
- FCS_MKA_EXT.1.7:
1
- FCS_MKA_EXT.1.8:
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL:
2
- FIA_PMG_EXT:
2
- FIA_UIA_EXT:
2
- FIA_UAU:
2
- FIA_UAU_EXT:
2
- FIA_PMG_EXT.1:
5
- FIA_AFL.1:
10
- FIA_UIA_EXT.1:
5
- FIA_UAU_EXT.2:
4
- FIA_UAU.7:
4
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_PMG_EXT.1.1:
1
- FIA_UIA_EXT.1.1:
1
- FIA_UIA_EXT.1.2:
1
- FIA_UAU_EXT.2.1:
1
- FIA_UAU.7.1:
1
- FIA_PSK_EXT.1:
1
|
- FIA_AFL:
2
- FIA_PMG_EXT:
2
- FIA_UIA_EXT:
2
- FIA_UAU:
2
- FIA_UAU_EXT:
2
- FIA_PMG_EXT.1:
5
- FIA_AFL.1:
10
- FIA_UIA_EXT.1:
5
- FIA_UAU_EXT.2:
4
- FIA_UAU.7:
4
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_PMG_EXT.1.1:
1
- FIA_UIA_EXT.1.1:
1
- FIA_UIA_EXT.1.2:
1
- FIA_UAU_EXT.2.1:
1
- FIA_UAU.7.1:
1
- FIA_PSK_EXT.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF |
17
|
17
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
10
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.2.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.2.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_SKP_EXT:
2
- FPT_APW_EXT:
2
- FPT_TST_EXT:
2
- FPT_TUD_EXT:
2
- FPT_STM_EXT:
2
- FPT_CAK_EXT.1:
5
- FPT_FLS:
3
- FPT_RPL.1:
7
- FPT_FLS.1:
3
- FPT_SKP_EXT.1:
4
- FPT_APW_EXT.1:
5
- FPT_TST_EXT.1:
5
- FPT_TUD_EXT.1:
9
- FPT_STM_EXT.1:
5
- FPT_SKP_EXT.1.1:
1
- FPT_APW_EXT.1.1:
1
- FPT_APW_EXT.1.2:
1
- FPT_TST_EXT.1.1:
1
- FPT_TUD_EXT.1.1:
1
- FPT_TUD_EXT.1.2:
1
- FPT_TUD_EXT.1.3:
1
- FPT_STM_EXT.1.1:
1
- FPT_STM_EXT.1.2:
1
- FPT_CAK_EXT.1.1:
1
- FPT_FLS.1.1:
1
- FPT_RPL.1.1:
1
- FPT_RPL.1.2:
1
- FPT_STM.1:
1
|
- FPT_SKP_EXT:
2
- FPT_APW_EXT:
2
- FPT_TST_EXT:
2
- FPT_TUD_EXT:
2
- FPT_STM_EXT:
2
- FPT_CAK_EXT.1:
5
- FPT_FLS:
3
- FPT_RPL.1:
7
- FPT_FLS.1:
3
- FPT_SKP_EXT.1:
4
- FPT_APW_EXT.1:
5
- FPT_TST_EXT.1:
5
- FPT_TUD_EXT.1:
9
- FPT_STM_EXT.1:
5
- FPT_SKP_EXT.1.1:
1
- FPT_APW_EXT.1.1:
1
- FPT_APW_EXT.1.2:
1
- FPT_TST_EXT.1.1:
1
- FPT_TUD_EXT.1.1:
1
- FPT_TUD_EXT.1.2:
1
- FPT_TUD_EXT.1.3:
1
- FPT_STM_EXT.1.1:
1
- FPT_STM_EXT.1.2:
1
- FPT_CAK_EXT.1.1:
1
- FPT_FLS.1.1:
1
- FPT_RPL.1.1:
1
- FPT_RPL.1.2:
1
- FPT_STM.1:
1
|
pdf_data/st_keywords/cc_sfr/FTA |
- FTA_SSL_EXT:
2
- FTA_SSL:
2
- FTA_TAB:
2
- FTA_SSL_EXT.1:
5
- FTA_SSL.3:
6
- FTA_SSL.4:
5
- FTA_TAB.1:
7
- FTA_SSL_EXT.1.1:
1
|
- FTA_SSL_EXT:
2
- FTA_SSL:
2
- FTA_TAB:
2
- FTA_SSL_EXT.1:
5
- FTA_SSL.3:
6
- FTA_SSL.4:
5
- FTA_TAB.1:
7
- FTA_SSL_EXT.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC:
2
- FTP_TRP:
7
- FTP_ITC.1:
9
- FTP_TUD.1:
1
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
4
|
- FTP_ITC:
2
- FTP_TRP:
7
- FTP_ITC.1:
9
- FTP_TUD.1:
1
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
4
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Out of Scope:
2
- 11 1.5.5 Summary of Out of Scope Items :
1
- 11 1.5.5 Summary of Out of Scope Items ...................................................................................11 2:
1
- for remote administration; • Serial connection client for local administration. 1.5.5 Summary of Out of Scope Items • Use of telnet, since it violates the Trusted Path requirement set (see Section 5.7.2) • Use:
1
|
- OutOfScope:
- Out of Scope:
2
- 11 1.5.5 Summary of Out of Scope Items :
1
- 11 1.5.5 Summary of Out of Scope Items ...................................................................................11 2:
1
- for remote administration; • Serial connection client for local administration. 1.5.5 Summary of Out of Scope Items • Use of telnet, since it violates the Trusted Path requirement set (see Section 5.7.2) • Use:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol/IPsec/IPsec |
2
|
3
|
pdf_data/st_keywords/crypto_protocol/SSH |
|
|
pdf_data/st_keywords/crypto_protocol/TLS |
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement |
11
|
9
|
pdf_data/st_keywords/crypto_scheme/KEX |
- Key Exchange:
2
- Key exchange:
1
|
- Key Exchange:
2
- Key exchange:
1
|
pdf_data/st_keywords/crypto_scheme/MAC |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256:
14
- P-384:
12
- P-521:
10
|
- NIST:
- P-256:
14
- P-384:
12
- P-521:
10
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256:
5
- SHA-384:
3
- SHA-512:
4
|
- SHA:
- SHA1:
- SHA2:
- SHA-256:
5
- SHA-384:
3
- SHA-512:
4
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- NIST:
- NIST SP 800-38F:
1
- SP 800-90A:
1
- SP 800-90B:
2
- PKCS:
- RFC:
- RFC 5077:
1
- RFC 3526:
2
- RFC 4253:
3
- RFC3526:
1
- RFC 4251:
2
- RFC 5656:
1
- RFC 4252:
1
- RFC 4254:
1
- RFC4344:
1
- RFC5656:
1
- RFC 6668:
1
- ISO:
- ISO/IEC 9796-2:
1
- ISO/IEC 14888-3:
1
- ISO/IEC 18031:2011:
2
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
|
- FIPS:
- NIST:
- NIST SP 800-38F:
1
- SP 800-90A:
1
- SP 800-90B:
2
- PKCS:
- RFC:
- RFC 5077:
1
- RFC 3526:
2
- RFC 4253:
3
- RFC3526:
1
- RFC 4251:
2
- RFC 5656:
1
- RFC 4252:
1
- RFC 4254:
1
- RFC4344:
1
- RFC5656:
1
- RFC 6668:
1
- ISO:
- ISO/IEC 9796-2:
1
- ISO/IEC 14888-3:
1
- ISO/IEC 18031:2011:
2
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC:
3
- HMAC-SHA-256:
4
- HMAC-SHA-512:
2
- CMAC:
4
|
- AES_competition:
- constructions:
- MAC:
- HMAC:
3
- HMAC-SHA-256:
4
- HMAC-SHA-512:
2
- CMAC:
4
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//CreationDate |
D:20240411122933+10'00'
|
D:20240807065740+10'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word for Microsoft 365
|
Microsoft® Word for Microsoft 365
|
pdf_data/st_metadata//MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId |
8a5c636b-017f-4255-b6eb-bbb08b59de35
|
8a5c636b-017f-4255-b6eb-bbb08b59de35
|
pdf_data/st_metadata//MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ContentBits |
2
|
2
|
pdf_data/st_metadata//MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled |
true
|
true
|
pdf_data/st_metadata//MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Method |
Standard
|
Standard
|
pdf_data/st_metadata//MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name |
0633b888-ae0d-4341-a75f-06e04137d755
|
0633b888-ae0d-4341-a75f-06e04137d755
|
pdf_data/st_metadata//MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate |
2022-06-28T10:07:57Z
|
2022-06-28T10:07:57Z
|
pdf_data/st_metadata//MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId |
bea78b3c-4cdb-4130-854a-1d193232e5f4
|
bea78b3c-4cdb-4130-854a-1d193232e5f4
|
pdf_data/st_metadata//ModDate |
D:20240411122933+10'00'
|
D:20240807065740+10'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word for Microsoft 365
|
Microsoft® Word for Microsoft 365
|
pdf_data/st_metadata/pdf_file_size_bytes |
943753
|
946241
|
pdf_data/st_metadata/pdf_hyperlinks |
https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0564, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0569, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0556, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0547, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0572, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0537, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0571, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0546, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0570, http://www.juniper.net/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0581, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0591, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0563, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0555, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0580 |
https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0564, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0569, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0556, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0547, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0572, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0537, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0571, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0546, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0570, http://www.juniper.net/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0581, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0591, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0563, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0555, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0580 |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
53
|
54
|
dgst |
9246f9e02631f69e
|
7ff6ceb530a8d40b
|