This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Juniper Networks Junos OS 22.3R1 for MX240, MX480, MX960, EX9204, EX9208 and EX9214 with MACsec Certificate Number: 2024/152 |
Red Hat Enterprise Linux (RHEL) Version 4 Update 1 AS and Red Hat Enterprise Linux (RHEL) Version 4 Update 1 WS CCEVS-VR-0009-2006 |
|
---|---|---|
name | Juniper Networks Junos OS 22.3R1 for MX240, MX480, MX960, EX9204, EX9208 and EX9214 with MACsec | Red Hat Enterprise Linux (RHEL) Version 4 Update 1 AS and Red Hat Enterprise Linux (RHEL) Version 4 Update 1 WS |
category | Network and Network-Related Devices and Systems | Operating Systems |
scheme | AU | US |
status | active | archived |
not_valid_after | 30.08.2029 | 06.09.2012 |
not_valid_before | 30.08.2024 | 26.01.2006 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2024_152_EFT-T035_Junos%20OS%2022.3R1%20for%20MX240,%20MX480,%20MX960,%20EX9204,%20EX9208%20and%20EX9214%20with%20MACsec_os.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2024-EFT-T035-CR-V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10072-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20Junos%2022.3R1%20for%20MX%20and%20EX%20Series%20with%20MACsec%20v1.1%20(2).pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10072-st.pdf |
manufacturer | Juniper Networks, Inc. | Red Hat, Inc. |
manufacturer_web | https://www.juniper.net/ | https://www.redhat.com |
security_level | {} | EAL4+, ALC_FLR.3 |
dgst | 96fde064a9932f2c | ba3f5c03b37e6ec0 |
heuristics/cert_id | Certificate Number: 2024/152 | CCEVS-VR-0009-2006 |
heuristics/cert_lab | [] | US |
heuristics/cpe_matches | {} | cpe:2.3:o:redhat:enterprise_linux:4.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:4:ga:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:4.5:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2011-4967, CVE-2011-3191, CVE-2005-2492, CVE-2012-1097, CVE-2007-5494, CVE-2010-0013, CVE-2011-3363, CVE-2009-1837, CVE-2007-6285, CVE-2011-3585, CVE-2011-2897, CVE-2006-4997, CVE-2011-1145, CVE-2014-0224, CVE-2005-4890, CVE-2015-1819, CVE-2011-2525, CVE-2011-3188, CVE-2012-2124, CVE-2009-2416, CVE-2007-1716, CVE-2009-0846, CVE-2011-2699, CVE-2014-6271, CVE-2016-7091, CVE-2008-1951, CVE-2011-2717, CVE-2007-2030, CVE-2010-4805, CVE-2016-4983, CVE-2006-5170, CVE-2005-0087, CVE-2010-4251, CVE-2010-0729, CVE-2009-4067, CVE-2015-2877, CVE-2014-7169 |
heuristics/extracted_sars | {} | ATE_COV.2, AGD_USR.1, ASE_REQ.1, ADV_HLD.2, AVA_VLA.2, ATE_DPT.1, ADV_IMP.1, ALC_FLR.3, ADV_FSP.2, ALC_DVS.1, ADV_SPM.1, ALC_TAT.1, ATE_IND.2, AGD_ADM.1, ADV_RCR.1, ATE_FUN.1, AVA_MSU.2, ALC_LCD.1, AVA_SOF.1, ADV_LLD.1 |
heuristics/extracted_versions | 22.3 | 4, 1 |
heuristics/protection_profiles | 89f2a255423f4a20, 51ed84742f89c3f7 | {} |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_MACSEC_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf | {} |
pdf_data/cert_filename | AISEP_Certificate_2024_152_EFT-T035_Junos OS 22.3R1 for MX240, MX480, MX960, EX9204, EX9208 and EX9214 with MACsec_os.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | AISEP-CC-CR-2024-EFT-T035-CR-V1.0.pdf | st_vid10072-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid10072-st.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor | ||
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme | ||
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness | ||
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | False | True |
state/st/download_ok | False | True |
state/st/extract_ok | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |