This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Junos OS 20.3R1 for ACX5448-M Certificate Number: 2021/134 |
IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance BSI-DSZ-CC-1107-V3-2022 |
|
---|---|---|
name | Junos OS 20.3R1 for ACX5448-M | IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance |
category | Network and Network-Related Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | AU | DE |
not_valid_after | 15.02.2026 | 16.05.2027 |
not_valid_before | 15.02.2021 | 16.05.2022 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T015%20Cert%202021_134%20OS.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107V3c_pdf.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/T0015-Certification_Report_V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107V3a_pdf.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20Junos%2020.3R1%20for%20ACX5448-M%20Security%20Target%20v1.5.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107V3b_pdf.pdf |
manufacturer | Juniper Networks, Inc. | Infineon Technologies AG |
manufacturer_web | https://www.juniper.net/ | https://www.infineon.com/ |
security_level | {} | EAL6+, ALC_FLR.1 |
dgst | c8e2a772ab22f8a4 | 41a108aba1fdb0c9 |
heuristics/cert_id | Certificate Number: 2021/134 | BSI-DSZ-CC-1107-V3-2022 |
heuristics/cert_lab | [] | BSI |
heuristics/extracted_sars | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 | ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions | 20.3 | 1.10.007, 1.13.002, 80.306.16.1, 2.11.003, 3.52.9708, 01.30.0564, 05.03.4097, 3.33.003, 3.02.000, 2.15.000, 80.306.16.0 |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2022/16v2, ANSSI-CC-2023/28, ANSSI-CC-2022/14v2, ANSSI-CC-2023/06, ANSSI-CC-2023/21, ANSSI-CC-2022/17v2, ANSSI-CC-2021/36v2, NSCIB-CC-2300005-01-CR, NSCIB-CC-2300086-01-CR, ANSSI-CC-2022/36v2, ANSSI-CC-2023/29, NSCIB-CC-2300006-01-CR, ANSSI-CC-2023/51, NSCIB-CC-2300089-01-CR, ANSSI-CC-2022/34, NSCIB-CC-2300051-01-CR, ANSSI-CC-2023/49, ANSSI-CC-2023/24, NSCIB-CC-0568828-CR, ANSSI-CC-2022/18v2, ANSSI-CC-2022/15v2, ANSSI-CC-2023/27, ANSSI-CC-2023/47, ANSSI-CC-2023/25, ANSSI-CC-2023/48, ANSSI-CC-2023/50, NSCIB-CC-0289065-CR, BSI-DSZ-CC-1107-V4-2023, NSCIB-CC-2300087-01-CR, NSCIB-CC-2300088-01-CR, ANSSI-CC-2022/34v2, ANSSI-CC-2021/29-S01v2, NSCIB-CC-0289060-CR, ANSSI-CC-2023/26 |
heuristics/report_references/indirectly_referenced_by | {} | BSI-DSZ-CC-1221-2024, NSCIB-CC-0289060-CR, ANSSI-CC-2022/16v2, ANSSI-CC-2023/28, ANSSI-CC-2022/14v2, NSCIB-CC-2300062-01-CR, ANSSI-CC-2023/06, ANSSI-CC-2023/21, NSCIB-CC-2300123-01-CR, ANSSI-CC-2022/17v2, ANSSI-CC-2021/36v2, BSI-DSZ-CC-1220-2024, NSCIB-CC-2300050-01-CR, BSI-DSZ-CC-1219-2024, NSCIB-CC-2300005-01-CR, NSCIB-CC-2300063-01-CR, NSCIB-CC-2300061-02-CR2, NSCIB-CC-2300086-01-CR, ANSSI-CC-2022/38-R01, ANSSI-CC-2022/36v2, NSCIB-CC-2300058-01-CR, ANSSI-CC-2023/29, NSCIB-CC-2300006-01-CR, ANSSI-CC-2023/51, NSCIB-CC-2300089-01-CR, ANSSI-CC-2022/34, NSCIB-CC-2300051-01-CR, ANSSI-CC-2023/06-R01, ANSSI-CC-2023/49, ANSSI-CC-2023/24, NSCIB-CC-0568828-CR, BSI-DSZ-CC-1107-V5-2024, ANSSI-CC-2022/18v2, ANSSI-CC-2021/29v2, ANSSI-CC-2022/15v2, NSCIB-CC-2300061-01-CR, ANSSI-CC-2023/27, ANSSI-CC-2023/47, ANSSI-CC-2023/25, NSCIB-CC-2300062-02-CR2, ANSSI-CC-2023/48, NSCIB-CC-2300063-02-CR2, ANSSI-CC-2023/50, NSCIB-CC-0289065-CR, BSI-DSZ-CC-1107-V4-2023, NSCIB-CC-2300060-01-CR, NSCIB-CC-2300087-01-CR, NSCIB-CC-2300088-01-CR, ANSSI-CC-2022/34v2, ANSSI-CC-2021/29-S01v2, NSCIB-CC-2300059-01-CR, ANSSI-CC-2023/26 |
heuristics/st_references/directly_referenced_by | {} | NSCIB-CC-0289060-CR, NSCIB-CC-2300062-01-CR, ANSSI-CC-2023/06, NSCIB-CC-2300123-01-CR, NSCIB-CC-2300050-01-CR, NSCIB-CC-2300005-01-CR, NSCIB-CC-2300063-01-CR, NSCIB-CC-2300061-02-CR2, NSCIB-CC-2300086-01-CR, NSCIB-CC-2300058-01-CR, NSCIB-CC-2300006-01-CR, NSCIB-CC-2300089-01-CR, ANSSI-CC-2022/34, NSCIB-CC-2300051-01-CR, NSCIB-CC-2300061-01-CR, NSCIB-CC-2300062-02-CR2, NSCIB-CC-2300063-02-CR2, NSCIB-CC-0289065-CR, NSCIB-CC-2300097-01-CR, NSCIB-CC-2300060-01-CR, ANSSI-CC-2022/34v2, NSCIB-CC-2300088-01-CR, NSCIB-CC-2300087-01-CR, ANSSI-CC-2021/29-S01v2, NSCIB-CC-2300059-01-CR, NSCIB-CC-0568828-CR |
heuristics/st_references/indirectly_referenced_by | {} | NSCIB-CC-0289060-CR, ANSSI-CC-2023/28, ANSSI-CC-2023/06, NSCIB-CC-2300062-01-CR, ANSSI-CC-2023/21, NSCIB-CC-2300123-01-CR, NSCIB-CC-2300050-01-CR, NSCIB-CC-2300005-01-CR, NSCIB-CC-2300063-01-CR, NSCIB-CC-2300061-02-CR2, NSCIB-CC-2300086-01-CR, NSCIB-CC-2300058-01-CR, ANSSI-CC-2023/29, NSCIB-CC-2300006-01-CR, ANSSI-CC-2023/51, NSCIB-CC-2300089-01-CR, ANSSI-CC-2022/34, NSCIB-CC-2300051-01-CR, ANSSI-CC-2023/49, ANSSI-CC-2023/24, NSCIB-CC-2300061-01-CR, ANSSI-CC-2023/27, ANSSI-CC-2023/47, ANSSI-CC-2023/25, NSCIB-CC-2300062-02-CR2, ANSSI-CC-2023/48, NSCIB-CC-2300063-02-CR2, ANSSI-CC-2023/50, NSCIB-CC-0289065-CR, NSCIB-CC-2300097-01-CR, NSCIB-CC-2300060-01-CR, ANSSI-CC-2022/34v2, NSCIB-CC-2300088-01-CR, NSCIB-CC-2300087-01-CR, ANSSI-CC-2021/29-S01v2, NSCIB-CC-2300059-01-CR, NSCIB-CC-0568828-CR |
heuristics/protection_profiles | {} | cf0f01bcd7be3e9c |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename | EFT-T015 Cert 2021_134 OS.pdf | 1107V3c_pdf.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | T0015-Certification_Report_V1.0.pdf | 1107V3a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Juniper Junos 20.3R1 for ACX5448-M Security Target v1.5.pdf | 1107V3b_pdf.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |