This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Juniper Networks M & T-Series Family of Internet Routers running JUNOS 6.0r1, Model numbers M5, M10, M20, M40e, M7i, M160, T320, T640 CCEVS-VR-0055-2004 |
Juniper Networks M7i, M10i, M40e, M120, M320, T320, T640, T1600, MX240, MX480 and MX960 Services Routers and EX3200, EX4200 and EX8200 Switches running JUNOS 10 CRP258 |
|
---|---|---|
name | Juniper Networks M & T-Series Family of Internet Routers running JUNOS 6.0r1, Model numbers M5, M10, M20, M40e, M7i, M160, T320, T640 | Juniper Networks M7i, M10i, M40e, M120, M320, T320, T640, T1600, MX240, MX480 and MX960 Services Routers and EX3200, EX4200 and EX8200 Switches running JUNOS 10 |
not_valid_before | 2004-01-01 | 2010-10-08 |
not_valid_after | 2012-09-06 | 2015-10-08 |
scheme | US | UK |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4021-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/juniper-t009-st-v1.3.pdf |
security_level | EAL2 | EAL3+, ALC_FLR.3 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4021-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp258.pdf |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2004, 6, 24), 'maintenance_title': 'Models M10i M320 Running JUNOS 6.3r1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4021-add1.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2005, 12, 14), 'maintenance_title': 'Previous Model Running JUNOS 7.4.r1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4021-add2.pdf', 'maintenance_st_link': None}) | |
state/report/pdf_hash | 89ba77f4e3630b0500b1a5055c298cf8560f8daa91902d39127f52f592fbc8e8 | 671c74eace6ff791d339e7e9475c7c8de2673862129bdc1a2c37682f6e9b588e |
state/report/txt_hash | ca839cbc5b4c8eb958407fe440ee45b2ff7d47b178089f3ff0103115a4be5ecd | 7a0a5c1b4d5ecd6f2a0a7ed410e00a63bf7f2b5454a421d0422347400887bef0 |
state/st/pdf_hash | e005c0d291dd73150327fd73f393896b15cf4d73a1c98cc95c97b4c071eaaf7a | 1201d4e4f56df0b50be6476a5f8288155ac56a5a502cd1a80113a7ea747f0aa1 |
state/st/txt_hash | 7602dbfa626d63e7977d93f1367107e7c96892cf83a3c579d40bdcca03c8eb6e | 081f26e4115295ca6468b11cb77d0957478a6243aeabedf5e58d44530369a942 |
heuristics/cert_id | CCEVS-VR-0055-2004 | CRP258 |
heuristics/cert_lab | US | None |
heuristics/cpe_matches | None | cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:10.3:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:10.0:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:10.2:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:10.1:*:*:*:*:*:*:* |
heuristics/extracted_versions | 6.0 | 10 |
heuristics/related_cves | None | CVE-2022-22156, CVE-2023-44177, CVE-2023-44201, CVE-2023-44178, CVE-2024-21591, CVE-2022-22215, CVE-2022-22208, CVE-2023-36843, CVE-2024-39549, CVE-2023-36841, CVE-2022-22242, CVE-2014-3818, CVE-2014-2712, CVE-2023-28964, CVE-2022-22181, CVE-2023-44197, CVE-2022-22224, CVE-2004-0468, CVE-2013-4686, CVE-2021-31372, CVE-2023-44184, CVE-2022-22220, CVE-2014-0616, CVE-2022-22245, CVE-2023-22406, CVE-2013-7313, CVE-2024-39528, CVE-2021-31362, CVE-2023-28962, CVE-2023-28979, CVE-2022-22246, CVE-2022-22244, CVE-2023-44194, CVE-2013-4689, CVE-2022-22241, CVE-2014-2714, CVE-2022-22238, CVE-2022-22162, CVE-2023-44186, CVE-2014-0615, CVE-2024-21594, CVE-2013-6618, CVE-2022-22197, CVE-2023-36842, CVE-2023-28963, CVE-2013-6170, CVE-2022-22243, CVE-2023-44182, CVE-2004-0230, CVE-2022-22163, CVE-2023-22395, CVE-2023-44185, CVE-2023-36839, CVE-2023-36840, CVE-2023-44176, CVE-2019-0036, CVE-2014-0613, CVE-2022-22214, CVE-2023-44175, CVE-2023-4481, CVE-2022-22173, CVE-2023-22407, CVE-2023-28975, CVE-2013-6014, CVE-2023-22391 |
heuristics/report_references/directly_referencing | None | CRP248 |
heuristics/report_references/indirectly_referencing | None | CRP248, CRP237 |
heuristics/scheme_data |
|
None |
pdf_data/report_filename | st_vid4021-vr.pdf | crp258.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/crypto_protocol | |
|
pdf_data/report_keywords/hash_function | |
|
pdf_data/report_keywords/standard_id | |
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//Author | . | NWA |
pdf_data/report_metadata//CreationDate | D:20040218070336-05'00' | D:20110401134243+01'00' |
pdf_data/report_metadata//Creator | Acrobat PDFMaker 5.0 for Word | Acrobat PDFMaker 7.0.5 for Word |
pdf_data/report_metadata//ModDate | D:20040218070530-05'00' | D:20110401134249+01'00' |
pdf_data/report_metadata//Producer | Acrobat Distiller 5.0.5 (Windows) | Acrobat Elements 7.0.5 (Windows) |
pdf_data/report_metadata//Title | National Information Assurance Partnership | Certification Report CRP258 v1.1 |
pdf_data/report_metadata/pdf_file_size_bytes | 199685 | 312433 |
pdf_data/report_metadata/pdf_hyperlinks | http://www.juniper.net/techpubs/, http://www.juniper.net/ | |
pdf_data/report_metadata/pdf_number_of_pages | 10 | 18 |
pdf_data/st_filename | st_vid4021-st.pdf | juniper-t009-st-v1.3.pdf |
pdf_data/st_keywords/cc_claims/A |
|
|
pdf_data/st_keywords/cc_claims/A/A.EAUTH | 3 | 2 |
pdf_data/st_keywords/cc_claims/A/A.LOCATE | 3 | 4 |
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.ACCESS | 8 | 14 |
pdf_data/st_keywords/cc_claims/O/O.EADMIN | 3 | 8 |
pdf_data/st_keywords/cc_claims/O/O.PROTECT | 7 | 17 |
pdf_data/st_keywords/cc_claims/OE |
|
|
pdf_data/st_keywords/cc_claims/OE/OE.EAUTH | 5 | 3 |
pdf_data/st_keywords/cc_claims/T |
|
|
pdf_data/st_keywords/cc_claims/T/T.OPS | 3 | 7 |
pdf_data/st_keywords/cc_claims/T/T.PRIVIL | 3 | 7 |
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 | 11 | 1 |
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 | 9 | 1 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 | 7 | 5 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 | 9 | 2 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 | 4 | 5 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 | 8 | 1 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD | 14 | 27 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 | 2 | 6 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 9 | 6 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 8 | 5 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/certification_process | |
|
pdf_data/st_keywords/crypto_protocol | |
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | RMGalan | JANE MEDEFESSER |
pdf_data/st_metadata//CreationDate | D:20040210103041-05'00' | D:20101007131521+01'00' |
pdf_data/st_metadata//Creator | Acrobat PDFMaker 5.0 for Word | Acrobat PDFMaker 8.0 for Word |
pdf_data/st_metadata//ModDate | D:20040210103652-05'00' | D:20101007131533+01'00' |
pdf_data/st_metadata//Producer | Acrobat Distiller 5.0.5 (Windows) | Acrobat Distiller 8.0.0 (Windows) |
pdf_data/st_metadata//Title | Juniper Security Target | JUNOS 10.0 for M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches |
pdf_data/st_metadata/pdf_file_size_bytes | 436054 | 525224 |
pdf_data/st_metadata/pdf_number_of_pages | 32 | 37 |
dgst | ccd1b225da050a4e | 5c38bf7165e0821f |