name |
Juniper Networks M & T-Series Family of Internet Routers running JUNOS 6.0r1, Model numbers M5, M10, M20, M40e, M7i, M160, T320, T640
|
Juniper Networks M,T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8 and Juniper QFX and EX Switches Running Junos OS 13.2X50-D19 and 13.2X51-D20
|
category |
Network and Network-Related Devices and Systems
|
Network and Network-Related Devices and Systems
|
not_valid_before |
2004-01-01
|
2014-09-03
|
not_valid_after |
2012-09-06
|
2019-09-03
|
scheme |
US
|
CA
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4021-st.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/juniper-network-v133r18-sec-eng.pdf
|
status |
archived
|
archived
|
manufacturer |
Juniper Networks, Inc.
|
Juniper Networks, Inc.
|
manufacturer_web |
https://www.juniper.net/
|
https://www.juniper.net/
|
security_level |
EAL2 |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4021-vr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/juniper-network-v133r18-cert-eng_0.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-297%20cert%20original%20signed%20v1.0%20e.docx
|
protection_profiles |
|
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Network Devices', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_nd_v1.1.pdf', 'pp_ids': frozenset({'PP_ND_V1.1'})}) |
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2004, 6, 24), 'maintenance_title': 'Models M10i M320 Running JUNOS 6.3r1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4021-add1.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2005, 12, 14), 'maintenance_title': 'Previous Model Running JUNOS 7.4.r1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4021-add2.pdf', 'maintenance_st_link': None}) |
|
state/cert/convert_garbage |
False
|
True
|
state/cert/convert_ok |
False
|
False
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
False
|
state/cert/pdf_hash |
None
|
a5039c62b206635ea685e0e7d995f341f1e42a161fe4fdba27ab8a4b00db6fef
|
state/cert/txt_hash |
None
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
89ba77f4e3630b0500b1a5055c298cf8560f8daa91902d39127f52f592fbc8e8
|
8461157688ea353be47c4b06f5b99534cc237874f69df25d9e7a9f582cb12e3e
|
state/report/txt_hash |
ca839cbc5b4c8eb958407fe440ee45b2ff7d47b178089f3ff0103115a4be5ecd
|
0a291361fbb60bcce4138854492bafb2e5fc2eb3aedb6c5a52e18d04b2e31924
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
e005c0d291dd73150327fd73f393896b15cf4d73a1c98cc95c97b4c071eaaf7a
|
4f9299720df9b2f13cdf5d674b01296a8187b681dcce5f29d9b4cc4d92ffe750
|
state/st/txt_hash |
7602dbfa626d63e7977d93f1367107e7c96892cf83a3c579d40bdcca03c8eb6e
|
d9088a672b8ea4f5079d7cbfbde5e53d236e6e72d6a71551c8071e8340994283
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
CCEVS-VR-0055-2004
|
383-4-297
|
heuristics/cert_lab |
US
|
CANADA
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
6.0 |
13.2, 1.8, 13.3 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- product:
Juniper Networks M&T-Series
- id:
CCEVS-VR-VID4021
- url:
https://www.niap-ccevs.org/product/4021
- certification_date:
2004-01-23T00:01:00Z
- expiration_date:
None
- category:
Router
- vendor:
Juniper Networks, Inc.
- evaluation_facility:
Leidos Common Criteria Testing Laboratory
- scheme:
US
|
None
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
383-4-297 cert original signed v1.0 e.docx
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
st_vid4021-vr.pdf
|
juniper-network-v133r18-cert-eng_0.pdf
|
pdf_data/report_frontpage |
- US:
- cert_id:
CCEVS-VR-04-0055
- cert_item:
Juniper Networks M & T-Series Family of Internet Routers running JUNOS 6.0r1
- cert_lab:
US NIAP
|
- CA:
- cert_id:
383-4-297-CR
- cert_lab:
CANADA
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims |
- T:
- A:
- A.LOCATE:
1
- A.NOEVIL:
1
- A.EAUTH:
1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
- ADO:
- AVA:
- ASE:
- ASE_DES.1:
1
- ASE_OBJ.1:
2
- ASE_REQ:
2
- ASE_REQ.1:
1
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_CKM_EXT.4:
1
- FCS_RBG_EXT.1:
1
- FCS_SSH_EXT.1:
1
- FIA:
- FIA_PMG_EXT.1:
1
- FIA_UIA_EXT.1:
1
- FIA_UAU_EXT.2:
1
- FPT:
- FPT_SKP_EXT.1:
1
- FPT_APW_EXT.1:
1
- FPT_TUD_EXT.1:
1
- FPT_TST_EXT.1:
1
- FTA:
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
- FIPS:
- FIPS 186-3:
1
- FIPS 197:
1
- FIPS 186-2:
1
- FIPS 180-2:
1
- FIPS 198:
1
- FIPS 180:
1
- ISO:
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
.
|
krshann
|
pdf_data/report_metadata//CreationDate |
D:20040218070336-05'00'
|
D:20141001151624-04'00'
|
pdf_data/report_metadata//Creator |
Acrobat PDFMaker 5.0 for Word
|
Microsoft® Office Word 2007
|
pdf_data/report_metadata//ModDate |
D:20040218070530-05'00'
|
D:20141001151743-04'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 5.0.5 (Windows)
|
Microsoft® Office Word 2007
|
pdf_data/report_metadata//Title |
National Information Assurance Partnership
|
Juniper Networks M,T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8 and Juniper QFX and EX Switches Running Junos OS 13.2X50-D19 and 13.2X51-D20
|
pdf_data/report_metadata/pdf_file_size_bytes |
199685
|
267190
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
10
|
13
|
pdf_data/st_filename |
st_vid4021-st.pdf
|
juniper-network-v133r18-sec-eng.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.LOCATE:
3
- A.NOEVIL:
3
- A.EAUTH:
3
|
- A.NO_GENERAL_PURPOSE:
1
- A.PHYSICAL:
1
- A.TRUSTED_ADMIN:
1
|
pdf_data/st_keywords/cc_claims/O |
- O.PROTECT:
7
- O.EADMIN:
3
- O.ACCESS:
8
- O.PHYCAL:
2
- O.MANAGE:
3
|
- O.PROTECTED_COMMUNICATIONS:
1
- O.VERIFIABLE_UPDATES:
1
- O.SYSTEM_MONITORING:
1
- O.DISPLAY_BANNER:
1
- O.TOE_ADMINISTRATION:
1
- O.RESIDUAL_INFORMATION_CLEARING:
1
- O.SESSION_LOCK:
1
- O.TSF_SELF_TEST:
1
|
pdf_data/st_keywords/cc_claims/OE |
|
- OE.NO_GENERAL_PURPOSE:
1
- OE.PHYSICAL:
1
- OE.TRUSTED_ADMIN:
1
|
pdf_data/st_keywords/cc_claims/T |
|
- T.ADMIN_ERROR:
1
- T.TSF_FAILURE:
1
- T.UNDETECTED_ACTIONS:
1
- T.UNAUTHORIZED_ACCESS:
1
- T.UNAUTHORIZED_UPDATE:
1
- T.USER_DATA_REUSE:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1:
7
- ADO_IGS.1:
7
- ADV:
- ADV_FSP.1:
10
- ADV_HLD.1:
13
- ADV_RCR.1:
6
- AGD:
- AGD_ADM.1:
13
- AGD_USR.1:
11
- ATE:
- ATE_COV.1:
6
- ATE_FUN.1:
11
- ATE_IND.2:
9
- AVA:
- AVA_SOF.1:
8
- AVA_VLA.1:
10
|
- ADV:
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.1:
1
- ALC_CMS.1:
1
- ATE:
- AVA:
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_OBJ.1:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_FSP.1:
10
- ADV_HLD.1: 13
- ADV_RCR.1: 6
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.1 |
10
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_ADM.1:
13
- AGD_USR.1:
11
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.1:
6
- ATE_FUN.1:
11
- ATE_IND.2:
9
|
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_SOF.1:
8
- AVA_VLA.1:
10
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FIA:
- FIA_ATD.1:
7
- FIA_UAU.1:
9
- FIA_UID.1:
8
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_UAU.5:
4
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FMT:
- FMT_MTD:
14
- FMT_SMF.1:
9
- FMT_SMR.1:
8
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
2
- FPT:
- FPT_SEP.1:
6
- FPT_SEP.1.1:
1
- FPT_SEP.1.2:
1
|
- FAU:
- FAU_STG_EXT.1:
11
- FAU_STG.1:
1
- FAU_STG:
1
- FAU_GEN.1:
8
- FAU_STG_EXT.1.1:
2
- FAU_GEN:
5
- FAU_GEN.2:
5
- FAU_GEN.1.1:
2
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FCS:
- FCS_CKM_EXT.4:
20
- FCS_RBG_EXT.1:
15
- FCS_SSH_EXT.1:
14
- FCS_TLS_EXT.1:
2
- FCS_CKM.4:
7
- FCS_CKM:
1
- FCS_CKM_EXT:
1
- FCS_CKM.1:
19
- FCS_CKM_EXT.4.1:
1
- FCS_COP.1:
46
- FCS_RBG_EXT.1.1:
2
- FCS_RBG_EXT.1.2:
2
- FCS_SSH_EXT.1.1:
2
- FCS_SSH_EXT.1.2:
2
- FCS_SSH_EXT.1.3:
2
- FCS_SSH_EXT.1.4:
2
- FCS_SSH_EXT.1.5:
2
- FCS_SSH_EXT.1.6:
2
- FCS_SSH_EXT.1.7:
2
- FCS_CKM.1.1:
2
- FCS_COP.1.1:
4
- FCS_CKM.2:
1
- FDP:
- FDP_ITC.1:
6
- FDP_ITC.2:
6
- FDP_RIP.2:
5
- FDP_RIP.2.1:
1
- FIA:
- FIA_PMG_EXT.1:
11
- FIA_UAU_EXT.2:
11
- FIA_UIA_EXT.1:
17
- FIA_PSK_EXT.1:
1
- FIA_PMG_EXT.1.1:
2
- FIA_UAU:
1
- FIA_UAU_EXT.2.1:
2
- FIA_UAU.1:
3
- FIA_UID.1:
5
- FIA_UIA_EXT.1.1:
2
- FIA_UIA_EXT.1.2:
2
- FIA_UAU.7:
5
- FIA_UAU.7.1:
1
- FMT:
- FMT_MTD.1:
5
- FMT_SMF.1:
7
- FMT_SMR.2:
5
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1:
2
- FMT_SMR.2.1:
1
- FMT_SMR.2.2:
1
- FMT_SMR.2.3:
1
- FPT:
- FPT_APW_EXT.1:
9
- FPT_SKP_EXT.1:
11
- FPT_TST_EXT.1:
11
- FPT_TUD_EXT.1:
11
- FPT_SSP.2:
1
- FPT_APW_EXT.1.1:
4
- FPT_APW_EXT.1.2:
2
- FPT_SSP.1:
1
- FPT_SKP_EXT.1.1:
2
- FPT_TST.1:
1
- FPT_TST_EXT.1.1:
2
- FPT_TUD_EXT.1.1:
2
- FPT_TUD_EXT.1.2:
2
- FPT_TUD_EXT.1.3:
2
- FPT_STM.1:
7
- FPT_STM.1.1:
1
- FPT_TRP.1:
1
- FTA:
- FTA_SSL_EXT.1:
9
- FTA_TAB.1:
7
- FTA_SSL:
1
- FTA_SSL_EXT.1.1:
3
- FTA_EXT_SSL.1:
1
- FTA_SSL.3:
5
- FTA_SSL.4:
4
- FTA_SSL.3.1:
1
- FTA_SSL_EXT.4:
1
- FTA_SSL.4.1:
1
- FTA_TAB.1.1:
1
- FTP:
- FTP_ITC.1:
8
- FTP_TRP.1:
4
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
1
- FTP_TRP.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FDP |
|
- FDP_ITC.1:
6
- FDP_ITC.2:
6
- FDP_RIP.2:
5
- FDP_RIP.2.1:
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_ATD.1: 7
- FIA_UAU.1:
9
- FIA_UID.1:
8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_ATD.1.1: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
|
- FIA_PMG_EXT.1: 11
- FIA_UAU_EXT.2: 11
- FIA_UIA_EXT.1: 17
- FIA_PSK_EXT.1: 1
- FIA_PMG_EXT.1.1: 2
- FIA_UAU: 1
- FIA_UAU_EXT.2.1: 2
- FIA_UAU.1:
3
- FIA_UID.1:
5
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
9
|
3
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
8
|
5
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MTD: 14
- FMT_SMF.1:
9
- FMT_SMR.1:
8
- FMT_SMF.1.1:
1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_MTD.1:
2
|
- FMT_MTD.1:
5
- FMT_SMF.1:
7
- FMT_SMR.2: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1:
2
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
2
|
5
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
9
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
8
|
2
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_SEP.1:
6
- FPT_SEP.1.1:
1
- FPT_SEP.1.2:
1
|
- FPT_APW_EXT.1:
9
- FPT_SKP_EXT.1:
11
- FPT_TST_EXT.1:
11
- FPT_TUD_EXT.1:
11
- FPT_SSP.2:
1
- FPT_APW_EXT.1.1:
4
- FPT_APW_EXT.1.2:
2
- FPT_SSP.1:
1
- FPT_SKP_EXT.1.1:
2
- FPT_TST.1:
1
- FPT_TST_EXT.1.1:
2
- FPT_TUD_EXT.1.1:
2
- FPT_TUD_EXT.1.2:
2
- FPT_TUD_EXT.1.3:
2
- FPT_STM.1:
7
- FPT_STM.1.1:
1
- FPT_TRP.1:
1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope:
2
- SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT:
1
- Line Card network interface components) which simply deal with physical interfaces mechanics are out of scope. Security Target Juniper Networks M, T, MX and PTX Routers and EX9200 Switches running Junos OS 13:
1
- including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
- MAC:
- KEX:
- Key exchange:
1
- Key Exchange:
2
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256:
2
- P-384:
2
- P-521:
2
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256:
4
- SHA-512:
1
- SHA-2:
4
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 15408-2:
1
- ISO/IEC 15408-3:
1
|
- FIPS:
- FIPS PUB 197:
1
- FIPS PUB 186-3:
3
- FIPS140:
1
- FIPS197:
1
- NIST:
- NIST SP 800-38A:
1
- NIST SP 800-38D:
1
- RFC:
- RFC 4253:
3
- RFC 4741:
1
- RFC4253:
3
- RFC6668:
2
- RFC5656:
3
- RFC 4251:
2
- RFC 4252:
1
- RFC 4254:
1
- RFC 6668:
1
- RFC4251:
1
- RFC4252:
1
- RFC4254:
1
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
436054
- pdf_is_encrypted:
False
- pdf_number_of_pages:
32
- /Producer:
Acrobat Distiller 5.0.5 (Windows)
- /Author:
RMGalan
- /Creator:
Acrobat PDFMaker 5.0 for Word
- /ModDate:
D:20040210103652-05'00'
- /Title:
Juniper Security Target
- /CreationDate:
D:20040210103041-05'00'
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1190383
- pdf_is_encrypted:
False
- pdf_number_of_pages:
58
- /Author:
Denise Cater
- /CreationDate:
D:20140826155957-04'00'
- /Creator:
Microsoft® Word 2010
- /ModDate:
D:20140908143633-04'00'
- /Producer:
Microsoft® Word 2010
- /Subject: Junos OS 13.3R1.8, Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20
- /Title:
Security Target Juniper Networks M, T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8
- pdf_hyperlinks:
http://www.juniper.net/
|
pdf_data/st_metadata//Author |
RMGalan
|
Denise Cater
|
pdf_data/st_metadata//CreationDate |
D:20040210103041-05'00'
|
D:20140826155957-04'00'
|
pdf_data/st_metadata//Creator |
Acrobat PDFMaker 5.0 for Word
|
Microsoft® Word 2010
|
pdf_data/st_metadata//ModDate |
D:20040210103652-05'00'
|
D:20140908143633-04'00'
|
pdf_data/st_metadata//Producer |
Acrobat Distiller 5.0.5 (Windows)
|
Microsoft® Word 2010
|
pdf_data/st_metadata//Title |
Juniper Security Target
|
Security Target Juniper Networks M, T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8
|
pdf_data/st_metadata/pdf_file_size_bytes |
436054
|
1190383
|
pdf_data/st_metadata/pdf_hyperlinks |
|
http://www.juniper.net/ |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
32
|
58
|
dgst |
ccd1b225da050a4e
|
a1869cea6ad1a28c
|