Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Hewlett-Packard LaserJet MFP Models CM3530, CM6030, CM6040, M9040 and M9050 with Jetdirect Inside Firmware
BSI-DSZ-CC-0566-2014
Juniper Networks M,T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8 and Juniper QFX and EX Switches Running Junos OS 13.2X50-D19 and 13.2X51-D20
383-4-297
name Hewlett-Packard LaserJet MFP Models CM3530, CM6030, CM6040, M9040 and M9050 with Jetdirect Inside Firmware Juniper Networks M,T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8 and Juniper QFX and EX Switches Running Junos OS 13.2X50-D19 and 13.2X51-D20
category Multi-Function Devices Network and Network-Related Devices and Systems
scheme DE CA
not_valid_after 01.09.2019 03.09.2019
not_valid_before 27.01.2014 03.09.2014
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-297%20cert%20original%20signed%20v1.0%20e.docx
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0566a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/juniper-network-v133r18-cert-eng_0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0566b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/juniper-network-v133r18-sec-eng.pdf
manufacturer Hewlett-Packard Company Juniper Networks, Inc.
manufacturer_web https://www.hp.com https://www.juniper.net/
security_level EAL2+, ALC_FLR.2 {}
dgst e749ae8889cd41b2 a1869cea6ad1a28c
heuristics/cert_id BSI-DSZ-CC-0566-2014 383-4-297
heuristics/cert_lab BSI CANADA
heuristics/extracted_sars ATE_IND.2, ADV_INT.3, ADV_SPM.1, ASE_CCL.1, ALC_CMS.2, AGD_OPE.1, ASE_SPD.1, ADV_IMP.2, AVA_VAN.2, ALC_TAT.3, ASE_OBJ.2, APE_CCL.1, APE_ECD.1, ATE_DPT.4, APE_INT.1, APE_OBJ.2, ADV_ARC.1, ALC_CMC.2, ATE_FUN.1, ALC_DVS.2, ALC_LCD.2, ASE_INT.1, APE_SPD.1, APE_REQ.2, ASE_TSS.1, ADV_FSP.2, ALC_FLR.2, ASE_REQ.2, ALC_DEL.1, AGD_PRE.1, ATE_COV.1, ADV_TDS.1, ASE_ECD.1 ALC_CMS.1, ASE_REQ.1, AVA_VAN.1, ATE_IND.1, ASE_CCL.1, AGD_PRE.1, ASE_INT.1, ALC_CMC.1, ASE_OBJ.1, AGD_OPE.1, ADV_FSP.1, ASE_TSS.1, ASE_ECD.1
heuristics/extracted_versions - 13.2, 13.3, 1.8
heuristics/protection_profiles 154ef77c252799ee ac9abe3d5c5a31f0
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0058b.pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf
pdf_data/cert_filename 383-4-297 cert original signed v1.0 e.docx
pdf_data/report_filename 0566a_pdf.pdf juniper-network-v133r18-cert-eng_0.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0566-2014
    • cert_item: Hewlett-Packard LaserJet MFP Models CM3530, CM6030, CM6040, M9040 and M9050 with Jetdirect Inside Firmware
    • cert_lab: BSI
    • developer: Hewlett-Packard Company
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • CA:
  • DE:
  • CA:
    • cert_id: 383-4-297-CR
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0566: 1
    • BSI-DSZ-CC-0566-2014: 20
  • CA:
    • 383-4-297-CR: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0058-2010: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 4
    • EAL 2 augmented: 3
    • EAL 4: 1
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 5
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_STG_EXT.1: 1
  • FCS:
    • FCS_CKM_EXT.4: 1
    • FCS_RBG_EXT.1: 1
    • FCS_SSH_EXT.1: 1
  • FIA:
    • FIA_PMG_EXT.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UIA_EXT.1: 1
  • FPT:
    • FPT_APW_EXT.1: 1
    • FPT_SKP_EXT.1: 1
    • FPT_TST_EXT.1: 1
    • FPT_TUD_EXT.1: 1
  • FTA:
    • FTA_SSL_EXT.1: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 4
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 9
  • SSH:
    • SSH: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
  • FIPS:
    • FIPS 180: 1
    • FIPS 180-2: 1
    • FIPS 186-2: 1
    • FIPS 186-3: 1
    • FIPS 197: 1
    • FIPS 198: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Technical Report, Version 6.3, Date 2013-12-16, Certification ID: BSI-DSZ-CC-0566, atsec, (confidential document) [9] HP Color LaserJet CM3530 MFP Series User Guide, Edition 2, 10/2008 [10] HP Color LaserJet: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20140514093554+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Hewlett-Packard LaserJet MFP Models CM3530, CM6030, CM6040, M9040 and M9050 with Jetdirect Inside Firmware, Hewlett-Packard Company"
  • /ModDate: D:20140514094159+02'00'
  • /Producer: LibreOffice 3.6
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0566-2014
  • pdf_file_size_bytes: 956334
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
  • /Author: krshann
  • /CreationDate: D:20141001151624-04'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20141001151743-04'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title: Juniper Networks M,T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8 and Juniper QFX and EX Switches Running Junos OS 13.2X50-D19 and 13.2X51-D20
  • pdf_file_size_bytes: 267190
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename 0566b_pdf.pdf juniper-network-v133r18-sec-eng.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0566: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 15
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 5
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC: 27
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 2
    • FDP_ACF: 22
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_RIP: 2
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
    • FDP_RIP_EXP.3: 19
    • FDP_RIP_EXP.3.1: 3
    • FDP_RIP_EXP.3.2: 3
  • FIA:
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_UAU: 18
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 1
    • FIA_UAU.2.1: 2
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID: 38
    • FIA_UID.1: 23
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 1
    • FIA_UID.2.1: 2
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 19
    • FMT_MOF.1.1: 3
    • FMT_MSA: 65
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 4
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD: 22
    • FMT_MTD.1.1: 5
    • FMT_SMF.1: 33
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 44
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP.1: 6
    • FPT_FDI_EXP.1.1: 1
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 3
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 1
    • FAU_STG_EXT.1: 11
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 1
    • FCS_CKM.4: 7
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 20
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 46
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSH_EXT.1: 14
    • FCS_SSH_EXT.1.1: 2
    • FCS_SSH_EXT.1.2: 2
    • FCS_SSH_EXT.1.3: 2
    • FCS_SSH_EXT.1.4: 2
    • FCS_SSH_EXT.1.5: 2
    • FCS_SSH_EXT.1.6: 2
    • FCS_SSH_EXT.1.7: 2
    • FCS_TLS_EXT.1: 2
  • FDP:
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.2: 5
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_PMG_EXT.1: 11
    • FIA_PMG_EXT.1.1: 2
    • FIA_PSK_EXT.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 3
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 11
    • FIA_UAU_EXT.2.1: 2
    • FIA_UIA_EXT.1: 17
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
    • FIA_UID.1: 5
  • FMT:
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.2: 5
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 9
    • FPT_APW_EXT.1.1: 4
    • FPT_APW_EXT.1.2: 2
    • FPT_SKP_EXT.1: 11
    • FPT_SKP_EXT.1.1: 2
    • FPT_SSP.1: 1
    • FPT_SSP.2: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TRP.1: 1
    • FPT_TST.1: 1
    • FPT_TST_EXT.1: 11
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT.1: 11
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 2
  • FTA:
    • FTA_EXT_SSL.1: 1
    • FTA_SSL: 1
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 9
    • FTA_SSL_EXT.1.1: 3
    • FTA_SSL_EXT.4: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 8
    • D.DOC: 13
    • D.FUNC: 12
    • D.PROT: 5
  • O:
    • O.AUDIT: 5
    • O.CONF: 10
    • O.DOC: 10
    • O.FUNC: 5
    • O.INTERFACE: 5
    • O.PROT: 5
    • O.SOFTWARE: 5
    • O.USER: 11
  • OE:
    • OE.ADMIN: 7
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 3
    • OE.PHYSICAL: 3
    • OE.USER: 13
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.DISPLAY_BANNER: 1
    • O.PROTECTED_COMMUNICATIONS: 1
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.SESSION_LOCK: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 62
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-128: 2
      • AES-256: 1
  • DES:
    • 3DES:
      • 3DES: 1
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 9
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 2
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 2
    • SHA2:
      • SHA-2: 4
      • SHA-256: 4
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 3
  • IPsec:
    • IPsec: 36
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 71
    • SSHv2: 6
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 4
    • RNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 2
    • P-521: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
    • physical tampering: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-2007-09-001: 1
    • CCIMB-2007-09-003: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS PUB 186-3: 3
    • FIPS PUB 197: 1
    • FIPS140: 1
    • FIPS197: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
  • RFC:
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4254: 1
    • RFC 4741: 1
    • RFC 6668: 1
    • RFC4251: 1
    • RFC4252: 1
    • RFC4253: 3
    • RFC4254: 1
    • RFC5656: 3
    • RFC6668: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Line Card network interface components) which simply deal with physical interfaces mechanics are out of scope. Security Target Juniper Networks M, T, MX and PTX Routers and EX9200 Switches running Junos OS 13: 1
    • SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
    • including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: Scott Chapman
  • /CreationDate: D:20131104082901+01'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20131104082901+01'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: Hewlett-Packard LaserJet MFP w/Jetdirect Inside
  • pdf_file_size_bytes: 2056874
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 59
  • /Author: Denise Cater
  • /CreationDate: D:20140826155957-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20140908143633-04'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Junos OS 13.3R1.8, Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20
  • /Title: Security Target Juniper Networks M, T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8
  • pdf_file_size_bytes: 1190383
  • pdf_hyperlinks: http://www.juniper.net/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/cert/convert_garbage False True
state/cert/download_ok False True
state/cert/pdf_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different