name |
Juniper Junos OS 20.2R1 for SRX345, SRX345-DUAL-AC, SRX380 and SRX1500 |
CA Directory r8.1 0608 (build 942) |
category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
AU |
US |
status |
active |
archived |
not_valid_after |
11.01.2026 |
06.09.2012 |
not_valid_before |
11.01.2021 |
30.04.2007 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T013%20Cert%202020_131_OS.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T013-Certification%20Report%20V1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3022-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20JunOS%2020.2R1%20SRX345,%20SRX345-DUAL-AC,%20SRX380,%20SRX1500%20SecurityTarget%20v1.4.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3022-st.pdf |
manufacturer |
Juniper Networks, Inc. |
CA Technologies |
manufacturer_web |
https://www.juniper.net/ |
https://www.ca.com |
security_level |
{} |
EAL3 |
dgst |
e8ade97b41f4ead3 |
2be2ede185c90a0b |
heuristics/cert_id |
Certificate Number: 2020/131 |
CCEVS-VR-0040-2007 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
20.2 |
8.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Network Access Control
- certification_date: 30.04.2007
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date:
- id: CCEVS-VR-VID3022
- product: CA Directory r8.1 0608 (build 942)
- scheme: US
- url: https://www.niap-ccevs.org/product/3022
- vendor: CA Technologies
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
cf18fa171ef6e928, fa0610a54305df78 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPNGW_V1.0.pdf |
{} |
pdf_data/cert_filename |
EFT-T013 Cert 2020_131_OS.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210113153231+10'00'
- /Creator: ACA75941.dpe.protected.mil.au
- /ModDate: D:20210113153712+11'00'
- /Producer: KONICA MINOLTA bizhub C308
- /Title: SACA75941.d21011315320
- pdf_file_size_bytes: 112707
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
EFT-T013-Certification Report V1.0.pdf |
st_vid3022-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-07-0040
- cert_item: CA Directory, r8.1 0608 (build 942) for the Sun Solaris Platform
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-06-3022: 23
- CCEVS-VR-07-0040: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_CAP.3: 1
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 1
- ADV_HLD.2: 1
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV: 1
- ATE_COV.2: 2
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 1
- AVA_SOF.1: 1
- AVA_VLA.1: 2
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_SAR.1: 1
- FAU_SEL.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 3
- FIA_ATD.1: 1
- FIA_SOS.1: 2
- FIA_UAU: 3
- FIA_UAU.1: 1
- FIA_UAU.2: 1
- FIA_UID.1: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA: 2
- FMT_MTD: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
- CVE:
- CVE-2004-0079: 1
- CVE-2005-3653: 1
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- Only - Out of Scope DXconsole DUA/LDUA The system configuration consists of two Sun SPARC Solaris 9 machines. On one: 1
- Out of Scope: 3
- and Software is Out of Scope DXconsole SSLD Ingres db DUA/LDUA Figure 3. TOE’s physical scope by product components used 16 CA: 1
- before use. RPC DSA RPB DSA RPA DSA DXserver DUA/LDUA TOE machine Remote Machine and Software is Out of Scope DXconsole SSLD Ingres db DUA/LDUA RPC DSA RPB DSA RPA DSA DXserver DUA/LDUA TOE machine Remote: 1
- iGateway affects the DXmanager module of eTrust Directory 8.1. DXmanager is not installed and out of scope for the evaluation. Also applies to the HTTP interface which is not an interface to the TOE. •: 1
- in scope) and the SSLD (out of scope) though not depicted: 1
- of the evaluation. Therefore, the cryptographic algorithms performed within the SSLD component are out of scope and not verified by this evaluation. Aspects of the following security functions are controlled : 1
- out of scope: 3
- used for the Developers Testing. The TOE DSA box includes the Ingres db (in scope) and the SSLD (out of scope) though not depicted. RPC DSA RPB DSA RPA DSA TOE DSA DUA/LDUA TOE machine Remote Machine For Test: 1
|
pdf_data/report_metadata |
|
- /Author: wshanahan
- /CreationDate: D:20070717085537-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070717085839-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070717125458
- /Title: National Information Assurance Partnership
- pdf_file_size_bytes: 184938
- pdf_hyperlinks: http://www.cygnacom.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
Juniper JunOS 20.2R1 SRX345, SRX345-DUAL-AC, SRX380, SRX1500 SecurityTarget v1.4.pdf |
st_vid3022-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 3
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 3
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 8
- FAU_GEN.1: 13
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 21
- FCS_CKM.2: 20
- FCS_CKM.2.1: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP: 37
- FCS_COP.1: 7
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 9
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_RGB_EXT.1: 1
- FCS_SSHC_EXT.1.1: 2
- FCS_SSHC_EXT.1.5: 3
- FCS_SSHC_EXT.1.7: 1
- FCS_SSHC_EXT.1.9: 1
- FCS_SSHS_EXT: 2
- FCS_SSHS_EXT.1: 8
- FCS_SSHS_EXT.1.1: 3
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 4
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.1.1: 4
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSS_EXT: 1
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.4: 1
- FCS_TLSS_EXT.2.5: 1
- FDP:
- FDP_RIP: 2
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 12
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT.1: 5
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_PSK_EXT.1.4: 1
- FIA_UAU: 2
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 6
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 2
- FIA_UIA_EXT.1: 11
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 3
- FMT:
- FMT_MOF: 20
- FMT_MOF.1: 3
- FMT_MTD: 13
- FMT_MTD.1: 2
- FMT_SMF: 27
- FMT_SMF.1: 6
- FMT_SMR: 2
- FMT_SMR.1: 5
- FMT_SMR.2: 12
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 6
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS: 5
- FPT_FLS.1: 2
- FPT_ITT.1: 1
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 4
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 5
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.3: 3
- FPT_TST_EXT.3.1: 1
- FPT_TST_EXT.3.2: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL.3: 10
- FTA_SSL.4: 6
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 7
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 2
- FTA_TAB.1: 9
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 28
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_ITC.2: 6
- FTP_TRP: 9
- FTP_TRP.1: 3
- FTP_TUD.1: 1
|
- FAU:
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SEL.1: 17
- FAU_SEL.1.1: 1
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 16
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 13
- FIA_ATD.1.1: 1
- FIA_SOS.1: 16
- FIA_SOS.1.1: 1
- FIA_UAU: 25
- FIA_UAU.1: 17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 34
- FMT_MSA.1: 2
- FMT_MSA.3: 2
- FMT_MTD: 45
- FMT_MTD.1: 2
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM: 1
- FPT_RVM.1: 5
- FPT_RVM_EXP: 1
- FPT_SEP: 1
- FPT_SEP.1: 5
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 3
- FTP_ITC_EXP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.CONNECTIONS: 3
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINSTRATOR: 1
- O:
- O.ADDRESS_FILTERING: 1
- O.AUTHENTICATION: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.FAIL_SECURE: 1
- O.IPS_ANALYZE: 1
- O.IPS_REACT: 1
- O.PORT_FILTERING: 1
- O.RESIDUAL_INFORMATION: 1
- O.STATEFUL_TRAFFIC_FILTERING: 1
- O.SYSTEM_MONITORING: 2
- O.TOE_ADMINISTRATION: 2
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 3
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.DATA_INTEGRITY: 1
- T.MALICIOUS_TRAFFIC: 1
- T.NETWORK_DOS: 1
- T.PASSWORD_CRACKING: 1
- T.REPLAY_ATTACK: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- A.DIRECTORY_SYSTEM: 1
- A.DIRECTORY_SYSTEM_SECURITY_: 1
- A.DIRECTORY_SYSTEM_SECURITY_POLI: 1
- A.DIRECTORY_SYSTEM_SECURITY_POLICY_: 1
- A.INTEROP: 2
- A.NO_EVIL: 2
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 3
- A.REMOTE_ADMIN_DUA_: 1
- A.REMOTE_ADMIN_DUA_ENVIRONMENT: 2
- A.USERS: 2
- D:
- O:
- O.AUDIT: 6
- O.MANAGE: 9
- O.MEDIATE: 7
- O.PARTIAL_SELF_: 1
- O.PARTIAL_SELF_PROTECTION: 3
- O.PARTIAL_TRUSTEDCOMM: 6
- O.TOE_ACCESS: 4
- OE:
- OE.AUDIT_ACCESS: 7
- OE.DISTRIBUTED_AUTHENTICA: 1
- OE.DISTRIBUTED_AUTHENTICATION: 4
- OE.PARTIAL_SELF_: 1
- OE.PARTIAL_SELF_PROTECTION: 2
- OE.PARTIAL_TRUSTEDCOMM: 7
- OE.TIME: 6
- T:
- T.MASQUERADE: 4
- T.TSF_COMPROMISE: 6
- T.UNAUTHORIZED_ACCESS: 3
- T.UNIDENTIFIED_ACTIONS: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 13
- HMAC-SHA-256: 6
- HMAC-SHA-512: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 13
- SHA-384: 4
- SHA-512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
- AEAD:
- KEX:
- Key Exchange: 4
- Key exchange: 1
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 46
- IKEv1: 19
- IKEv2: 17
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 2
- TLS1.1: 1
- TLS1.2: 1
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 36
- P-384: 28
- P-521: 8
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180-4: 5
- FIPS 186-4: 5
- FIPS 197: 5
- FIPS 198-1: 5
- FIPS PUB 186-4: 9
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 2
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-56A: 2
- SP 800-135: 2
- SP 800-38A: 2
- SP 800-38D: 2
- SP 800-56: 3
- SP 800-90A: 2
- PKCS:
- RFC:
- RFC 2409: 2
- RFC 2460: 2
- RFC 2463: 1
- RFC 2986: 2
- RFC 3513: 2
- RFC 3526: 2
- RFC 3602: 3
- RFC 4106: 2
- RFC 4109: 2
- RFC 4251: 2
- RFC 4252: 1
- RFC 4253: 3
- RFC 4254: 1
- RFC 4301: 2
- RFC 4303: 1
- RFC 4306: 2
- RFC 4443: 1
- RFC 4868: 4
- RFC 4945: 2
- RFC 5280: 5
- RFC 5282: 1
- RFC 5656: 1
- RFC 5735: 2
- RFC 5996: 1
- RFC 6668: 1
- RFC 768: 2
- RFC 791: 2
- RFC 792: 2
- RFC 793: 2
- RFC 959: 1
- RFC2460: 1
- RFC3526: 2
- RFC5656: 1
- RFC768: 1
- RFC791: 1
- RFC793: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- FTP) and Secure Socket Layer (SSL) are out of scope. The TOE includes cryptographic modules which implement the underlying cryptographic services: 1
- out of scope: 1
- to any information exchange. Telnet, File Transfer Protocol (FTP) and Secure Socket Layer (SSL) are out of scope. The TOE includes cryptographic modules which implement the underlying cryptographic services. The: 1
|
|
pdf_data/st_metadata |
- /Author: AnanthaKandiah
- /CreationDate: D:20201105164628+11'00'
- /ModDate: D:20201105164628+11'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - Juniper JunOS 20.2R1 SRX345, SRX345-DUAL-AC, SRX380, SRX1500 SecurityTarget v1.4.docx
- pdf_file_size_bytes: 2301192
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
- /Author: krogers
- /Company: CygnaCom Solutions, Inc.
- /CreationDate: D:20070717085137-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070717085341-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070711135902
- /Title: APPENDIX E (CERTIFICATE POLICY TAXONOMY)
- pdf_file_size_bytes: 620673
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 86
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |