{"_id": "f5cbd1ddbbdf1706", "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "f5cbd1ddbbdf1706", "status": "archived", "category": "Network and Network-Related Devices and Systems", "name": "JUNOS 12.3 X48-D30 FOR SRX PLATFORMSComponents: SRX100, SRX110, SRX210, SRX220, SRX240, SRX550 and SRX650; SRX5400, SRX5400E SRX5600, SRX5600E, SRX5800 and SRX5800E with SPC-4-15-320", "manufacturer": "HPE Juniper Networking", "scheme": "AU", "security_level": {"_type": "Set", "elements": []}, "not_valid_before": "2016-12-08", "not_valid_after": "2021-12-08", "report_link": "https://www.commoncriteriaportal.org/files/epfiles/EFS-T041%20_Junos%2012.3X48-%20NDPP-FW-VPN-IPS_%20%20Certification%20Report%20v1.1(1)%20-%20ST%20ref%20update%20only.pdf", "st_link": "https://www.commoncriteriaportal.org/files/epfiles/Juniper%20(ISSX1056-2)%20Junos%2012.3%20X48%20NDPP%20FW%20VPN%20IPS%20ST%20v1.1%20(1).pdf", "cert_link": null, "manufacturer_web": null, "protection_profile_links": null, "maintenance_updates": {"_type": "Set", "elements": []}, "state": {"_type": "sec_certs.sample.cc_eucc_common.InternalState", "report": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "4247e908602655436220f6ce91d3c3361dcf5e124833e1597759e5680b3e58c4", "txt_hash": "4365c926f8c02d3a543c577f7beb818d8ca55ad2d79d5d443dadaa199c3d896d", "json_hash": null}, "st": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "5a8c82fc3962b2efc3f22fecc9c7b3fd393e48eca70a402ef6b0960918ed0720", "txt_hash": "011c5d64a7703c4e406d22c11577bf23f5d8a1f75a96bf4b603a9b6608f9206d", "json_hash": null}, "cert": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null, "json_hash": null}}, "pdf_data": {"_type": "sec_certs.sample.cc_eucc_common.PdfData", "report_metadata": {"pdf_file_size_bytes": 91246, "pdf_is_encrypted": false, "pdf_number_of_pages": 23, "/Author": "ACA", "/Company": "Department of Defence", "/CreationDate": "D:20170221143623+11'00'", "/Creator": "Acrobat PDFMaker 9.0 for Word", "/ModDate": "D:20170221143628+11'00'", "/Objective-Classification": "[Inherited - Unclassified]", "/Objective-CreationStamp": "D:20161208", "/Objective-Id": "R28198627", "/Objective-IsApproved": "0", "/Objective-IsPublished": "0", "/Objective-ModificationStamp": "D:20170221", "/Objective-Owner": "Caulfield, Terence (MR)(ASD)", "/Objective-Parent": "Certification", "/Objective-Path": "Objective Global Folder - PROD:Defence Business Units:Strategic Policy and Intelligence Group:Australian Signals Directorate:ASD : Australian Signals Directorate:CISD:ASCS:CS-PD1:Evaluations:ACA:Australasn Certn Auth:Certification:Operations:AISEP Certifi", "/Objective-State": "Being Edited", "/Objective-Title": "EFS-T041 _Junos 12.3X48- NDPP-FW-VPN-IPS_  Certification Report v1.1", "/Objective-Version": "0.4", "/Objective-VersionNumber": "4", "/Producer": "Acrobat Distiller 9.0.0 (Windows)", "/SourceModified": "D:20170221033452", "/Title": " ", "pdf_hyperlinks": {"_type": "Set", "elements": ["https://www.juniper.net/"]}}, "st_metadata": {"pdf_file_size_bytes": 602433, "pdf_is_encrypted": false, "pdf_number_of_pages": 94, "/Author": "BAE Systems Applied Intelligence", "/Client": "Juniper Networks, Inc.", "/Company": "BAE Systems Detica", "/CreationDate": "D:20170220165048+11'00'", "/Creator": "Acrobat PDFMaker 9.0 for Word", "/DocVersion": "1.1", "/EApproved": "Van Nguyen (Juniper)", "/EAuthor": "BAE Systems Applied Intelligence", "/ECompany_Identity": "Juniper Networks, Inc", "/EDocument_Issue_Date": "09 February 2017", "/EDocument_Reference": "Juniper_ST_VPN", "/EDocument_Status": "Released", "/EDocument_Title": "Junos 12.3 X48-D30 for SRX Platforms (NDPP, TFFWEP, VPNEP, IPSEP)", "/EDocument_Version": "1.1", "/EProject_Name": "Security Target", "/EReport_Type ": "CC - Security Target", "/ModDate": "D:20170220165118+11'00'", "/Producer": "Acrobat Distiller 9.0.0 (Windows)", "/SourceModified": "D:20170220053658", "/Subject": "Junos 12.3 X48-D30 for SRX Platforms", "/TOE": "Junos 12.3 X48-D30 for SRX platforms", "/Title": "Security Target", "pdf_hyperlinks": {"_type": "Set", "elements": []}}, "cert_metadata": null, "report_frontpage": {}, "st_frontpage": null, "cert_frontpage": null, "report_keywords": {"cc_cert_id": {"FR": {"Certification Report 2016/103": 1}, "AU": {"Certification Report 2016/103": 1}}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {"A": {"A.NO_GENERAL_PURPOSE": 1, "A.PHYSICAL": 1, "A.TRUSTED_ADMIN": 1, "A.CONNECTIONS": 1}}, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {"MD": {"MD5": {"MD5": 2}}}, "crypto_scheme": {}, "crypto_protocol": {"SSH": {"SSH": 3}, "TLS": {"SSL": {"SSL": 2}, "TLS": {"TLS": 1}}, "IKE": {"IKEv1": 2}, "IPsec": {"IPsec": 1}, "VPN": {"VPN": 6}}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {}}, "st_keywords": {"cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {"ADV": {"ADV_FSP.1": 2}, "AGD": {"AGD_OPE.1": 2, "AGD_PRE.1": 2}, "ALC": {"ALC_CMC.1": 2, "ALC_CMS.1": 2}, "ATE": {"ATE_IND.1": 2}, "AVA": {"AVA_VAN.1": 2}}, "cc_sfr": {"FAU": {"FAU_STG_EXT.1": 5, "FAU_GEN.1": 9, "FAU_GEN.2": 5, "FAU_GEN.1.1": 2, "FAU_GEN.1.2": 2, "FAU_GEN.2.1": 1, "FAU_STG_EXT.1.1": 1}, "FCS": {"FCS_CKM_EXT.4": 6, "FCS_RBG_EXT.1": 8, "FCS_SSH_EXT.1": 4, "FCS_CKM.1": 9, "FCS_COP.1": 23, "FCS_CKM.1.1": 2, "FCS_CKM_EXT.4.1": 2, "FCS_COP.1.1": 5, "FCS_RBG_EXT.1.1": 2, "FCS_RBG_EXT.1.2": 1, "FCS_SSH_EXT": 1, "FCS_SSH_EXT.1.2": 2, "FCS_SSH_EXT.1.3": 2, "FCS_SSH_EXT.1.4": 2, "FCS_SSH_EXT.1.5": 2, "FCS_SSH_EXT.1.6": 2, "FCS_SSH_EXT.1.7": 2, "FCS_SSH_EXT.1.1": 1}, "FDP": {"FDP_RIP.2": 5, "FDP_RIP.2.1": 1}, "FIA": {"FIA_PMG_EXT.1": 5, "FIA_UIA_EXT.1": 6, "FIA_UAU_EXT.5": 1, "FIA_PSK_EXT.1": 8, "FIA_AFL.1": 5, "FIA_UAU_EXT.2": 5, "FIA_UAU.7": 4, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_PMG_EXT.1.1": 1, "FIA_UAU_EXT.2.1": 1, "FIA_UIA_EXT.1.1": 1, "FIA_UIA_EXT.1.2": 1, "FIA_UAU.7.1": 1, "FIA_PSK_EXT.1.1": 1, "FIA_PSK_EXT.1.2": 1, "FIA_PSK_EXT.1.3": 1, "FIA_PSK_EXT.1.4": 1}, "FMT": {"FMT_MOF.1": 3, "FMT_MTD.1": 5, "FMT_SMF.1": 9, "FMT_SMR.2": 5, "FMT_MOF.1.1": 1, "FMT_MTD.1.1": 1, "FMT_SMF.1.1": 2, "FMT_SMR.2.1": 1, "FMT_SMR.2.2": 1, "FMT_SMR.2.3": 1}, "FPT": {"FPT_SKP_EXT.1": 5, "FPT_APW_EXT.1": 4, "FPT_TUD_EXT.1": 6, "FPT_TST_EXT.1": 5, "FPT_FLS.1": 5, "FPT_STM.1": 5, "FPT_SKP_EXT": 1, "FPT_SKP_EXT.1.1": 1, "FPT_APW_EXT": 1, "FPT_APW_EXT.1.1": 1, "FPT_APW_EXT.1.2": 1, "FPT_FLS.1.1": 1, "FPT_STM.1.1": 1, "FPT_TUD_EXT.1.1": 1, "FPT_TUD_EXT.1.2": 1, "FPT_TUD_EXT.1.3": 1, "FPT_TST_EXT": 1, "FPT_TST_EXT.1.1": 1, "FPT_TST_EXT.1.2": 1}, "FTA": {"FTA_SSL_EXT.1": 6, "FTA_SSL.3": 5, "FTA_SSL.4": 5, "FTA_TAB.1": 6, "FTA_SSL_EXT.1.1": 1, "FTA_SSL.3.1": 2, "FTA_SSL.4.1": 1, "FTA_TAB.1.1": 1}, "FTP": {"FTP_ITC.1": 7, "FTP_TRP.1": 4, "FTP_ITC.1.1": 2, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP": 1, "FTP_TRP.1.1": 1, "FTP_TRP.1.2": 1, "FTP_TRP.1.3": 1}}, "cc_claims": {"O": {"O.PROTECTED_COMMUNICATIONS": 2, "O.VERIFIABLE_UPDATES": 2, "O.SYSTEM_MONITORING": 4, "O.DISPLAY_BANNER": 1, "O.TOE_ADMINISTRATION": 5, "O.RESIDUAL_INFORMATION_CLEARING": 2, "O.SESSION_LOCK": 2, "O.TSF_SELF_TEST": 2, "O.ADDRESS_FILTERING": 3, "O.PORT_FILTERING": 2, "O.STATEFUL_INSPECTION": 2, "O.RELATED_CONNECTION_FILTERING": 2, "O.CRYPTOGRAPHIC_FUNCTIONS": 2, "O.AUTHENTICATION": 2, "O.FAIL_SECURE": 2, "O.IPSSENSE": 1, "O.IPSANALYZE": 2, "O.IPSREACT": 2}, "T": {"T.ADMIN_ERROR": 1, "T.TSF_FAILURE": 1, "T.UNDETECTED_ACTIONS": 1, "T.UNAUTHORIZED_ACCESS": 1, "T.UNAUTHORIZED_UPDATE": 1, "T.USER_DATA_REUSE": 1, "T.NETWORK_DISCLOSURE": 1, "T.NETWORK_MISUSE": 1, "T.NETWORK_DOS": 1, "T.DATA_INTEGRITY": 1}, "A": {"A.NO_GENERAL_PURPOSE": 1, "A.PHYSICAL": 1, "A.TRUSTED_ADMIN": 1, "A.CONNECTIONS": 1}, "OE": {"OE.NO_GENERAL_PURPOSE": 1, "OE.PHYSICAL": 1, "OE.TRUSTED_ADMIN": 1, "OE.CONNECTIONS": 1}}, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {"AES_competition": {"AES": {"AES": 6, "AES-": 1}}, "DES": {"DES": {"DES": 1}, "3DES": {"TDEA": 1}}, "constructions": {"MAC": {"HMAC": 8}}}, "asymmetric_crypto": {"RSA": {"RSA 2048": 2}, "ECC": {"ECDH": {"ECDH": 4}, "ECDSA": {"ECDSA": 13}, "ECC": {"ECC": 1}}, "FF": {"DH": {"DH": 18, "Diffie-Hellman": 1}, "DSA": {"DSA": 2}}}, "pq_crypto": {}, "hash_function": {"SHA": {"SHA1": {"SHA-1": 4, "SHA1": 4}, "SHA2": {"SHA-256": 4, "SHA-384": 1, "SHA-512": 2, "SHA-2": 1}}}, "crypto_scheme": {"MAC": {"MAC": 1}, "KEX": {"Key Exchange": 1, "Key exchange": 1}}, "crypto_protocol": {"SSH": {"SSH": 42, "SSHv2": 3}, "TLS": {"SSL": {"SSL": 6}, "TLS": {"TLS": 1}}, "IKE": {"IKE": 27, "IKEv1": 15, "IKEv2": 12}, "IPsec": {"IPsec": 14}, "VPN": {"VPN": 11}}, "randomness": {"PRNG": {"PRNG": 1, "DRBG": 1}, "RNG": {"RNG": 4, "RBG": 2}}, "cipher_mode": {"CBC": {"CBC": 1}, "GCM": {"GCM": 1}, "CCM": {"CCM": 1}}, "ecc_curve": {"NIST": {"P-256": 8, "P-384": 6}}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {"OpenSSL": {"OpenSSL": 8}}, "vulnerability": {}, "side_channel_analysis": {"FI": {"DFA": 2}}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"FIPS": {"FIPS PUB 186-3": 8, "FIPS PUB 197": 1, "FIPS PUB 186-2": 1}, "NIST": {"NIST SP 800-38A": 1, "NIST SP 800-38D": 1, "NIST SP 800-56A": 3, "NIST SP 800-56B": 1}, "RFC": {"RFC 4253": 1, "RFC 4301": 2, "RFC 4303": 1, "RFC 4106": 1, "RFC 3602": 1, "RFC 4109": 2, "RFC 4868": 4, "RFC 6379": 1, "RFC5282": 1, "RFC 4945": 2, "RFC 5280": 2, "RFC 2986": 1, "RFC 2560": 1, "RFC 5759": 1, "RFC 2409": 2, "RFC 4306": 2, "RFC 792": 3, "RFC 4443": 2, "RFC 791": 4, "RFC 2460": 4, "RFC 793": 4, "RFC 768": 4, "RFC 959": 2, "RFC 5735": 2, "RFC 3513": 2, "RFC 2463": 1, "RFC4253": 2, "RFC6668": 1, "RFC5656": 1}, "X509": {"X.509": 3}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {"OutOfScope": {"out of scope": 1, "FTP), and Secure Socket Layer (SSL) are out of scope. Security Target - Junos 12.3 X48-D30 for SRX Platforms (NDPP, TFFWEP, VPNEP, IPSEP": 1, "to exchange information. Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope. Security Target - Junos 12.3 X48-D30 for SRX Platforms (NDPP, TFFWEP, VPNEP, IPSEP) Version 1.1": 1}}}, "cert_keywords": null, "report_filename": "EFS-T041 _Junos 12.3X48- NDPP-FW-VPN-IPS_  Certification Report v1.1(1) - ST ref update only.pdf", "st_filename": "Juniper (ISSX1056-2) Junos 12.3 X48 NDPP FW VPN IPS ST v1.1 (1).pdf", "cert_filename": null}, "heuristics": {"_type": "sec_certs.sample.cc_eucc_common.Heuristics", "extracted_versions": {"_type": "Set", "elements": ["12.3"]}, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": null, "cert_id": "Certificate Number: 2016/103", "prev_certificates": null, "next_certificates": null, "st_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "report_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "annotated_references": null, "extracted_sars": {"_type": "Set", "elements": [{"_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 1}]}, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": null, "protection_profiles": null, "eal": null}}