Juniper Networks Junos Pulse Secure Access Service 7.2 R4

CSV information

Status archived
Valid from 15.07.2013
Valid until 15.07.2018
Scheme 🇲🇾 MY
Manufacturer HPE Juniper Networking
Category Network and Network-Related Devices and Systems
Security level ALC_FLR.2, EAL3+

Heuristics summary

Certificate ID: ISCB-5-RPT-C040-CR-v1a

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Schemes
MAC
Protocols
SSH, SSL

Security level
EAL3+, EAL3, EAL3 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FAU_STG.3, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UID.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SAE.1, FMT_SMF.1, FMT_SMR.1, FPT_STM.1, FPT_ITT.1, FTA_SSL.3, FTP_TRP.1
Certificates
ISCB-5-RPT-C040-CR-v1a

Side-channel analysis
Reverse engineering

Standards
ISO/IEC15408, ISO/IEC 18045

File metadata

Title C040 Certification Report
Subject Juniper Networks Junos Pulse Secure Access Service 7.2 R4
Keywords Secure Access
Author ISCB Department
Creation date D:20130806135033+08'00'
Modification date D:20130806135039+08'00'
Pages 29
Creator Acrobat PDFMaker 10.1 for Word
Producer Adobe PDF Library 10.0

Security target

Extracted keywords

Symmetric Algorithms
AES, 3DES, TDES
Hash functions
SHA-1, MD5
Protocols
SSH, SSL, TLS, VPN
Block cipher modes
CBC

Security level
EAL3
Claims
O.ACCOUN, O.AUDREC, O.ENCRYP, O.IDAUTH, O.MEDIAT, O.SECFUN, O.SECKEY, O.SECSTA, O.SELPRO, O.SINUSE, O.TOECOM, O.ENCRYPT, T.AUDACC, T.AUDFUL, T.MEDIAT, T.NOAUTH, T.OLDINF, T.PROCOM, T.REPLAY, T.SELPRO, T.TOECOM, T.TUSAGE, A.GENPUR, A.NOEVIL, A.PHYSEC, A.PUBLIC, A.SINGEN, OE.ADMTRA, OE.GENPUR, OE.GUIDAN, OE.PHYSEC, OE.PUBLIC, OE.SINGEN
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FAU_STG.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_GEN, FAU_SAR, FAU_STG, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM, FCS_COP, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1.1, FDP_IFC, FDP_IFF, FDP_RIP, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UID.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FMT_MTD.1.1, FMT_MTD.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SAE.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SAE.1.1, FMT_SAE.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF, FMT_MSA, FMT_MTD, FMT_SAE, FMT_SMF, FMT_SMR, FPT_STM.1, FPT_ITT.1, FPT_ITT.1.1, FPT_STM.1.1, FPT_STM, FPT_ITT, FTA_SSL.3, FTA_SSL.3.1, FTA_SSL, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_TRP

Standards
FIPS 197, FIPS 46-3, FIPS 180-2, FIPS 140-2, PKCS7, RFC 2246, RFC 1321

File metadata

Title Security Target
Subject Secure Access Family Version 7.2R4
Author Apex Assurance Group
Creation date D:20130515170648-07'00'
Modification date D:20130515170648-07'00'
Pages 46
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ISCB-5-RPT-C040-CR-v1a

Extracted SARs

ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Similar certificates

Name Certificate ID
Juniper Networks Junos Pulse Access Control Service 4.2 R4 ISCB-5-RPT-C039-CR-v1a Compare

Scheme data

Cert No 2013-004-C040
Developer Juniper Networks, Inc.
Level EAL3+ALC_FLR.2
Product Juniper Networks Junos Pulse Secure Access Service 7.2 R4
Certification Date 15.07.2013
Expiration Date 15.07.2018
Recognition CCRA
Url https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/123
Enhanced
Developer Juniper Networks, Inc1194 North Matilda Avenue,Sunnyvale, California 94089-1206UNITED STATES URL:http://www.juniper.netEmail: [email protected]: 978 589 8822
Status Archive
Scope The Target of Evaluation (TOE) is Juniper Networks Junos Pulse Secure Access Service 7.2 R4 (hereafter referred as Secure Access) is the appliance and software client running on a remote IT system. The TOE provides secure remote access to internal network resources. The TOE acts as a secure application-layer gateway that intermediates all request between remote computers and internal corporate resources. All requests from remote computers to a Secure Access appliance and from a Secure Access appliance to remote computers are encrypted using SSL/HTTPS 168-bit encryption. All unencrypted requests (e.g. HTTP) are redirected to HTTPS, which ensures the connection is encrypted. Each request is subject to administratively defined access control and authorisation policies, such as dual-factor or client-side digital certificate authentication, before the request is forwarded to an internal resource. Users gain authenticated access to authorised resources via an extranet session hosted by the appliance. From any Internet-connected Web browser, users can access Web-based enterprise applications, Java applications, file shares and terminal hosts. Secure Access generates audit records for security events. The administrator and read-only administrator are the only roles with access to the audit trail and have the ability to view the audit trail. In the context of the evaluation, the TOE provides the following major security features: Generates audit records for security events. Cryptographic support for secure communications between users and the TOE and between TOE components. Provides information flow security policy that limits traffic to URLs and resource types, such as file servers, to specific user roles. Identification and authentication before any information flows are permitted and user must be authenticated before performing any administrative functions. Security management functions for administrator to configure the TOE, manage users, information flow policy and auditing activities. Protection of the TOE security function (TSF) by enforcing session timeouts.
Cert Id C040
Category Access Control Devices and System
Assurance Level EAL3+ALC_FLR.2
Product Juniper Networks Junos Pulse Secure Access Service 7.2 R4
Certification Date 15.07.2013
Expiration Date 15.07.2018
Mutual Recognition CCRA
Target Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf
Report Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/ISCB-5-RPT-C040-CR-v1a.pdf
Type Set of appliance and software client running on a remote IT system that provides secure remote access to internal network resources.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "7116d2046dcede84",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-5-RPT-C040-CR-v1a",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL3+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_no": "2013-004-C040",
      "certification_date": "2013-07-15",
      "developer": "Juniper Networks, Inc.",
      "enhanced": {
        "assurance_level": "EAL3+ALC_FLR.2",
        "category": "Access Control Devices and System",
        "cert_id": "C040",
        "certification_date": "2013-07-15",
        "developer": "Juniper Networks, Inc1194 North Matilda Avenue,Sunnyvale, California 94089-1206UNITED STATES URL:http://www.juniper.netEmail: [email protected]: 978 589 8822",
        "expiration_date": "2018-07-15",
        "mutual_recognition": "CCRA",
        "product": "Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
        "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/ISCB-5-RPT-C040-CR-v1a.pdf",
        "scope": "The Target of Evaluation (TOE) is Juniper Networks Junos Pulse Secure Access Service 7.2 R4 (hereafter referred as Secure Access) is the appliance and software client running on a remote IT system. The TOE provides secure remote access to internal network resources. The TOE acts as a secure application-layer gateway that intermediates all request between remote computers and internal corporate resources. All requests from remote computers to a Secure Access appliance and from a Secure Access appliance to remote computers are encrypted using SSL/HTTPS 168-bit encryption. All unencrypted requests (e.g. HTTP) are redirected to HTTPS, which ensures the connection is encrypted. Each request is subject to administratively defined access control and authorisation policies, such as dual-factor or client-side digital certificate authentication, before the request is forwarded to an internal resource. Users gain authenticated access to authorised resources via an extranet session hosted by the appliance. From any Internet-connected Web browser, users can access Web-based enterprise applications, Java applications, file shares and terminal hosts. Secure Access generates audit records for security events. The administrator and read-only administrator are the only roles with access to the audit trail and have the ability to view the audit trail. In the context of the evaluation, the TOE provides the following major security features: Generates audit records for security events. Cryptographic support for secure communications between users and the TOE and between TOE components. Provides information flow security policy that limits traffic to URLs and resource types, such as file servers, to specific user roles. Identification and authentication before any information flows are permitted and user must be authenticated before performing any administrative functions. Security management functions for administrator to configure the TOE, manage users, information flow policy and auditing activities. Protection of the TOE security function (TSF) by enforcing session timeouts.",
        "status": "Archive",
        "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf",
        "type": "Set of appliance and software client running on a remote IT system that provides secure remote access to internal network resources."
      },
      "expiration_date": "2018-07-15",
      "level": "EAL3+ALC_FLR.2",
      "product": "Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
      "recognition": "CCRA",
      "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/123"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "HPE Juniper Networking",
  "manufacturer_web": "https://www.juniper.net/",
  "name": "Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
  "not_valid_after": "2018-07-15",
  "not_valid_before": "2013-07-15",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ISCB-5-RPT-C040-CR-v1a.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "MY": {
          "ISCB-5-RPT-C040-CR-v1a": 28
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 12
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 6,
          "EAL3 augmented": 1,
          "EAL3+": 6
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_SAR.1": 1,
          "FAU_STG.1": 1,
          "FAU_STG.3": 1
        },
        "FCS": {
          "FCS_CKM.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 1,
          "FCS_COP.1": 1
        },
        "FDP": {
          "FDP_IFC.1": 1,
          "FDP_IFF.1": 1,
          "FDP_RIP.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 1,
          "FIA_SOS.1": 1,
          "FIA_UAU.2": 1,
          "FIA_UID.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 1,
          "FMT_MSA.1": 1,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 1,
          "FMT_MTD.1": 1,
          "FMT_SAE.1": 1,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_ITT.1": 1,
          "FPT_STM.1": 1
        },
        "FTA": {
          "FTA_SSL.3": 1
        },
        "FTP": {
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "Reverse engineering": 1
        }
      },
      "standard_id": {
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "ISCB Department",
      "/Category": "PUBLIC",
      "/Caveat": "FINAL",
      "/Classification": "PUBLIC",
      "/Company": "CyberSecurity Malaysia",
      "/CreationDate": "D:20130806135033+08\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 10.1 for Word",
      "/Developer": "Juniper Networks",
      "/Document Type": "REPORT",
      "/Identifier": "ISCB-5-RPT-C040-CR-v1a",
      "/Index": "MyCB_TMP_011",
      "/Keywords": "Secure Access",
      "/ModDate": "D:20130806135039+08\u002700\u0027",
      "/Phase": "External",
      "/Producer": "Adobe PDF Library 10.0",
      "/Project Code": "C040",
      "/Released": "15 July 2013",
      "/ST Title": "Security Target: Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
      "/ST Version": "v1.4",
      "/SourceModified": "D:20130806055016",
      "/Sponsor": "Juniper Networks",
      "/Subject": "Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
      "/TOE Name": "Juniper Networks Junos Pulse Secure Access Service",
      "/TOE Version": "7.2 R4",
      "/Title": "C040 Certification Report",
      "/Version": "v1a",
      "pdf_file_size_bytes": 317229,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://www.cybersecurity.my/mycc"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 29
    },
    "st_filename": "JNPR SA 7.2R4 EAL3 ST v1.4.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.GENPUR": 2,
          "A.NOEVIL": 2,
          "A.PHYSEC": 3,
          "A.PUBLIC": 1,
          "A.SINGEN": 2
        },
        "O": {
          "O.ACCOUN": 7,
          "O.AUDREC": 9,
          "O.ENCRYP": 12,
          "O.ENCRYPT": 1,
          "O.IDAUTH": 11,
          "O.MEDIAT": 17,
          "O.SECFUN": 20,
          "O.SECKEY": 9,
          "O.SECSTA": 15,
          "O.SELPRO": 9,
          "O.SINUSE": 7,
          "O.TOECOM": 6
        },
        "OE": {
          "OE.ADMTRA": 4,
          "OE.GENPUR": 3,
          "OE.GUIDAN": 4,
          "OE.PHYSEC": 3,
          "OE.PUBLIC": 3,
          "OE.SINGEN": 3
        },
        "T": {
          "T.AUDACC": 5,
          "T.AUDFUL": 4,
          "T.MEDIAT": 4,
          "T.NOAUTH": 3,
          "T.OLDINF": 4,
          "T.PROCOM": 4,
          "T.REPLAY": 4,
          "T.SELPRO": 4,
          "T.TOECOM": 5,
          "T.TUSAGE": 5
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.3": 2,
          "ADV_TDS.2": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.3": 2,
          "ALC_CMS.3": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 2,
          "ALC_FLR.2": 5,
          "ALC_LCD.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 6
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 7,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR": 1,
          "FAU_SAR.1": 5,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG": 2,
          "FAU_STG.1": 6,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 6,
          "FAU_STG.3.1": 1
        },
        "FCS": {
          "FCS_CKM": 3,
          "FCS_CKM.1": 5,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 5,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 5,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 1,
          "FCS_COP.1": 10,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_IFC": 1,
          "FDP_IFC.1": 5,
          "FDP_IFC.1.1": 1,
          "FDP_IFF": 1,
          "FDP_IFF.1": 6,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_RIP": 1,
          "FDP_RIP.1": 5,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_ATD": 1,
          "FIA_ATD.1": 9,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 1,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.2": 6,
          "FIA_UAU.2.1": 1,
          "FIA_UID": 1,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_MOF.1": 10,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 3,
          "FMT_MSA.1": 8,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 8,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 8,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 1,
          "FMT_MTD.1": 10,
          "FMT_MTD.1.1": 3,
          "FMT_SAE": 1,
          "FMT_SAE.1": 5,
          "FMT_SAE.1.1": 1,
          "FMT_SAE.1.2": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 5,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 7,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITT": 1,
          "FPT_ITT.1": 5,
          "FPT_ITT.1.1": 1,
          "FPT_STM": 1,
          "FPT_STM.1": 6,
          "FPT_STM.1.1": 1
        },
        "FTA": {
          "FTA_SSL": 1,
          "FTA_SSL.3": 5,
          "FTA_SSL.3.1": 1
        },
        "FTP": {
          "FTP_TRP": 1,
          "FTP_TRP.1": 5,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 2
          }
        },
        "VPN": {
          "VPN": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 180-2": 1,
          "FIPS 197": 2,
          "FIPS 46-3": 2
        },
        "PKCS": {
          "PKCS7": 1
        },
        "RFC": {
          "RFC 1321": 1,
          "RFC 2246": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "TDES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Apex Assurance Group",
      "/CreationDate": "D:20130515170648-07\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20130515170648-07\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "Secure Access Family Version 7.2R4",
      "/Title": "Security Target",
      "pdf_file_size_bytes": 1078324,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.juniper.net/",
          "http://www.apexassurance.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 46
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C040-CR-v1a.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL3+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "0e99b078de87a30a5dda76a2c47cfa1032c99c866ff68e6ffe374991a05cdc71",
      "txt_hash": "d8145e32a06ceaf0f03a0ad87a076b9217a7a5f91e944004f69cb14b2ea28fe0"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "f7ae8ec876e912873a56975578fe9a93baa021a286ee90bd268b74e66b3ac32f",
      "txt_hash": "14595870b37ddce7aebbad56f2c4eda6d07e82011af11c78bfa2084ae85f13a9"
    }
  },
  "status": "archived"
}