Juniper Networks Junos Pulse Secure Access Service 7.2 R4

CSV information ?

Status archived
Valid from 15.07.2013
Valid until 15.07.2018
Scheme 🇲🇾 MY
Manufacturer Juniper Networks, Inc.
Category Network and Network-Related Devices and Systems
Security level EAL3+, ALC_FLR.2

Heuristics summary ?

Certificate ID: ISCB-5-RPT-C040-CR-v1a

Certificate ?

Certification report ?

Extracted keywords

Schemes
MAC
Protocols
SSH, SSL

Security level
EAL3+, EAL3, EAL3 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FAU_STG.3, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UID.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SAE.1, FMT_SMF.1, FMT_SMR.1, FPT_STM.1, FPT_ITT.1, FTA_SSL.3, FTP_TRP.1
Certificates
ISCB-5-RPT-C040-CR-v1a

Side-channel analysis
Reverse engineering

Standards
ISO/IEC15408, ISO/IEC 18045

File metadata

Title C040 Certification Report
Subject Juniper Networks Junos Pulse Secure Access Service 7.2 R4
Keywords Secure Access
Author ISCB Department
Creation date D:20130806135033+08'00'
Modification date D:20130806135039+08'00'
Pages 29
Creator Acrobat PDFMaker 10.1 for Word
Producer Adobe PDF Library 10.0

Security target ?

Extracted keywords

Symmetric Algorithms
AES, 3DES, TDES
Hash functions
SHA-1, MD5
Protocols
SSH, SSL, TLS, VPN
Block cipher modes
CBC

Security level
EAL3
Claims
O.ACCOUN, O.AUDREC, O.ENCRYP, O.IDAUTH, O.MEDIAT, O.SECFUN, O.SECKEY, O.SECSTA, O.SELPRO, O.SINUSE, O.TOECOM, O.ENCRYPT, T.AUDACC, T.AUDFUL, T.MEDIAT, T.NOAUTH, T.OLDINF, T.PROCOM, T.REPLAY, T.SELPRO, T.TOECOM, T.TUSAGE, A.GENPUR, A.NOEVIL, A.PHYSEC, A.PUBLIC, A.SINGEN, OE.ADMTRA, OE.GENPUR, OE.GUIDAN, OE.PHYSEC, OE.PUBLIC, OE.SINGEN
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FAU_STG.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_GEN, FAU_SAR, FAU_STG, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM, FCS_COP, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1.1, FDP_IFC, FDP_IFF, FDP_RIP, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UID.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FMT_MTD.1.1, FMT_MTD.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SAE.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SAE.1.1, FMT_SAE.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF, FMT_MSA, FMT_MTD, FMT_SAE, FMT_SMF, FMT_SMR, FPT_STM.1, FPT_ITT.1, FPT_ITT.1.1, FPT_STM.1.1, FPT_STM, FPT_ITT, FTA_SSL.3, FTA_SSL.3.1, FTA_SSL, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_TRP

Standards
FIPS 197, FIPS 46-3, FIPS 180-2, FIPS 140-2, PKCS7, RFC 2246, RFC 1321

File metadata

Title Security Target
Subject Secure Access Family Version 7.2R4
Author Apex Assurance Group
Creation date D:20130515170648-07'00'
Modification date D:20130515170648-07'00'
Pages 46
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Heuristics ?

Certificate ID: ISCB-5-RPT-C040-CR-v1a

Extracted SARs

ADV_TDS.2, AGD_OPE.1, ASE_REQ.2, ALC_DVS.1, ALC_LCD.1, ALC_DEL.1, ASE_ECD.1, ASE_SPD.1, ASE_TSS.1, ASE_OBJ.2, ADV_FSP.3, AVA_VAN.2, AGD_PRE.1, ATE_COV.2, ASE_INT.1, ATE_DPT.1, ATE_IND.2, ATE_FUN.1, ALC_CMC.3, ADV_ARC.1, ASE_CCL.1, ALC_FLR.2, ALC_CMS.3

Similar certificates

Name Certificate ID
Juniper Networks Junos Pulse Access Control Service 4.2 R4 ISCB-5-RPT-C039-CR-v1a Compare

Scheme data ?

Cert No 2013-004-C040
Developer Juniper Networks, Inc.
Level EAL3+ALC_FLR.2
Product Juniper Networks Junos Pulse Secure Access Service 7.2 R4
Certification Date 15.07.2013
Expiration Date 15.07.2018
Recognition CCRA
Url https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/123
Enhanced
Cert Id C040
Product Juniper Networks Junos Pulse Secure Access Service 7.2 R4
Developer Juniper Networks, Inc1194 North Matilda Avenue,Sunnyvale, California 94089-1206UNITED STATES URL:http://www.juniper.netEmail: [email protected]: 978 589 8822
Category Access Control Devices and System
Type Set of appliance and software client running on a remote IT system that provides secure remote access to internal network resources.
Scope The Target of Evaluation (TOE) is Juniper Networks Junos Pulse Secure Access Service 7.2 R4 (hereafter referred as Secure Access) is the appliance and software client running on a remote IT system. The TOE provides secure remote access to internal network resources. The TOE acts as a secure application-layer gateway that intermediates all request between remote computers and internal corporate resources. All requests from remote computers to a Secure Access appliance and from a Secure Access appliance to remote computers are encrypted using SSL/HTTPS 168-bit encryption. All unencrypted requests (e.g. HTTP) are redirected to HTTPS, which ensures the connection is encrypted. Each request is subject to administratively defined access control and authorisation policies, such as dual-factor or client-side digital certificate authentication, before the request is forwarded to an internal resource. Users gain authenticated access to authorised resources via an extranet session hosted by the appliance. From any Internet-connected Web browser, users can access Web-based enterprise applications, Java applications, file shares and terminal hosts. Secure Access generates audit records for security events. The administrator and read-only administrator are the only roles with access to the audit trail and have the ability to view the audit trail. In the context of the evaluation, the TOE provides the following major security features: Generates audit records for security events. Cryptographic support for secure communications between users and the TOE and between TOE components. Provides information flow security policy that limits traffic to URLs and resource types, such as file servers, to specific user roles. Identification and authentication before any information flows are permitted and user must be authenticated before performing any administrative functions. Security management functions for administrator to configure the TOE, manage users, information flow policy and auditing activities. Protection of the TOE security function (TSF) by enforcing session timeouts.
Assurance Level EAL3+ALC_FLR.2
Certification Date 15.07.2013
Expiration Date 15.07.2018
Mutual Recognition CCRA
Target Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf
Report Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/ISCB-5-RPT-C040-CR-v1a.pdf
Status Archive

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2013-07-15', 'expiration_date': '2018-07-15', 'enhanced': {'__update__': {'developer': 'Juniper Networks, Inc1194 North Matilda Avenue,Sunnyvale, California 94089-1206UNITED STATES URL:http://www.juniper.netEmail: [email protected]: 978 589 8822', 'scope': 'The Target of Evaluation (TOE) is Juniper Networks Junos Pulse Secure Access Service 7.2 R4 (hereafter referred as Secure Access) is the appliance and software client running on a remote IT system. The TOE provides secure remote access to internal network resources. The TOE acts as a secure application-layer gateway that intermediates all request between remote computers and internal corporate resources. All requests from remote computers to a Secure Access appliance and from a Secure Access appliance to remote computers are encrypted using SSL/HTTPS 168-bit encryption. All unencrypted requests (e.g. HTTP) are redirected to HTTPS, which ensures the connection is encrypted. Each request is subject to administratively defined access control and authorisation policies, such as dual-factor or client-side digital certificate authentication, before the request is forwarded to an internal resource. Users gain authenticated access to authorised resources via an extranet session hosted by the appliance. From any Internet-connected Web browser, users can access Web-based enterprise applications, Java applications, file shares and terminal hosts. Secure Access generates audit records for security events. The administrator and read-only administrator are the only roles with access to the audit trail and have the ability to view the audit trail. In the context of the evaluation, the TOE provides the following major security features: Generates audit records for security events. Cryptographic support for secure communications between users and the TOE and between TOE components. Provides information flow security policy that limits traffic to URLs and resource types, such as file servers, to specific user roles. Identification and authentication before any information flows are permitted and user must be authenticated before performing any administrative functions. Security management functions for administrator to configure the TOE, manage users, information flow policy and auditing activities. Protection of the TOE security function (TSF) by enforcing session timeouts.', 'certification_date': '2013-07-15', 'expiration_date': '2018-07-15'}}} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0e99b078de87a30a5dda76a2c47cfa1032c99c866ff68e6ffe374991a05cdc71', 'txt_hash': 'd8145e32a06ceaf0f03a0ad87a076b9217a7a5f91e944004f69cb14b2ea28fe0'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f7ae8ec876e912873a56975578fe9a93baa021a286ee90bd268b74e66b3ac32f', 'txt_hash': '14595870b37ddce7aebbad56f2c4eda6d07e82011af11c78bfa2084ae85f13a9'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 317229, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 29, '/Author': 'ISCB Department', '/Category': 'PUBLIC', '/Caveat': 'FINAL', '/Classification': 'PUBLIC', '/Company': 'CyberSecurity Malaysia', '/CreationDate': "D:20130806135033+08'00'", '/Creator': 'Acrobat PDFMaker 10.1 for Word', '/Developer': 'Juniper Networks', '/Document Type': 'REPORT', '/Identifier': 'ISCB-5-RPT-C040-CR-v1a', '/Index': 'MyCB_TMP_011', '/Keywords': 'Secure Access', '/ModDate': "D:20130806135039+08'00'", '/Phase': 'External', '/Producer': 'Adobe PDF Library 10.0', '/Project Code': 'C040', '/Released': '15 July 2013', '/ST Title': 'Security Target: Juniper Networks Junos Pulse Secure Access Service 7.2 R4', '/ST Version': 'v1.4', '/SourceModified': 'D:20130806055016', '/Sponsor': 'Juniper Networks', '/Subject': 'Juniper Networks Junos Pulse Secure Access Service 7.2 R4', '/TOE Name': 'Juniper Networks Junos Pulse Secure Access Service', '/TOE Version': '7.2 R4', '/Title': 'C040 Certification Report', '/Version': 'v1a', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.cybersecurity.my/mycc']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1078324, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 46, '/Title': 'Security Target', '/Author': 'Apex Assurance Group', '/Subject': 'Secure Access Family Version 7.2R4', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20130515170648-07'00'", '/ModDate': "D:20130515170648-07'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.apexassurance.com/', 'http://www.juniper.net/']}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'MY': {'ISCB-5-RPT-C040-CR-v1a': 28}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3+': 6, 'EAL3': 6, 'EAL3 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 12}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_SAR.1': 1, 'FAU_STG.1': 1, 'FAU_STG.3': 1}, 'FCS': {'FCS_CKM.1': 1, 'FCS_CKM.2': 1, 'FCS_CKM.4': 1, 'FCS_COP.1': 1}, 'FDP': {'FDP_IFC.1': 1, 'FDP_IFF.1': 1, 'FDP_RIP.1': 1}, 'FIA': {'FIA_ATD.1': 1, 'FIA_SOS.1': 1, 'FIA_UAU.2': 1, 'FIA_UID.2': 1}, 'FMT': {'FMT_MOF.1': 1, 'FMT_MSA.1': 1, 'FMT_MSA.2': 1, 'FMT_MSA.3': 1, 'FMT_MTD.1': 1, 'FMT_SAE.1': 1, 'FMT_SMF.1': 1, 'FMT_SMR.1': 1}, 'FPT': {'FPT_STM.1': 1, 'FPT_ITT.1': 1}, 'FTA': {'FTA_SSL.3': 1}, 'FTP': {'FTP_TRP.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'SSH': {'SSH': 1}, 'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'Reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 6}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.3': 2, 'ADV_TDS.2': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.3': 2, 'ALC_CMS.3': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 7, 'FAU_SAR.1': 5, 'FAU_STG.1': 6, 'FAU_STG.3': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_GEN': 1, 'FAU_SAR': 1, 'FAU_STG': 2}, 'FCS': {'FCS_CKM.1': 5, 'FCS_CKM.2': 5, 'FCS_CKM.4': 5, 'FCS_COP.1': 10, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1, 'FCS_CKM': 3, 'FCS_COP': 1}, 'FDP': {'FDP_IFC.1': 5, 'FDP_IFF.1': 6, 'FDP_RIP.1': 5, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_RIP.1.1': 1, 'FDP_IFC': 1, 'FDP_IFF': 1, 'FDP_RIP': 1}, 'FIA': {'FIA_ATD.1': 9, 'FIA_SOS.1': 6, 'FIA_UAU.2': 6, 'FIA_UID.2': 7, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_ATD': 1, 'FIA_SOS': 1, 'FIA_UAU': 1, 'FIA_UID': 1}, 'FMT': {'FMT_MTD.1.1': 3, 'FMT_MTD.1': 10, 'FMT_MOF.1': 10, 'FMT_MSA.1': 8, 'FMT_MSA.2': 8, 'FMT_MSA.3': 8, 'FMT_SAE.1': 5, 'FMT_SMF.1': 5, 'FMT_SMR.1': 7, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF': 1, 'FMT_MSA': 3, 'FMT_MTD': 1, 'FMT_SAE': 1, 'FMT_SMF': 1, 'FMT_SMR': 1}, 'FPT': {'FPT_STM.1': 6, 'FPT_ITT.1': 5, 'FPT_ITT.1.1': 1, 'FPT_STM.1.1': 1, 'FPT_STM': 1, 'FPT_ITT': 1}, 'FTA': {'FTA_SSL.3': 5, 'FTA_SSL.3.1': 1, 'FTA_SSL': 1}, 'FTP': {'FTP_TRP.1': 5, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.ACCOUN': 7, 'O.AUDREC': 9, 'O.ENCRYP': 12, 'O.IDAUTH': 11, 'O.MEDIAT': 17, 'O.SECFUN': 20, 'O.SECKEY': 9, 'O.SECSTA': 15, 'O.SELPRO': 9, 'O.SINUSE': 7, 'O.TOECOM': 6, 'O.ENCRYPT': 1}, 'T': {'T.AUDACC': 5, 'T.AUDFUL': 4, 'T.MEDIAT': 4, 'T.NOAUTH': 3, 'T.OLDINF': 4, 'T.PROCOM': 4, 'T.REPLAY': 4, 'T.SELPRO': 4, 'T.TOECOM': 5, 'T.TUSAGE': 5}, 'A': {'A.GENPUR': 2, 'A.NOEVIL': 2, 'A.PHYSEC': 3, 'A.PUBLIC': 1, 'A.SINGEN': 2}, 'OE': {'OE.ADMTRA': 4, 'OE.GENPUR': 3, 'OE.GUIDAN': 4, 'OE.PHYSEC': 3, 'OE.PUBLIC': 3, 'OE.SINGEN': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'3DES': {'3DES': 1, 'TDES': 5}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}, 'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 2}}, 'VPN': {'VPN': 2}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 2, 'FIPS 46-3': 2, 'FIPS 180-2': 1, 'FIPS 140-2': 1}, 'PKCS': {'PKCS7': 1}, 'RFC': {'RFC 2246': 1, 'RFC 1321': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ISCB-5-RPT-C040-CR-v1a.pdf.
    • The st_filename property was set to JNPR SA 7.2R4 EAL3 ST v1.4.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ISCB-5-RPT-C040-CR-v1a.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C040-CR-v1a.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Juniper Networks Junos Pulse Secure Access Service 7.2 R4 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "7116d2046dcede84",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-5-RPT-C040-CR-v1a",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7.2"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_no": "2013-004-C040",
      "certification_date": "2013-07-15",
      "developer": "Juniper Networks, Inc.",
      "enhanced": {
        "assurance_level": "EAL3+ALC_FLR.2",
        "category": "Access Control Devices and System",
        "cert_id": "C040",
        "certification_date": "2013-07-15",
        "developer": "Juniper Networks, Inc1194 North Matilda Avenue,Sunnyvale, California 94089-1206UNITED STATES URL:http://www.juniper.netEmail: [email protected]: 978 589 8822",
        "expiration_date": "2018-07-15",
        "mutual_recognition": "CCRA",
        "product": "Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
        "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/ISCB-5-RPT-C040-CR-v1a.pdf",
        "scope": "The Target of Evaluation (TOE) is Juniper Networks Junos Pulse Secure Access Service 7.2 R4 (hereafter referred as Secure Access) is the appliance and software client running on a remote IT system. The TOE provides secure remote access to internal network resources. The TOE acts as a secure application-layer gateway that intermediates all request between remote computers and internal corporate resources. All requests from remote computers to a Secure Access appliance and from a Secure Access appliance to remote computers are encrypted using SSL/HTTPS 168-bit encryption. All unencrypted requests (e.g. HTTP) are redirected to HTTPS, which ensures the connection is encrypted. Each request is subject to administratively defined access control and authorisation policies, such as dual-factor or client-side digital certificate authentication, before the request is forwarded to an internal resource. Users gain authenticated access to authorised resources via an extranet session hosted by the appliance. From any Internet-connected Web browser, users can access Web-based enterprise applications, Java applications, file shares and terminal hosts. Secure Access generates audit records for security events. The administrator and read-only administrator are the only roles with access to the audit trail and have the ability to view the audit trail. In the context of the evaluation, the TOE provides the following major security features: Generates audit records for security events. Cryptographic support for secure communications between users and the TOE and between TOE components. Provides information flow security policy that limits traffic to URLs and resource types, such as file servers, to specific user roles. Identification and authentication before any information flows are permitted and user must be authenticated before performing any administrative functions. Security management functions for administrator to configure the TOE, manage users, information flow policy and auditing activities. Protection of the TOE security function (TSF) by enforcing session timeouts.",
        "status": "Archive",
        "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf",
        "type": "Set of appliance and software client running on a remote IT system that provides secure remote access to internal network resources."
      },
      "expiration_date": "2018-07-15",
      "level": "EAL3+ALC_FLR.2",
      "product": "Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
      "recognition": "CCRA",
      "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/123"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Juniper Networks, Inc.",
  "manufacturer_web": "https://www.juniper.net/",
  "name": "Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
  "not_valid_after": "2018-07-15",
  "not_valid_before": "2013-07-15",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ISCB-5-RPT-C040-CR-v1a.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "MY": {
          "ISCB-5-RPT-C040-CR-v1a": 28
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 12
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 6,
          "EAL3 augmented": 1,
          "EAL3+": 6
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_SAR.1": 1,
          "FAU_STG.1": 1,
          "FAU_STG.3": 1
        },
        "FCS": {
          "FCS_CKM.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 1,
          "FCS_COP.1": 1
        },
        "FDP": {
          "FDP_IFC.1": 1,
          "FDP_IFF.1": 1,
          "FDP_RIP.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 1,
          "FIA_SOS.1": 1,
          "FIA_UAU.2": 1,
          "FIA_UID.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 1,
          "FMT_MSA.1": 1,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 1,
          "FMT_MTD.1": 1,
          "FMT_SAE.1": 1,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_ITT.1": 1,
          "FPT_STM.1": 1
        },
        "FTA": {
          "FTA_SSL.3": 1
        },
        "FTP": {
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "Reverse engineering": 1
        }
      },
      "standard_id": {
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "ISCB Department",
      "/Category": "PUBLIC",
      "/Caveat": "FINAL",
      "/Classification": "PUBLIC",
      "/Company": "CyberSecurity Malaysia",
      "/CreationDate": "D:20130806135033+08\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 10.1 for Word",
      "/Developer": "Juniper Networks",
      "/Document Type": "REPORT",
      "/Identifier": "ISCB-5-RPT-C040-CR-v1a",
      "/Index": "MyCB_TMP_011",
      "/Keywords": "Secure Access",
      "/ModDate": "D:20130806135039+08\u002700\u0027",
      "/Phase": "External",
      "/Producer": "Adobe PDF Library 10.0",
      "/Project Code": "C040",
      "/Released": "15 July 2013",
      "/ST Title": "Security Target: Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
      "/ST Version": "v1.4",
      "/SourceModified": "D:20130806055016",
      "/Sponsor": "Juniper Networks",
      "/Subject": "Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
      "/TOE Name": "Juniper Networks Junos Pulse Secure Access Service",
      "/TOE Version": "7.2 R4",
      "/Title": "C040 Certification Report",
      "/Version": "v1a",
      "pdf_file_size_bytes": 317229,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://www.cybersecurity.my/mycc"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 29
    },
    "st_filename": "JNPR SA 7.2R4 EAL3 ST v1.4.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.GENPUR": 2,
          "A.NOEVIL": 2,
          "A.PHYSEC": 3,
          "A.PUBLIC": 1,
          "A.SINGEN": 2
        },
        "O": {
          "O.ACCOUN": 7,
          "O.AUDREC": 9,
          "O.ENCRYP": 12,
          "O.ENCRYPT": 1,
          "O.IDAUTH": 11,
          "O.MEDIAT": 17,
          "O.SECFUN": 20,
          "O.SECKEY": 9,
          "O.SECSTA": 15,
          "O.SELPRO": 9,
          "O.SINUSE": 7,
          "O.TOECOM": 6
        },
        "OE": {
          "OE.ADMTRA": 4,
          "OE.GENPUR": 3,
          "OE.GUIDAN": 4,
          "OE.PHYSEC": 3,
          "OE.PUBLIC": 3,
          "OE.SINGEN": 3
        },
        "T": {
          "T.AUDACC": 5,
          "T.AUDFUL": 4,
          "T.MEDIAT": 4,
          "T.NOAUTH": 3,
          "T.OLDINF": 4,
          "T.PROCOM": 4,
          "T.REPLAY": 4,
          "T.SELPRO": 4,
          "T.TOECOM": 5,
          "T.TUSAGE": 5
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.3": 2,
          "ADV_TDS.2": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.3": 2,
          "ALC_CMS.3": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 2,
          "ALC_FLR.2": 5,
          "ALC_LCD.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 6
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 7,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR": 1,
          "FAU_SAR.1": 5,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG": 2,
          "FAU_STG.1": 6,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 6,
          "FAU_STG.3.1": 1
        },
        "FCS": {
          "FCS_CKM": 3,
          "FCS_CKM.1": 5,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 5,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 5,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 1,
          "FCS_COP.1": 10,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_IFC": 1,
          "FDP_IFC.1": 5,
          "FDP_IFC.1.1": 1,
          "FDP_IFF": 1,
          "FDP_IFF.1": 6,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_RIP": 1,
          "FDP_RIP.1": 5,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_ATD": 1,
          "FIA_ATD.1": 9,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 1,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.2": 6,
          "FIA_UAU.2.1": 1,
          "FIA_UID": 1,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_MOF.1": 10,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 3,
          "FMT_MSA.1": 8,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 8,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 8,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 1,
          "FMT_MTD.1": 10,
          "FMT_MTD.1.1": 3,
          "FMT_SAE": 1,
          "FMT_SAE.1": 5,
          "FMT_SAE.1.1": 1,
          "FMT_SAE.1.2": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 5,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 7,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITT": 1,
          "FPT_ITT.1": 5,
          "FPT_ITT.1.1": 1,
          "FPT_STM": 1,
          "FPT_STM.1": 6,
          "FPT_STM.1.1": 1
        },
        "FTA": {
          "FTA_SSL": 1,
          "FTA_SSL.3": 5,
          "FTA_SSL.3.1": 1
        },
        "FTP": {
          "FTP_TRP": 1,
          "FTP_TRP.1": 5,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 2
          }
        },
        "VPN": {
          "VPN": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 180-2": 1,
          "FIPS 197": 2,
          "FIPS 46-3": 2
        },
        "PKCS": {
          "PKCS7": 1
        },
        "RFC": {
          "RFC 1321": 1,
          "RFC 2246": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "TDES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Apex Assurance Group",
      "/CreationDate": "D:20130515170648-07\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20130515170648-07\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "Secure Access Family Version 7.2R4",
      "/Title": "Security Target",
      "pdf_file_size_bytes": 1078324,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.juniper.net/",
          "http://www.apexassurance.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 46
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C040-CR-v1a.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL3+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "0e99b078de87a30a5dda76a2c47cfa1032c99c866ff68e6ffe374991a05cdc71",
      "txt_hash": "d8145e32a06ceaf0f03a0ad87a076b9217a7a5f91e944004f69cb14b2ea28fe0"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f7ae8ec876e912873a56975578fe9a93baa021a286ee90bd268b74e66b3ac32f",
      "txt_hash": "14595870b37ddce7aebbad56f2c4eda6d07e82011af11c78bfa2084ae85f13a9"
    }
  },
  "status": "archived"
}