Juniper Networks Junos Pulse Secure Access Service 7.2 R4
CSV information ?
Status | archived |
---|---|
Valid from | 15.07.2013 |
Valid until | 15.07.2018 |
Scheme | 🇲🇾 MY |
Manufacturer | Juniper Networks, Inc. |
Category | Network and Network-Related Devices and Systems |
Security level | EAL3+, ALC_FLR.2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Schemes
MACProtocols
SSH, SSLSecurity level
EAL3+, EAL3, EAL3 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FAU_STG.3, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UID.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SAE.1, FMT_SMF.1, FMT_SMR.1, FPT_STM.1, FPT_ITT.1, FTA_SSL.3, FTP_TRP.1Certificates
ISCB-5-RPT-C040-CR-v1aSide-channel analysis
Reverse engineeringStandards
ISO/IEC15408, ISO/IEC 18045File metadata
Title | C040 Certification Report |
---|---|
Subject | Juniper Networks Junos Pulse Secure Access Service 7.2 R4 |
Keywords | Secure Access |
Author | ISCB Department |
Creation date | D:20130806135033+08'00' |
Modification date | D:20130806135039+08'00' |
Pages | 29 |
Creator | Acrobat PDFMaker 10.1 for Word |
Producer | Adobe PDF Library 10.0 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, 3DES, TDESHash functions
SHA-1, MD5Protocols
SSH, SSL, TLS, VPNBlock cipher modes
CBCSecurity level
EAL3Claims
O.ACCOUN, O.AUDREC, O.ENCRYP, O.IDAUTH, O.MEDIAT, O.SECFUN, O.SECKEY, O.SECSTA, O.SELPRO, O.SINUSE, O.TOECOM, O.ENCRYPT, T.AUDACC, T.AUDFUL, T.MEDIAT, T.NOAUTH, T.OLDINF, T.PROCOM, T.REPLAY, T.SELPRO, T.TOECOM, T.TUSAGE, A.GENPUR, A.NOEVIL, A.PHYSEC, A.PUBLIC, A.SINGEN, OE.ADMTRA, OE.GENPUR, OE.GUIDAN, OE.PHYSEC, OE.PUBLIC, OE.SINGENSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FAU_STG.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_GEN, FAU_SAR, FAU_STG, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM, FCS_COP, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1.1, FDP_IFC, FDP_IFF, FDP_RIP, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UID.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FMT_MTD.1.1, FMT_MTD.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SAE.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SAE.1.1, FMT_SAE.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF, FMT_MSA, FMT_MTD, FMT_SAE, FMT_SMF, FMT_SMR, FPT_STM.1, FPT_ITT.1, FPT_ITT.1.1, FPT_STM.1.1, FPT_STM, FPT_ITT, FTA_SSL.3, FTA_SSL.3.1, FTA_SSL, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_TRPStandards
FIPS 197, FIPS 46-3, FIPS 180-2, FIPS 140-2, PKCS7, RFC 2246, RFC 1321File metadata
Title | Security Target |
---|---|
Subject | Secure Access Family Version 7.2R4 |
Author | Apex Assurance Group |
Creation date | D:20130515170648-07'00' |
Modification date | D:20130515170648-07'00' |
Pages | 46 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Heuristics ?
Extracted SARs
ADV_TDS.2, AGD_OPE.1, ASE_REQ.2, ALC_DVS.1, ALC_LCD.1, ALC_DEL.1, ASE_ECD.1, ASE_SPD.1, ASE_TSS.1, ASE_OBJ.2, ADV_FSP.3, AVA_VAN.2, AGD_PRE.1, ATE_COV.2, ASE_INT.1, ATE_DPT.1, ATE_IND.2, ATE_FUN.1, ALC_CMC.3, ADV_ARC.1, ASE_CCL.1, ALC_FLR.2, ALC_CMS.3Similar certificates
Name | Certificate ID | |
---|---|---|
Juniper Networks Junos Pulse Access Control Service 4.2 R4 | ISCB-5-RPT-C039-CR-v1a | Compare |
Scheme data ?
Cert No | 2013-004-C040 | |
---|---|---|
Developer | Juniper Networks, Inc. | |
Level | EAL3+ALC_FLR.2 | |
Product | Juniper Networks Junos Pulse Secure Access Service 7.2 R4 | |
Certification Date | 15.07.2013 | |
Expiration Date | 15.07.2018 | |
Recognition | CCRA | |
Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/123 | |
Enhanced | ||
Cert Id | C040 | |
Product | Juniper Networks Junos Pulse Secure Access Service 7.2 R4 | |
Developer | Juniper Networks, Inc1194 North Matilda Avenue,Sunnyvale, California 94089-1206UNITED STATES URL:http://www.juniper.netEmail: [email protected]: 978 589 8822 | |
Category | Access Control Devices and System | |
Type | Set of appliance and software client running on a remote IT system that provides secure remote access to internal network resources. | |
Scope | The Target of Evaluation (TOE) is Juniper Networks Junos Pulse Secure Access Service 7.2 R4 (hereafter referred as Secure Access) is the appliance and software client running on a remote IT system. The TOE provides secure remote access to internal network resources. The TOE acts as a secure application-layer gateway that intermediates all request between remote computers and internal corporate resources. All requests from remote computers to a Secure Access appliance and from a Secure Access appliance to remote computers are encrypted using SSL/HTTPS 168-bit encryption. All unencrypted requests (e.g. HTTP) are redirected to HTTPS, which ensures the connection is encrypted. Each request is subject to administratively defined access control and authorisation policies, such as dual-factor or client-side digital certificate authentication, before the request is forwarded to an internal resource. Users gain authenticated access to authorised resources via an extranet session hosted by the appliance. From any Internet-connected Web browser, users can access Web-based enterprise applications, Java applications, file shares and terminal hosts. Secure Access generates audit records for security events. The administrator and read-only administrator are the only roles with access to the audit trail and have the ability to view the audit trail. In the context of the evaluation, the TOE provides the following major security features: Generates audit records for security events. Cryptographic support for secure communications between users and the TOE and between TOE components. Provides information flow security policy that limits traffic to URLs and resource types, such as file servers, to specific user roles. Identification and authentication before any information flows are permitted and user must be authenticated before performing any administrative functions. Security management functions for administrator to configure the TOE, manage users, information flow policy and auditing activities. Protection of the TOE security function (TSF) by enforcing session timeouts. | |
Assurance Level | EAL3+ALC_FLR.2 | |
Certification Date | 15.07.2013 | |
Expiration Date | 15.07.2018 | |
Mutual Recognition | CCRA | |
Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf | |
Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/ISCB-5-RPT-C040-CR-v1a.pdf | |
Status | Archive |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2013-07-15', 'expiration_date': '2018-07-15', 'enhanced': {'__update__': {'developer': 'Juniper Networks, Inc1194 North Matilda Avenue,Sunnyvale, California 94089-1206UNITED STATES URL:http://www.juniper.netEmail: [email protected]: 978 589 8822', 'scope': 'The Target of Evaluation (TOE) is Juniper Networks Junos Pulse Secure Access Service 7.2 R4 (hereafter referred as Secure Access) is the appliance and software client running on a remote IT system. The TOE provides secure remote access to internal network resources. The TOE acts as a secure application-layer gateway that intermediates all request between remote computers and internal corporate resources. All requests from remote computers to a Secure Access appliance and from a Secure Access appliance to remote computers are encrypted using SSL/HTTPS 168-bit encryption. All unencrypted requests (e.g. HTTP) are redirected to HTTPS, which ensures the connection is encrypted. Each request is subject to administratively defined access control and authorisation policies, such as dual-factor or client-side digital certificate authentication, before the request is forwarded to an internal resource. Users gain authenticated access to authorised resources via an extranet session hosted by the appliance. From any Internet-connected Web browser, users can access Web-based enterprise applications, Java applications, file shares and terminal hosts. Secure Access generates audit records for security events. The administrator and read-only administrator are the only roles with access to the audit trail and have the ability to view the audit trail. In the context of the evaluation, the TOE provides the following major security features: Generates audit records for security events. Cryptographic support for secure communications between users and the TOE and between TOE components. Provides information flow security policy that limits traffic to URLs and resource types, such as file servers, to specific user roles. Identification and authentication before any information flows are permitted and user must be authenticated before performing any administrative functions. Security management functions for administrator to configure the TOE, manage users, information flow policy and auditing activities. Protection of the TOE security function (TSF) by enforcing session timeouts.', 'certification_date': '2013-07-15', 'expiration_date': '2018-07-15'}}}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0e99b078de87a30a5dda76a2c47cfa1032c99c866ff68e6ffe374991a05cdc71', 'txt_hash': 'd8145e32a06ceaf0f03a0ad87a076b9217a7a5f91e944004f69cb14b2ea28fe0'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f7ae8ec876e912873a56975578fe9a93baa021a286ee90bd268b74e66b3ac32f', 'txt_hash': '14595870b37ddce7aebbad56f2c4eda6d07e82011af11c78bfa2084ae85f13a9'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 317229, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 29, '/Author': 'ISCB Department', '/Category': 'PUBLIC', '/Caveat': 'FINAL', '/Classification': 'PUBLIC', '/Company': 'CyberSecurity Malaysia', '/CreationDate': "D:20130806135033+08'00'", '/Creator': 'Acrobat PDFMaker 10.1 for Word', '/Developer': 'Juniper Networks', '/Document Type': 'REPORT', '/Identifier': 'ISCB-5-RPT-C040-CR-v1a', '/Index': 'MyCB_TMP_011', '/Keywords': 'Secure Access', '/ModDate': "D:20130806135039+08'00'", '/Phase': 'External', '/Producer': 'Adobe PDF Library 10.0', '/Project Code': 'C040', '/Released': '15 July 2013', '/ST Title': 'Security Target: Juniper Networks Junos Pulse Secure Access Service 7.2 R4', '/ST Version': 'v1.4', '/SourceModified': 'D:20130806055016', '/Sponsor': 'Juniper Networks', '/Subject': 'Juniper Networks Junos Pulse Secure Access Service 7.2 R4', '/TOE Name': 'Juniper Networks Junos Pulse Secure Access Service', '/TOE Version': '7.2 R4', '/Title': 'C040 Certification Report', '/Version': 'v1a', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.cybersecurity.my/mycc']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1078324, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 46, '/Title': 'Security Target', '/Author': 'Apex Assurance Group', '/Subject': 'Secure Access Family Version 7.2R4', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20130515170648-07'00'", '/ModDate': "D:20130515170648-07'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.apexassurance.com/', 'http://www.juniper.net/']}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'MY': {'ISCB-5-RPT-C040-CR-v1a': 28}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3+': 6, 'EAL3': 6, 'EAL3 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 12}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_SAR.1': 1, 'FAU_STG.1': 1, 'FAU_STG.3': 1}, 'FCS': {'FCS_CKM.1': 1, 'FCS_CKM.2': 1, 'FCS_CKM.4': 1, 'FCS_COP.1': 1}, 'FDP': {'FDP_IFC.1': 1, 'FDP_IFF.1': 1, 'FDP_RIP.1': 1}, 'FIA': {'FIA_ATD.1': 1, 'FIA_SOS.1': 1, 'FIA_UAU.2': 1, 'FIA_UID.2': 1}, 'FMT': {'FMT_MOF.1': 1, 'FMT_MSA.1': 1, 'FMT_MSA.2': 1, 'FMT_MSA.3': 1, 'FMT_MTD.1': 1, 'FMT_SAE.1': 1, 'FMT_SMF.1': 1, 'FMT_SMR.1': 1}, 'FPT': {'FPT_STM.1': 1, 'FPT_ITT.1': 1}, 'FTA': {'FTA_SSL.3': 1}, 'FTP': {'FTP_TRP.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'SSH': {'SSH': 1}, 'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'Reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 6}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.3': 2, 'ADV_TDS.2': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.3': 2, 'ALC_CMS.3': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 7, 'FAU_SAR.1': 5, 'FAU_STG.1': 6, 'FAU_STG.3': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_GEN': 1, 'FAU_SAR': 1, 'FAU_STG': 2}, 'FCS': {'FCS_CKM.1': 5, 'FCS_CKM.2': 5, 'FCS_CKM.4': 5, 'FCS_COP.1': 10, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1, 'FCS_CKM': 3, 'FCS_COP': 1}, 'FDP': {'FDP_IFC.1': 5, 'FDP_IFF.1': 6, 'FDP_RIP.1': 5, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_RIP.1.1': 1, 'FDP_IFC': 1, 'FDP_IFF': 1, 'FDP_RIP': 1}, 'FIA': {'FIA_ATD.1': 9, 'FIA_SOS.1': 6, 'FIA_UAU.2': 6, 'FIA_UID.2': 7, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_ATD': 1, 'FIA_SOS': 1, 'FIA_UAU': 1, 'FIA_UID': 1}, 'FMT': {'FMT_MTD.1.1': 3, 'FMT_MTD.1': 10, 'FMT_MOF.1': 10, 'FMT_MSA.1': 8, 'FMT_MSA.2': 8, 'FMT_MSA.3': 8, 'FMT_SAE.1': 5, 'FMT_SMF.1': 5, 'FMT_SMR.1': 7, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF': 1, 'FMT_MSA': 3, 'FMT_MTD': 1, 'FMT_SAE': 1, 'FMT_SMF': 1, 'FMT_SMR': 1}, 'FPT': {'FPT_STM.1': 6, 'FPT_ITT.1': 5, 'FPT_ITT.1.1': 1, 'FPT_STM.1.1': 1, 'FPT_STM': 1, 'FPT_ITT': 1}, 'FTA': {'FTA_SSL.3': 5, 'FTA_SSL.3.1': 1, 'FTA_SSL': 1}, 'FTP': {'FTP_TRP.1': 5, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.ACCOUN': 7, 'O.AUDREC': 9, 'O.ENCRYP': 12, 'O.IDAUTH': 11, 'O.MEDIAT': 17, 'O.SECFUN': 20, 'O.SECKEY': 9, 'O.SECSTA': 15, 'O.SELPRO': 9, 'O.SINUSE': 7, 'O.TOECOM': 6, 'O.ENCRYPT': 1}, 'T': {'T.AUDACC': 5, 'T.AUDFUL': 4, 'T.MEDIAT': 4, 'T.NOAUTH': 3, 'T.OLDINF': 4, 'T.PROCOM': 4, 'T.REPLAY': 4, 'T.SELPRO': 4, 'T.TOECOM': 5, 'T.TUSAGE': 5}, 'A': {'A.GENPUR': 2, 'A.NOEVIL': 2, 'A.PHYSEC': 3, 'A.PUBLIC': 1, 'A.SINGEN': 2}, 'OE': {'OE.ADMTRA': 4, 'OE.GENPUR': 3, 'OE.GUIDAN': 4, 'OE.PHYSEC': 3, 'OE.PUBLIC': 3, 'OE.SINGEN': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'3DES': {'3DES': 1, 'TDES': 5}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}, 'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 2}}, 'VPN': {'VPN': 2}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 2, 'FIPS 46-3': 2, 'FIPS 180-2': 1, 'FIPS 140-2': 1}, 'PKCS': {'PKCS7': 1}, 'RFC': {'RFC 2246': 1, 'RFC 1321': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ISCB-5-RPT-C040-CR-v1a.pdf
. - The st_filename property was set to
JNPR SA 7.2R4 EAL3 ST v1.4.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ISCB-5-RPT-C040-CR-v1a
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C040-CR-v1a.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Juniper Networks Junos Pulse Secure Access Service 7.2 R4 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "7116d2046dcede84",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C040-CR-v1a",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"7.2"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2013-004-C040",
"certification_date": "2013-07-15",
"developer": "Juniper Networks, Inc.",
"enhanced": {
"assurance_level": "EAL3+ALC_FLR.2",
"category": "Access Control Devices and System",
"cert_id": "C040",
"certification_date": "2013-07-15",
"developer": "Juniper Networks, Inc1194 North Matilda Avenue,Sunnyvale, California 94089-1206UNITED STATES URL:http://www.juniper.netEmail: [email protected]: 978 589 8822",
"expiration_date": "2018-07-15",
"mutual_recognition": "CCRA",
"product": "Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/ISCB-5-RPT-C040-CR-v1a.pdf",
"scope": "The Target of Evaluation (TOE) is Juniper Networks Junos Pulse Secure Access Service 7.2 R4 (hereafter referred as Secure Access) is the appliance and software client running on a remote IT system. The TOE provides secure remote access to internal network resources. The TOE acts as a secure application-layer gateway that intermediates all request between remote computers and internal corporate resources. All requests from remote computers to a Secure Access appliance and from a Secure Access appliance to remote computers are encrypted using SSL/HTTPS 168-bit encryption. All unencrypted requests (e.g. HTTP) are redirected to HTTPS, which ensures the connection is encrypted. Each request is subject to administratively defined access control and authorisation policies, such as dual-factor or client-side digital certificate authentication, before the request is forwarded to an internal resource. Users gain authenticated access to authorised resources via an extranet session hosted by the appliance. From any Internet-connected Web browser, users can access Web-based enterprise applications, Java applications, file shares and terminal hosts. Secure Access generates audit records for security events. The administrator and read-only administrator are the only roles with access to the audit trail and have the ability to view the audit trail. In the context of the evaluation, the TOE provides the following major security features: Generates audit records for security events. Cryptographic support for secure communications between users and the TOE and between TOE components. Provides information flow security policy that limits traffic to URLs and resource types, such as file servers, to specific user roles. Identification and authentication before any information flows are permitted and user must be authenticated before performing any administrative functions. Security management functions for administrator to configure the TOE, manage users, information flow policy and auditing activities. Protection of the TOE security function (TSF) by enforcing session timeouts.",
"status": "Archive",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf",
"type": "Set of appliance and software client running on a remote IT system that provides secure remote access to internal network resources."
},
"expiration_date": "2018-07-15",
"level": "EAL3+ALC_FLR.2",
"product": "Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/123"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Juniper Networks, Inc.",
"manufacturer_web": "https://www.juniper.net/",
"name": "Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
"not_valid_after": "2018-07-15",
"not_valid_before": "2013-07-15",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ISCB-5-RPT-C040-CR-v1a.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C040-CR-v1a": 28
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 12
}
},
"cc_security_level": {
"EAL": {
"EAL3": 6,
"EAL3 augmented": 1,
"EAL3+": 6
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_SAR.1": 1,
"FAU_STG.1": 1,
"FAU_STG.3": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 1,
"FCS_COP.1": 1
},
"FDP": {
"FDP_IFC.1": 1,
"FDP_IFF.1": 1,
"FDP_RIP.1": 1
},
"FIA": {
"FIA_ATD.1": 1,
"FIA_SOS.1": 1,
"FIA_UAU.2": 1,
"FIA_UID.2": 1
},
"FMT": {
"FMT_MOF.1": 1,
"FMT_MSA.1": 1,
"FMT_MSA.2": 1,
"FMT_MSA.3": 1,
"FMT_MTD.1": 1,
"FMT_SAE.1": 1,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_ITT.1": 1,
"FPT_STM.1": 1
},
"FTA": {
"FTA_SSL.3": 1
},
"FTP": {
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 1
},
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"Reverse engineering": 1
}
},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "ISCB Department",
"/Category": "PUBLIC",
"/Caveat": "FINAL",
"/Classification": "PUBLIC",
"/Company": "CyberSecurity Malaysia",
"/CreationDate": "D:20130806135033+08\u002700\u0027",
"/Creator": "Acrobat PDFMaker 10.1 for Word",
"/Developer": "Juniper Networks",
"/Document Type": "REPORT",
"/Identifier": "ISCB-5-RPT-C040-CR-v1a",
"/Index": "MyCB_TMP_011",
"/Keywords": "Secure Access",
"/ModDate": "D:20130806135039+08\u002700\u0027",
"/Phase": "External",
"/Producer": "Adobe PDF Library 10.0",
"/Project Code": "C040",
"/Released": "15 July 2013",
"/ST Title": "Security Target: Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
"/ST Version": "v1.4",
"/SourceModified": "D:20130806055016",
"/Sponsor": "Juniper Networks",
"/Subject": "Juniper Networks Junos Pulse Secure Access Service 7.2 R4",
"/TOE Name": "Juniper Networks Junos Pulse Secure Access Service",
"/TOE Version": "7.2 R4",
"/Title": "C040 Certification Report",
"/Version": "v1a",
"pdf_file_size_bytes": 317229,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.cybersecurity.my/mycc"
]
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 29
},
"st_filename": "JNPR SA 7.2R4 EAL3 ST v1.4.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.GENPUR": 2,
"A.NOEVIL": 2,
"A.PHYSEC": 3,
"A.PUBLIC": 1,
"A.SINGEN": 2
},
"O": {
"O.ACCOUN": 7,
"O.AUDREC": 9,
"O.ENCRYP": 12,
"O.ENCRYPT": 1,
"O.IDAUTH": 11,
"O.MEDIAT": 17,
"O.SECFUN": 20,
"O.SECKEY": 9,
"O.SECSTA": 15,
"O.SELPRO": 9,
"O.SINUSE": 7,
"O.TOECOM": 6
},
"OE": {
"OE.ADMTRA": 4,
"OE.GENPUR": 3,
"OE.GUIDAN": 4,
"OE.PHYSEC": 3,
"OE.PUBLIC": 3,
"OE.SINGEN": 3
},
"T": {
"T.AUDACC": 5,
"T.AUDFUL": 4,
"T.MEDIAT": 4,
"T.NOAUTH": 3,
"T.OLDINF": 4,
"T.PROCOM": 4,
"T.REPLAY": 4,
"T.SELPRO": 4,
"T.TOECOM": 5,
"T.TUSAGE": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.3": 2,
"ADV_TDS.2": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.3": 2,
"ALC_CMS.3": 2,
"ALC_DEL.1": 2,
"ALC_DVS.1": 2,
"ALC_FLR.2": 5,
"ALC_LCD.1": 2
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 2,
"ATE_DPT.1": 2,
"ATE_FUN.1": 2,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 6
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 7,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR": 1,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG": 2,
"FAU_STG.1": 6,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 6,
"FAU_STG.3.1": 1
},
"FCS": {
"FCS_CKM": 3,
"FCS_CKM.1": 5,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 5,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 5,
"FCS_CKM.4.1": 1,
"FCS_COP": 1,
"FCS_COP.1": 10,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_IFC": 1,
"FDP_IFC.1": 5,
"FDP_IFC.1.1": 1,
"FDP_IFF": 1,
"FDP_IFF.1": 6,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_RIP": 1,
"FDP_RIP.1": 5,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_ATD": 1,
"FIA_ATD.1": 9,
"FIA_ATD.1.1": 1,
"FIA_SOS": 1,
"FIA_SOS.1": 6,
"FIA_SOS.1.1": 1,
"FIA_UAU": 1,
"FIA_UAU.2": 6,
"FIA_UAU.2.1": 1,
"FIA_UID": 1,
"FIA_UID.2": 7,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 10,
"FMT_MOF.1.1": 1,
"FMT_MSA": 3,
"FMT_MSA.1": 8,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 8,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 8,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 1,
"FMT_MTD.1": 10,
"FMT_MTD.1.1": 3,
"FMT_SAE": 1,
"FMT_SAE.1": 5,
"FMT_SAE.1.1": 1,
"FMT_SAE.1.2": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 5,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 7,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT": 1,
"FPT_ITT.1": 5,
"FPT_ITT.1.1": 1,
"FPT_STM": 1,
"FPT_STM.1": 6,
"FPT_STM.1.1": 1
},
"FTA": {
"FTA_SSL": 1,
"FTA_SSL.3": 5,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_TRP": 1,
"FTP_TRP.1": 5,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 2
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 2
}
},
"VPN": {
"VPN": 2
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
},
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS 180-2": 1,
"FIPS 197": 2,
"FIPS 46-3": 2
},
"PKCS": {
"PKCS7": 1
},
"RFC": {
"RFC 1321": 1,
"RFC 2246": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"3DES": {
"3DES": 1,
"TDES": 5
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Apex Assurance Group",
"/CreationDate": "D:20130515170648-07\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20130515170648-07\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "Secure Access Family Version 7.2R4",
"/Title": "Security Target",
"pdf_file_size_bytes": 1078324,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.juniper.net/",
"http://www.apexassurance.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C040-CR-v1a.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL3+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0e99b078de87a30a5dda76a2c47cfa1032c99c866ff68e6ffe374991a05cdc71",
"txt_hash": "d8145e32a06ceaf0f03a0ad87a076b9217a7a5f91e944004f69cb14b2ea28fe0"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f7ae8ec876e912873a56975578fe9a93baa021a286ee90bd268b74e66b3ac32f",
"txt_hash": "14595870b37ddce7aebbad56f2c4eda6d07e82011af11c78bfa2084ae85f13a9"
}
},
"status": "archived"
}