This page was not yet optimized for use on mobile
devices.
Juniper Networks EX4300-48MP Ethernet Switch
Certificate #4959
Webpage information
Security policy
Symmetric Algorithms
AES, AES-, CAST, Blowfish, HMAC, CMACAsymmetric Algorithms
RSA 2048, ECDH, ECDSA, Diffie-Hellman, DH, DSAHash functions
SHA-1Schemes
Key AgreementProtocols
SSH, SSHv2Randomness
DRBG, RBGLibraries
OpenSSLElliptic Curves
P-256, P-384, P-521, P-512, prime256v1Block cipher modes
ECB, CBC, CTR, GCMTrusted Execution Environments
PSP, SSCSecurity level
Level 1, Level 3, level 1Standards
FIPS 140-3, FIPS186-4, SP 800-38D, SP 800-108, SP 800-38A, SP 800-38F, NIST SP 800-90B, SP 800-90B, NIST SP 800-108, ISO/IEC 24759, X.509File metadata
| Author | Aniket Ingle Intertek |
|---|---|
| Creation date | D:20231228174130+05'30' |
| Modification date | D:20231228174130+05'30' |
| Pages | 54 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
References
OutgoingHeuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4959,
"dgst": "04e729a9c402868a",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": []
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"4304",
"4369"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"4304",
"47",
"4369"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"4304",
"4369"
]
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 19
},
"ECDSA": {
"ECDSA": 44
}
},
"FF": {
"DH": {
"DH": 20,
"Diffie-Hellman": 3
},
"DSA": {
"DSA": 3
}
},
"RSA": {
"RSA 2048": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 13
},
"CTR": {
"CTR": 7
},
"ECB": {
"ECB": 8
},
"GCM": {
"GCM": 18
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"SSH": {
"SSH": 85,
"SSHv2": 4
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 6
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 66,
"P-384": 36,
"P-512": 4,
"P-521": 20,
"prime256v1": 2
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#4304": 1,
"#4369": 1
}
},
"fips_certlike": {
"Certlike": {
"AES CBC 128": 2,
"AES CBC 128, 192": 1,
"AES CBC 192": 2,
"AES CBC 256": 2,
"AES CMAC 128": 2,
"AES CMAC 256": 2,
"AES CTR 128": 1,
"AES GCM 128": 2,
"AES GCM 128 and 256": 1,
"AES GCM 192": 2,
"AES GCM 256": 2,
"HMAC 198": 2,
"HMAC-SHA-1": 14,
"RSA 2048": 3,
"RSA2": 1,
"SHA-1": 14,
"SHA2- 256": 47,
"SHA2- 384": 3,
"SHA2- 512": 20,
"SHA2-256": 30,
"SHA2-384": 7,
"SHA2-512": 13
}
},
"fips_security_level": {
"Level": {
"Level 1": 5,
"Level 3": 1,
"level 1": 3
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 14
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 14
},
"RNG": {
"RBG": 13
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 11,
"FIPS186-4": 7
},
"ISO": {
"ISO/IEC 24759": 2
},
"NIST": {
"NIST SP 800-108": 1,
"NIST SP 800-90B": 4,
"SP 800-108": 6,
"SP 800-38A": 1,
"SP 800-38D": 3,
"SP 800-38F": 1,
"SP 800-90B": 1
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 42,
"AES-": 3
},
"CAST": {
"CAST": 5
}
},
"constructions": {
"MAC": {
"CMAC": 6,
"HMAC": 26
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 2
}
}
},
"tee_name": {
"AMD": {
"PSP": 7
},
"IBM": {
"SSC": 11
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Aniket Ingle Intertek",
"/CreationDate": "D:20231228174130+05\u002730\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20231228174130+05\u002730\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 802436,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.acumensecurity.net/",
"https://csrc.nist.gov/projects/cryptographic-module-validation-program"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 54
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "01a35234ca0690c8c18cf0be12a31cb78ba330453bb9d4b5840abb296b7f6955",
"policy_txt_hash": "ce6b66afb93cbfe293ecc0c3600dfb7168bb681581165e5b74b79be43ad62886"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "Interim validation. When operated in Approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy. No assurance of minimum security of SSPs (e.g., keys, bit strings) that are externally loaded, or of SSPs established with externally loaded SSPs.",
"certificate_pdf_url": null,
"date_sunset": "2027-02-06",
"description": "The cryptographic module provides for an encrypted connection, using SSH, between the management station and the module. The cryptographic module also provides for an encrypted connection, using MACsec, between devices.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, services, and authentication: Level 3",
"Non-invasive security: N/A",
"Mitigation of other attacks: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Juniper Networks EX4300-48MP Ethernet Switch",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2025-02-07",
"lab": "Acumen Security",
"validation_type": "Initial"
}
],
"vendor": "Juniper Networks, Inc.",
"vendor_url": "http://www.juniper.net"
}
}