This page was not yet optimized for use on mobile
devices.
Juniper Networks EX, QFX and ACX Series
Certificate #5135
Webpage information
Security policy
Symmetric Algorithms
AES-128, AES-192, AES-256, AES, CAST, HMACAsymmetric Algorithms
RSA 2048, RSA 4096, ECDH, ECDSA, Diffie-Hellman, DHHash functions
SHA-1Schemes
MAC, Key Exchange, Key AgreementProtocols
SSH, SSHv2, TLSRandomness
DRBG, RBGLibraries
OpenSSLElliptic Curves
P-256, P-384, P-521Block cipher modes
CBC, CTRTrusted Execution Environments
PSPSecurity level
Level 1, level 1Standards
FIPS 140-3, FIPS PUB 140-3, FIPS186-4, FIPS 186-4, FIPS 198-1, FIPS 180-4, FIPS 186-5, SP 800-38A, SP 800-56A, SP 800-135, SP 800-90A, SP 800-133, PKCS 1, ISO/IEC 19790:2012, X.509File metadata
| Author | Hawes, David J. (Fed) |
|---|---|
| Creation date | D:20260113080621-05'00' |
| Modification date | D:20260113080622-05'00' |
| Pages | 34 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 5135,
"dgst": "1aea9d6b34716944",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": []
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 55
}
},
"FF": {
"DH": {
"DH": 33,
"Diffie-Hellman": 4
}
},
"RSA": {
"RSA 2048": 3,
"RSA 4096": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"CTR": {
"CTR": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 7
}
},
"crypto_protocol": {
"SSH": {
"SSH": 143,
"SSHv2": 1
},
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 3
},
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 15
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 56,
"P-384": 46,
"P-521": 48
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"- PKCS 1": 2,
"AES CBC 128/192/256": 1,
"AES-128": 1,
"AES-192": 1,
"AES-256": 1,
"DRBG 256": 3,
"HMAC-SHA-1": 18,
"PKCS 1": 2,
"RSA 2048": 3,
"RSA 4096": 3,
"SHA-1": 5,
"SHA2- 256": 3,
"SHA2- 512": 6,
"SHA2-256": 21,
"SHA2-384": 13,
"SHA2-512": 20
}
},
"fips_security_level": {
"Level": {
"Level 1": 4,
"level 1": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 5
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 54
},
"RNG": {
"RBG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 43,
"FIPS 180-4": 12,
"FIPS 186-4": 18,
"FIPS 186-5": 2,
"FIPS 198-1": 6,
"FIPS PUB 140-3": 1,
"FIPS186-4": 53
},
"ISO": {
"ISO/IEC 19790:2012": 1
},
"NIST": {
"SP 800-133": 1,
"SP 800-135": 1,
"SP 800-38A": 2,
"SP 800-56A": 2,
"SP 800-90A": 1
},
"PKCS": {
"PKCS 1": 2
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2,
"AES-128": 1,
"AES-192": 1,
"AES-256": 1
},
"CAST": {
"CAST": 60
}
},
"constructions": {
"MAC": {
"HMAC": 41
}
}
},
"tee_name": {
"AMD": {
"PSP": 7
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Hawes, David J. (Fed)",
"/CreationDate": "D:20260113080621-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId": "cb911c4b-3249-483e-a658-2bef51ef8ec3",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits": "1",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled": "true",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method": "Privileged",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name": "UNCLASSIFIED",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate": "2026-01-13T12:50:16Z",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId": "da9cbe40-ec1e-4997-afb3-17d87574571a",
"/MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Tag": "10, 0, 1, 1",
"/ModDate": "D:20260113080622-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 2230401,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.teronlabs.com/",
"https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/entropy/E89_PublicUse.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 34
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "506cb1f2f3ecb95f6f9bcdedc06363b5021c4063353c9db46c4fa8b9db7983af",
"policy_txt_hash": "97c9ccb2ed4ca37120aa118fad9c7c3f6a8054b8032de7ac7dc6e691f0341fde"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When installed, initialized and configured as specified in Section 11.1 of the Security Policy.",
"certificate_pdf_url": null,
"date_sunset": "2031-01-14",
"description": "Junos\u00ae OS automates network operations with streamlined precision, furthers operational efficiency, and frees up valuable time and resources for top-line growth opportunities. Built for reliability, security, and flexibility, Junos OS runs many of the world\u2019s most sophisticated network deployments, giving operators an advantage over those who run competing network operating systems.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, services, and authentication: Level 2",
"Non-invasive security: N/A",
"Mitigation of other attacks: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Juniper Networks EX, QFX and ACX Series",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2026-01-15",
"lab": "Teron Labs",
"validation_type": "Initial"
}
],
"vendor": "Juniper Networks",
"vendor_url": "http://www.juniper.net"
}
}