Juniper Networks QFX10002, QFX10008 and QFX10016

Certificate #4882

Webpage information

Status active
Validation dates 18.11.2024
Sunset date 17-11-2026
Standard FIPS 140-3
Security level 1
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat Interim validation. When operated in Approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy. No assurance of minimum security of SSPs (e.g., keys, bit strings) that are externally loaded, or of SSPs established with externally loaded SSPs.
Exceptions
  • Roles, services, and authentication: Level 3
  • Non-invasive security: N/A
  • Mitigation of other attacks: N/A
Description Juniper Networks QFX10002, QFX10008, QFX10016 are QFX Series switches. The cryptographic module provides for an encrypted connection, using SSH, between the management station and the QFX switch.
Vendor Juniper Networks, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES-128, AES-192, AES-256, AES, AES-, CAST, TDES, Blowfish, HMAC
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, RIPEMD160
Schemes
MAC, Key Agreement
Protocols
SSH, SSHv2
Randomness
DRBG, RBG
Libraries
OpenSSL
Elliptic Curves
P-256, P-384, P-521, prime256v1
Block cipher modes
CBC, CTR

Trusted Execution Environments
PSP, SSC

Security level
Level 1, Level 8, Level 3, level 1

Standards
FIPS 140-3, FIPS 198-1, FIPS 180-4, FIPS186-4, FIPS 186-4, FIPS186, SP 800-90A, SP 800-38A, SP 800-56A, SP 800-135, NIST SP 800-90B, PKCS 1, X.509

File metadata

Creation date D:20241203131910-05'00'
Modification date D:20241203132025-05'00'
Pages 60
Creator Acrobat PDFMaker 24 for Word
Producer Adobe PDF Library 24.3.144

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4882,
  "dgst": "4046c1be5d83b630",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": []
    },
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:h:juniper:qfx10008:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:juniper:qfx10016:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:juniper:qfx10002:-:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 46
          },
          "ECDSA": {
            "ECDSA": 79
          }
        },
        "FF": {
          "DH": {
            "DH": 46,
            "Diffie-Hellman": 3
          },
          "DSA": {
            "DSA": 3
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 9
        },
        "CTR": {
          "CTR": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 3
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 199,
          "SSHv2": 9
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 5
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 56,
          "P-384": 20,
          "P-521": 16,
          "prime256v1": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "- PKCS 1": 2,
          "AES CBC 128, 192": 1,
          "AES CTR 128": 1,
          "AES- 128": 1,
          "AES- 192": 1,
          "AES- 256": 1,
          "AES-128": 1,
          "AES-192": 1,
          "AES-256": 1,
          "DRBG 2": 3,
          "DRBG 256": 1,
          "DRBG 440": 1,
          "DRBG2": 14,
          "HMAC 198": 2,
          "HMAC- SHA-1": 2,
          "HMAC-SHA-1": 10,
          "PKCS 1": 2,
          "RSA 2048": 1,
          "RSA2": 1,
          "SHA-1": 7,
          "SHA-2- 512": 1,
          "SHA2- 256": 7,
          "SHA2- 512": 3,
          "SHA2-256": 23,
          "SHA2-384": 4,
          "SHA2-512": 15
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 5,
          "Level 3": 1,
          "Level 8": 1,
          "level 1": 3
        }
      },
      "hash_function": {
        "RIPEMD": {
          "RIPEMD160": 2
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 7
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 31
        },
        "RNG": {
          "RBG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-3": 13,
          "FIPS 180-4": 6,
          "FIPS 186-4": 8,
          "FIPS 198-1": 4,
          "FIPS186": 8,
          "FIPS186-4": 30
        },
        "NIST": {
          "NIST SP 800-90B": 2,
          "SP 800-135": 1,
          "SP 800-38A": 3,
          "SP 800-56A": 4,
          "SP 800-90A": 2
        },
        "PKCS": {
          "PKCS 1": 2
        },
        "X509": {
          "X.509": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6,
            "AES-": 9,
            "AES-128": 1,
            "AES-192": 1,
            "AES-256": 1
          },
          "CAST": {
            "CAST": 51
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 25
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 3
          }
        }
      },
      "tee_name": {
        "AMD": {
          "PSP": 9
        },
        "IBM": {
          "SSC": 10
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "",
      "/Comments": "",
      "/Company": "",
      "/CreationDate": "D:20241203131910-05\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 24 for Word",
      "/Keywords": "",
      "/ModDate": "D:20241203132025-05\u002700\u0027",
      "/Producer": "Adobe PDF Library 24.3.144",
      "/SourceModified": "",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 1306515,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program",
          "http://www.juniper.net/support/downloads/junos.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 60
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "1d783b2d58452893938e5c1e26def9668ce7dc11c99dc56b7624acb84ebafd81",
    "policy_txt_hash": "d2ab398f15978579c9a65530391c93f225f1ef52bd4e05a0afa5517aad4f7dc1"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "Interim validation. When operated in Approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy. No assurance of minimum security of SSPs (e.g., keys, bit strings) that are externally loaded, or of SSPs established with externally loaded SSPs.",
    "certificate_pdf_url": null,
    "date_sunset": "2026-11-17",
    "description": "Juniper Networks QFX10002, QFX10008, QFX10016 are QFX Series switches. The cryptographic module provides for an encrypted connection, using SSH, between the management station and the QFX switch.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Roles, services, and authentication: Level 3",
      "Non-invasive security: N/A",
      "Mitigation of other attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Juniper Networks QFX10002, QFX10008 and QFX10016",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-3",
    "status": "active",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2024-11-18",
        "lab": "Acumen Security",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Juniper Networks, Inc.",
    "vendor_url": "http://www.juniper.net"
  }
}