This page was not yet optimized for use on mobile
devices.
Juniper Networks PTX1000 Packet Transport Router
Certificate #4960
Webpage information
Security policy
Symmetric Algorithms
AES-, AES, CAST, Blowfish, HMACAsymmetric Algorithms
RSA 2048, ECDH, ECDSA, Diffie-Hellman, DH, DSAHash functions
SHA-1Schemes
Key AgreementProtocols
SSH, SSHv2Randomness
DRBG, RBGLibraries
OpenSSLElliptic Curves
P-256, P-384, P-521, P-512Block cipher modes
ECB, CBC, CTRTrusted Execution Environments
PSP, SSCSecurity level
Level 1, Level 3, level 1Standards
FIPS 140-3, FIPS186-4, SP 800-38A, NIST SP 800-90B, SP 800-90B, ISO/IEC 24759, X.509File metadata
| Author | Aniket Ingle Intertek |
|---|---|
| Creation date | D:20231228172333+05'30' |
| Modification date | D:20231228172333+05'30' |
| Pages | 47 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.CPE matches
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4960,
"dgst": "cdcaf888b551e74f",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": []
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:juniper:ptx1000:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 19
},
"ECDSA": {
"ECDSA": 44
}
},
"FF": {
"DH": {
"DH": 20,
"Diffie-Hellman": 3
},
"DSA": {
"DSA": 3
}
},
"RSA": {
"RSA 2048": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 12
},
"CTR": {
"CTR": 6
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"SSH": {
"SSH": 83,
"SSHv2": 4
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 4
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 66,
"P-384": 36,
"P-512": 4,
"P-521": 18
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES CBC 128": 2,
"AES CBC 128, 192": 1,
"AES CBC 192": 2,
"AES CBC 256": 2,
"AES CTR 128": 1,
"HMAC 198": 2,
"HMAC-SHA-1": 14,
"RSA 2048": 3,
"RSA 521": 1,
"RSA2": 1,
"SHA-1": 14,
"SHA2- 256": 49,
"SHA2- 384": 3,
"SHA2- 512": 20,
"SHA2-256": 26,
"SHA2-384": 7,
"SHA2-512": 13
}
},
"fips_security_level": {
"Level": {
"Level 1": 5,
"Level 3": 1,
"level 1": 3
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 14
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 14
},
"RNG": {
"RBG": 13
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 10,
"FIPS186-4": 7
},
"ISO": {
"ISO/IEC 24759": 2
},
"NIST": {
"NIST SP 800-90B": 4,
"SP 800-38A": 1,
"SP 800-90B": 1
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 12,
"AES-": 2
},
"CAST": {
"CAST": 5
}
},
"constructions": {
"MAC": {
"HMAC": 25
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 2
}
}
},
"tee_name": {
"AMD": {
"PSP": 7
},
"IBM": {
"SSC": 11
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Aniket Ingle Intertek",
"/CreationDate": "D:20231228172333+05\u002730\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20231228172333+05\u002730\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 713345,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.acumensecurity.net/",
"https://csrc.nist.gov/projects/cryptographic-module-validation-program"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 47
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "33fbe99e07ed284b957842a20f193a0f73a6c1abd6870bd319ec0ce8eba1fd4b",
"policy_txt_hash": "3b9c7232abfa5476f2d0c94c2bb466a761a75c157ccafa25edb173e36b122eb4"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "Interim validation. When operated in Approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy. No assurance of minimum security of SSPs (e.g., keys, bit strings) that are externally loaded, or of SSPs established with externally loaded SSPs.",
"certificate_pdf_url": null,
"date_sunset": "2027-02-06",
"description": "The cryptographic module provides for an encrypted connection, using SSH, between the management station and the module. The cryptographic module also provides for an encrypted connection, using MACsec, between devices.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, services, and authentication: Level 3",
"Non-invasive security: N/A",
"Mitigation of other attacks: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Juniper Networks PTX1000 Packet Transport Router",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2025-02-07",
"lab": "Acumen Security",
"validation_type": "Initial"
}
],
"vendor": "Juniper Networks, Inc.",
"vendor_url": "http://www.juniper.net"
}
}