Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Juniper Networks NFX250 Network Services Platform
Juniper Networks NFX250 Network Services Platform
cert_id 3908 3288
dgst 03f65a290e11d786 b0c5d24fdb7a3a0a
heuristics/algorithms ECDSA#C1981, DRBG#C1981, RSA#C1981, SHS#C1981, Triple-DES#C1979, HMAC#C1979, DRBG#C1983, HMAC#C1981, SHS#C1979, SHS#C2042, KTS#C1981, CVL#C1978, HMAC#C1983, DRBG#C2042, HMAC#C1982, AES#C2042, Triple-DES#C1981, AES#C1981, ECDSA#C2042, HMAC#C2042, CVL#C2042, SHS#C1982, RSA#C2042, Triple-DES#C2042, SHS#C1983, AES#C1979, KTS#C2042 HMAC#3522, SHS#4112, DRBG#2054, KTS#3367, CVL#1601, AES#5320, HMAC#3366, SHS#4111, HMAC#3367, DRBG#1867, SHS#4276, Triple-DES#2606, ECDSA#1301, KTS#2606
heuristics/extracted_versions 20.1 17.3
pdf_data/keywords/fips_cert_id
  • Cert:
    • #2606: 1
    • #3367: 2
    • #5320: 1
pdf_data/keywords/fips_security_level
  • Level:
    • Level 1: 3
    • level 1: 3
  • Level:
    • Level 1: 4
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES CBC 128/192/256: 5
    • HMAC SHA-1: 1
    • HMAC SHA-256: 4
    • HMAC-SHA-1: 6
    • HMAC-SHA-1-96: 2
    • HMAC-SHA-256: 8
    • HMAC-SHA-384: 2
    • HMAC-SHA-512: 4
    • RSA 2048: 16
    • RSA 4096: 8
    • RSA2: 1
    • SHA 1, 256: 1
    • SHA 256: 10
    • SHA 384: 4
    • SHA 512: 2
    • SHA-1: 9
    • SHA-256: 18
    • SHA-384: 2
    • SHA-512: 4
  • Certlike:
    • AES CBC 128/192/256: 1
    • AES Cert. #5320: 1
    • HMAC 2: 2
    • HMAC Cert. #3367: 4
    • HMAC SHA 1: 1
    • HMAC SHA 256: 1
    • HMAC SHA-256: 1
    • HMAC-SHA-1: 6
    • HMAC-SHA-224: 2
    • HMAC-SHA-256: 6
    • HMAC-SHA-384: 2
    • HMAC-SHA-512: 4
    • SHA 1: 1
    • SHA 1, 256: 1
    • SHA 224: 1
    • SHA 256: 4
    • SHA 384: 4
    • SHA 512: 3
    • SHA-1: 4
    • SHA-224: 1
    • SHA-256: 7
    • SHA-2563: 1
    • SHA-384: 1
    • SHA-512: 3
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 30
    • CAST:
      • CAST: 1
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 3
      • Triple-DES: 20
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 26
      • HMAC-SHA-256: 5
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
  • AES_competition:
    • AES:
      • AES: 7
    • CAST:
      • CAST: 1
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 1
      • Triple-DES: 5
  • constructions:
    • MAC:
      • HMAC: 14
      • HMAC-SHA-224: 1
      • HMAC-SHA-256: 4
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 17
    • ECDSA:
      • ECDSA: 26
  • FF:
    • DH:
      • DH: 8
      • Diffie-Hellman: 22
    • DSA:
      • DSA: 3
  • RSA:
    • RSA 2048: 16
    • RSA 4096: 8
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 16
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 6
pdf_data/keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-256: 22
      • SHA-384: 1
      • SHA-512: 3
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 2
      • SHA-256: 6
      • SHA-384: 2
      • SHA-512: 3
pdf_data/keywords/crypto_scheme
  • AEAD:
    • AEAD: 3
  • KA:
    • Key Agreement: 3
  • KEX:
    • Key Exchange: 7
  • KEX:
    • Key Exchange: 1
pdf_data/keywords/crypto_protocol
  • IKE:
    • IKE: 22
    • IKEv1: 6
    • IKEv2: 9
  • IPsec:
    • IPsec: 12
  • SSH:
    • SSH: 43
  • SSH:
    • SSH: 37
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 13
  • RNG:
    • RNG: 4
  • PRNG:
    • DRBG: 9
  • RNG:
    • RNG: 2
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 17
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 10
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 2
pdf_data/keywords/ecc_curve
  • NIST:
    • P-256: 58
    • P-384: 38
    • P-521: 16
  • NIST:
    • P-256: 28
    • P-384: 16
    • P-521: 12
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140-2: 12
    • FIPS 180-4: 1
    • FIPS 186-4: 1
    • FIPS 197: 1
    • FIPS 198-1: 1
    • FIPS PUB 140-2: 1
  • NIST:
    • SP 800-135: 3
    • SP 800-38A: 2
    • SP 800-38D: 3
    • SP 800-67: 3
    • SP 800-90A: 7
  • RFC:
    • RFC 2409: 3
    • RFC 4106: 1
    • RFC 4251: 2
    • RFC 4253: 1
    • RFC 5282: 2
    • RFC 6071: 2
    • RFC 7296: 4
    • RFC4106: 1
    • RFC5282: 1
  • X509:
    • X.509: 2
  • FIPS:
    • FIPS 140-2: 7
    • FIPS PUB 140-2: 1
    • FIPS140-2: 1
  • NIST:
    • SP 800-135: 1
    • SP 800-67: 1
    • SP 800-90A: 5
  • X509:
    • X.509: 2
pdf_data/policy_metadata
  • /Author: Jennifer Brady
  • /CreationDate: D:20180910091025-04'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20180910091025-04'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: FIPS 140-2 Security Policy Template
  • pdf_file_size_bytes: 1189818
  • pdf_hyperlinks: https://www.juniper.net/assets/us/en/local/pdf/datasheets/1000563-en.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode, installed, initialized and configured as specified in Sections 1.2 and 6 of the Security Policy When operated in FIPS mode, installed, initialized and configured as specified in Section 1.2 and 6 of the Security Policy
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/April 2021_030521_0757_signed.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/SeptConsolidated2018.pdf
web_data/date_sunset 22.04.2026
web_data/description The NFX250 Network Services Platform provides multiple network connections and an open, standards-based architecture. It uses SRX Series next-generation firewall software for security. The NFX250 delivers business services, such as SD-WAN. It is for enterprise organizations and for service providers that deliver managed services to the enterprise. NFX250 Network Services Platform are Juniper Network’s secure, automated, software-driven customer premises equipment (CPE) devices that deliver virtualized network and security services on demand. Leveraging Network Functions Virtualization (NFV) and built on the Juniper Cloud CPE solution, NFX250 enables service providers to deploy and service chain multiple, secure, high-performance virtualized network functions (VNFs) as a single device. This automated, software-driven solution dynamically provisions new services on demand.
web_data/fw_versions J, u, n, o, s, , O, S, , 2, 0, ., 1, R, 1 J, u, n, o, s, , O, S, , 1, 7, ., 3, R, 2
web_data/historical_reason SP 800-56Arev3 transition
web_data/hw_versions N, F, X, 2, 5, 0, -, S, 1, ,, , N, F, X, 2, 5, 0, -, S, 1, E, , a, n, d, , N, F, X, 2, 5, 0, -, S, 2 N, F, X, 2, 5, 0, -, S, 1, ,, , N, F, X, 2, 5, 0, -, S, 2, , , , , , , , , , , , , , ,
web_data/status active historical
web_data/validation_history
  • date: 23.04.2021
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial
  • date: 19.09.2018
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial
web_data/vendor_url http://www.juniper.net http://www.juniper.net/