This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
SSG 5 and SSG 20 |
SSG 5 and SSG 20 |
|
---|---|---|
cert_id | 1170 | 1652 |
dgst | 19d0b0d4077454bd | b3dfc696bb0a5008 |
heuristics/algorithms | RNG#500, RNG#496, SHS#864, DSA#318, Triple-DES#715, SHS#860, Triple-DES#711, RSA#421, AES#866, HMAC#486, AES#870, HMAC#482, ECDSA#107, RSA#417, DSA#314, ECDSA#103 | HMAC#951, DSA#507, RNG#868, SHS#1429, ECDSA#205, Triple-DES#1061, AES#1620, RSA#798 |
heuristics/extracted_versions | 6.2.0 | 6.3 |
pdf_data/keywords/fips_certlike |
|
|
pdf_data/keywords/symmetric_crypto |
|
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/policy_metadata |
|
|
state/policy_pdf_hash | Different | Different |
state/policy_txt_hash | Different | Different |
web_data/caveat | When operated in FIPS mode | When operated in FIPS mode with the tamper evident seals and security devices installed as indicated in the Security Policy |
web_data/certificate_pdf_url | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1170.pdf | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0012.pdf |
web_data/description | The SSG 5 and SSG 20 are high-performance security platforms for small branch office and standalone businesses that want to stop internal and external attacks, prevent unauthorized access and achieve regulatory compliance. Both the SSG 5 and SSG 20 deliver 160 Mbps of stateful firewall traffic and 40 Mbps of IPSec VPN traffic. | Juniper Networks integrated security devices are purpose-built to perform essential networking security functions designed on top of robust networking and security real-time operating systems, ScreenOS. These are high-performance platforms that deliver integrated security and LAN/WAN routing across high-density LAN/WAN interfaces, Juniper Networks integrated security devices address the needs of small to medium sized locations, large distributed enterprises, and service providers as well as large and co-located datacenters. |
web_data/exceptions | Cryptographic Module Specification: Level 3, Cryptographic Module Ports and Interfaces: Level 3, Roles, Services, and Authentication: Level 3, Cryptographic Key Management: Level 3, Design Assurance: Level 3 | [] |
web_data/fw_versions | S, c, r, e, e, n, O, S, , 6, ., 2, ., 0, r, 3 | S, c, r, e, e, n, O, S, , 6, ., 3, r, 6, , |
web_data/hw_versions | P, /, N, s, , S, S, G, -, 5, , (, S, S, G, , 5, ), , a, n, d, , S, S, G, -, 2, 0, , (, S, S, G, , 2, 0, ), , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | (, S, S, G, -, 5, -, S, B, ,, , S, S, G, -, 5, -, S, B, -, B, T, ,, , S, S, G, -, 5, -, S, B, -, M, ,, , S, S, G, -, 5, -, S, H, ,, , S, S, G, -, 5, -, S, H, -, B, T, ,, , S, S, G, -, 5, -, S, H, -, M, , ,, , S, S, G, -, 2, 0, -, S, B, , a, n, d, , S, S, G, -, 2, 0, -, S, H, ), , w, i, t, h, , J, N, P, R, -, F, I, P, S, -, T, A, M, P, E, R, -, L, B, L, S |
web_data/validation_history |
|
|
web_data/vendor_url | http://www.juniper.net | http://www.juniper.net/us/en/ |