Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SSG 5 and SSG 20
SSG 5 and SSG 20
cert_id 1170 1652
dgst 19d0b0d4077454bd b3dfc696bb0a5008
heuristics/algorithms RNG#500, RNG#496, SHS#864, DSA#318, Triple-DES#715, SHS#860, Triple-DES#711, RSA#421, AES#866, HMAC#486, AES#870, HMAC#482, ECDSA#107, RSA#417, DSA#314, ECDSA#103 HMAC#951, DSA#507, RNG#868, SHS#1429, ECDSA#205, Triple-DES#1061, AES#1620, RSA#798
heuristics/extracted_versions 6.2.0 6.3
pdf_data/keywords/fips_certlike
  • Certlike:
    • HMAC SHA-1: 16
    • HMAC SHA-256: 1
    • HMAC-SHA-1: 2
    • HMAC-SHA-256: 2
    • PKCS #1: 2
    • SHA-1: 18
    • SHA-256: 3
  • Certlike:
    • AES 1620: 1
    • DSA 507: 1
    • HMAC 951: 2
    • HMAC SHA-1: 16
    • HMAC SHA-256: 1
    • HMAC-SHA-1: 2
    • HMAC-SHA-256: 2
    • PKCS #1: 2
    • RSA 798: 1
    • SHA 1429: 1
    • SHA-1: 18
    • SHA-256: 3
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
  • DES:
    • 3DES:
      • Triple-DES: 9
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 17
      • HMAC-SHA-256: 1
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • 3DES:
      • TDES: 1
      • Triple-DES: 9
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 18
      • HMAC-SHA-256: 1
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 17
  • ECC:
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 18
pdf_data/keywords/randomness
  • PRNG:
    • PRNG: 6
  • RNG:
    • RNG: 11
  • PRNG:
    • PRNG: 6
  • RNG:
    • RNG: 12
pdf_data/policy_metadata
  • /Author: thuntley
  • /CreationDate: D:20100106141029-08'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20100106141029-08'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /Title: Microsoft Word - Security_Policy_SSG-5_20_ScreenOS_6_2.doc
  • pdf_file_size_bytes: 229854
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: Tim Huntley
  • /Comments:
  • /Company: Juniper Networks, Inc.
  • /CreationDate: D:20110922103523-07'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /Keywords:
  • /ModDate: D:20111215090928-05'00'
  • /Producer: Adobe PDF Library 9.0
  • /SourceModified: D:20110922173508
  • /Subject:
  • /Title: Security Policy, SSG 5 and SSG 20
  • pdf_file_size_bytes: 269105
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode When operated in FIPS mode with the tamper evident seals and security devices installed as indicated in the Security Policy
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1170.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0012.pdf
web_data/description The SSG 5 and SSG 20 are high-performance security platforms for small branch office and standalone businesses that want to stop internal and external attacks, prevent unauthorized access and achieve regulatory compliance. Both the SSG 5 and SSG 20 deliver 160 Mbps of stateful firewall traffic and 40 Mbps of IPSec VPN traffic. Juniper Networks integrated security devices are purpose-built to perform essential networking security functions designed on top of robust networking and security real-time operating systems, ScreenOS. These are high-performance platforms that deliver integrated security and LAN/WAN routing across high-density LAN/WAN interfaces, Juniper Networks integrated security devices address the needs of small to medium sized locations, large distributed enterprises, and service providers as well as large and co-located datacenters.
web_data/exceptions Cryptographic Module Specification: Level 3, Cryptographic Module Ports and Interfaces: Level 3, Roles, Services, and Authentication: Level 3, Cryptographic Key Management: Level 3, Design Assurance: Level 3 []
web_data/fw_versions S, c, r, e, e, n, O, S, , 6, ., 2, ., 0, r, 3 S, c, r, e, e, n, O, S, , 6, ., 3, r, 6, ,
web_data/hw_versions P, /, N, s, , S, S, G, -, 5, , (, S, S, G, , 5, ), , a, n, d, , S, S, G, -, 2, 0, , (, S, S, G, , 2, 0, ), , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , (, S, S, G, -, 5, -, S, B, ,, , S, S, G, -, 5, -, S, B, -, B, T, ,, , S, S, G, -, 5, -, S, B, -, M, ,, , S, S, G, -, 5, -, S, H, ,, , S, S, G, -, 5, -, S, H, -, B, T, ,, , S, S, G, -, 5, -, S, H, -, M, , ,, , S, S, G, -, 2, 0, -, S, B, , a, n, d, , S, S, G, -, 2, 0, -, S, H, ), , w, i, t, h, , J, N, P, R, -, F, I, P, S, -, T, A, M, P, E, R, -, L, B, L, S
web_data/validation_history
  • date: 18.08.2009
  • lab: UL VERIFICATION SERVICES INC
  • validation_type: Initial

  • date: 28.01.2010
  • lab:
  • validation_type: Update

  • date: 11.12.2013
  • lab:
  • validation_type: Update
  • date: 15.12.2011
  • lab: ICSA
  • validation_type: Initial

  • date: 24.07.2012
  • lab:
  • validation_type: Update

  • date: 11.12.2013
  • lab:
  • validation_type: Update
web_data/vendor_url http://www.juniper.net http://www.juniper.net/us/en/