cert_id |
3137 |
3336 |
dgst |
1f023880f785dbb4 |
c6a99dc9b0b68c14 |
heuristics/algorithms |
DRBG#1609, KTS#3136, SHS#3868, HMAC#3136, KTS#3137, CVL#1391, RSA#2573, DRBG#1608, SHS#3864, AES#4720, SHS#3865, Triple-DES#2502, KTS#2502, SHS#3895, AES#4723, KTS#2501, AES#4719, Triple-DES#2505, Triple-DES#2501, HMAC#3140, ECDSA#1166, ECDSA#1167, HMAC#3137, RSA#2572, CVL#1362 |
SHS#4256, HMAC#3502, SHS#4264, AES#5341, HMAC#3538, CVL#1772, Triple-DES#2700, Triple-DES#2682, RSA#2840, KTS#3510, DRBG#2044, KTS#3509, SHS#4263, CVL#1771, AES#5306, HMAC#3510, RSA#2841, KTS#2682, SHS#4292, AES#5305, DRBG#2040, DRBG#2045, Triple-DES#2681, ECDSA#1390, SHS#4260, HMAC#3509, KTS#2681, HMAC#3506, ECDSA#1391 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
- Cert:
- #2501: 1
- #2502: 1
- #3136: 2
- #3137: 2
- #4719: 1
- #4720: 1
|
- Cert:
- #2681: 1
- #2682: 1
- #3509: 2
- #3510: 2
- #5305: 1
- #5306: 1
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES CBC 128/192/256: 5
- AES Cert. #4719: 1
- AES Cert. #4720: 1
- AES [197: 3
- DRBG 5: 1
- HMAC Cert. #3136: 4
- HMAC Cert. #3137: 4
- HMAC SHA-256: 2
- HMAC [198: 3
- HMAC-SHA- 1: 1
- HMAC-SHA- 1-96: 4
- HMAC-SHA- 256: 1
- HMAC-SHA- 512: 1
- HMAC-SHA-1: 4
- HMAC-SHA-256: 6
- HMAC-SHA-384: 4
- HMAC-SHA-512: 2
- HMAC-SHA384: 2
- RSA 2048: 11
- RSA 4096: 8
- SHA 1, 256: 1
- SHA 256: 8
- SHA 384: 2
- SHA-1: 4
- SHA-256: 14
- SHA-384: 2
- SHA-3844: 1
- SHA-512: 3
- SHA1: 1
- SHS [180: 4
|
- Certlike:
- AES CBC 128/192/256: 4
- AES CBC 128/192/256 7: 1
- AES Cert. #5305: 1
- AES Cert. #5306: 1
- AES GCM11: 1
- DRBG 2: 1
- HMAC Cert. #3509: 4
- HMAC Cert. #3510: 4
- HMAC SHA-1: 1
- HMAC SHA-256: 4
- HMAC-SHA- 1: 1
- HMAC-SHA- 1-96: 4
- HMAC-SHA- 256: 1
- HMAC-SHA- 512: 1
- HMAC-SHA-1: 4
- HMAC-SHA-256: 8
- HMAC-SHA-384: 4
- HMAC-SHA-512: 2
- RSA 2048: 14
- RSA 4096: 8
- SHA 1, 256: 1
- SHA 256: 8
- SHA 384: 2
- SHA-1: 8
- SHA-256: 16
- SHA-384: 1
- SHA-512: 3
- SHA1: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 3
- Triple-DES: 16
- constructions:
- MAC:
- HMAC: 16
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
- miscellaneous:
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 3
- Triple-DES: 17
- DES:
- constructions:
- MAC:
- HMAC: 22
- HMAC-SHA-256: 4
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
- miscellaneous:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 16
- SHA-384: 1
- SHA-512: 3
|
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
- IKE:
- IKE: 22
- IKEv1: 5
- IKEv2: 6
- IPsec:
- SSH:
|
- IKE:
- IKE: 21
- IKEv1: 6
- IKEv2: 7
- IPsec:
- SSH:
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
- NIST:
- P-256: 50
- P-384: 36
- P-521: 6
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 6
- FIPS PUB 140-2: 1
- FIPS140-2: 1
- NIST:
- RFC:
- RFC4106: 1
- RFC5282: 1
- RFC7296: 1
- X509:
|
- FIPS:
- FIPS 140-2: 6
- FIPS PUB 140-2: 1
- FIPS140-2: 1
- NIST:
- SP 800-135: 2
- SP 800-38D: 2
- SP 800-67: 3
- SP 800-90A: 7
- RFC:
- RFC 2409: 2
- RFC 4251: 1
- RFC 4253: 1
- RFC 6071: 1
- RFC 7296: 1
- RFC4106: 2
- RFC5282: 1
- RFC7296: 1
- X509:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
|
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode |
When operated in FIPS mode |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPSConsolidatedCertFeb2018.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/Dec2018Cert.pdf |
web_data/date_sunset |
|
|
web_data/description |
The vSRX delivers a complete and integrated virtual security solution, including unified threat management(UTM), intrusion detection and prevention (IDP), granular application control and robust networking. It provides seamless automated life cycle management capabilities making it an ideal solution for Service Providers, Cloud and Enterprise deployments. The vSRX supports Juniper Networks Contrail, OpenContrail, Openstack and other third-party solutions. |
The vSRX delivers a complete and integrated virtual security solution, including unified threat management(UTM), intrusion detection and prevention (IDP), granular application control and robust networking. It provides seamless automated life cycle management capabilities making it an ideal solution for Service Providers, Cloud and Enterprise deployments. The vSRX supports Juniper Networks Contrail, OpenContrail, Openstack and other third-party solutions. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Roles, Services, and Authentication: Level 3, Physical Security: N/A, Design Assurance: Level 3, Mitigation of Other Attacks: N/A |
Roles, Services, and Authentication: Level 3, Physical Security: N/A, Design Assurance: Level 3, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
SP 800-56Arev3 transition |
SP 800-56Arev3 transition |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Juniper Networks vSRX Virtual Firewall |
Juniper Networks vSRX Virtual Firewall |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
JUNOS 15.1X49 - D100 |
Junos OS 17.4R1-S1 |
web_data/tested_conf |
JUNOS 15.1X49-D100 on VMWare ESXi 5.5 on a Server HP ProLiant DL380 Gen9 (single-user mode) |
Junos OS 17.4R1-S1 on VMWare ESXi 6.0 running on a HP ProLiant DL380 Gen9 Server with Intel Xeon E5 (single-user mode) |
web_data/validation_history |
- date: 26.02.2018
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
|
- date: 03.12.2018
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
|
web_data/vendor |
Juniper Networks, Inc. |
Juniper Networks, Inc. |
web_data/vendor_url |
http://www.juniper.net/ |
http://www.juniper.net/ |