Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SSG 140
SSG 140
cert_id 1723 1171
dgst 7c1c2745ec0ebb04 e361ec1ff521cfdb
heuristics/algorithms Triple-DES#1060, SHS#1428, RSA#797, DSA#506, AES#1619, RNG#867, ECDSA#204, HMAC#950 ECDSA#106, DSA#317, Triple-DES#714, SHS#863, RNG#499, AES#869, RSA#420, HMAC#485
heuristics/extracted_versions 6.3 6.2.0
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1: 2
    • #2: 1
    • #3: 1
    • #4: 1
    • #5: 1
    • #6: 1
  • Cert:
    • #1: 1
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES 1619: 1
    • DSA 506: 1
    • HMAC 950: 2
    • HMAC SHA-1: 16
    • HMAC SHA-256: 1
    • HMAC-SHA-1: 2
    • HMAC-SHA-256: 2
    • PKCS #1: 2
    • RSA 797: 1
    • SHA 1428: 1
    • SHA-1: 18
    • SHA-256: 3
  • Certlike:
    • HMAC SHA-1: 16
    • HMAC SHA-256: 1
    • HMAC-SHA-1: 2
    • HMAC-SHA-256: 2
    • PKCS #1: 2
    • SHA-1: 18
    • SHA-256: 3
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • 3DES:
      • TDES: 1
      • Triple-DES: 9
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 18
      • HMAC-SHA-256: 1
  • AES_competition:
    • AES:
      • AES: 11
  • DES:
    • 3DES:
      • Triple-DES: 9
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 17
      • HMAC-SHA-256: 1
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 18
  • ECC:
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 17
pdf_data/keywords/randomness
  • PRNG:
    • PRNG: 6
  • RNG:
    • RNG: 12
  • PRNG:
    • PRNG: 6
  • RNG:
    • RNG: 11
pdf_data/policy_metadata
  • /Author: Tim Huntley
  • /CreationDate: D:20120503111746-07'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20120510093904-04'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title: Security Policy, SSG 5 and SSG 20
  • pdf_file_size_bytes: 452041
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: thuntley
  • /CreationDate: D:20100106141224-08'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20100106141224-08'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /Title: Microsoft Word - Security_Policy_SSG-140_ScreenOS_6_2.doc
  • pdf_file_size_bytes: 122436
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode with the tamper evident seals and security devices installed as indicated in the Security Policy When operated in FIPS mode
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0017.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1171.pdf
web_data/description Juniper Networks integrated security devices are purpose-built to perform essential networking security functions designed on top of robust networking and security real-time operating systems, ScreenOS. These are high-performance platforms that deliver integrated security and LAN/WAN routing across high-density LAN/WAN interfaces, Juniper Networks integrated security devices address the needs of small to medium sized locations, large distributed enterprises, and service providers as well as large and co-located datacenters. The SSG 140 is a high-performance security platform for branch offices and small/medium sized standalone businesses that want to stop internal and external attacks, prevent unauthorized access, and achieve regulatory compliance. The SSG 140 is a modular platform that delivers more than 350 Mbps of stateful firewall traffic and 100 Mbps of IPSec VPN traffic.
web_data/exceptions [] Cryptographic Module Specification: Level 3, Cryptographic Module Ports and Interfaces: Level 3, Roles, Services, and Authentication: Level 3, Cryptographic Key Management: Level 3, Design Assurance: Level 3
web_data/fw_versions S, c, r, e, e, n, O, S, , 6, ., 3, r, 6, , S, c, r, e, e, n, O, S, , 6, ., 2, ., 0, r, 3
web_data/hw_versions (, S, S, G, -, 1, 4, 0, -, S, B, , a, n, d, , S, S, G, -, 1, 4, 0, -, S, H, ), , w, i, t, h, , J, N, P, R, -, F, I, P, S, -, T, A, M, P, E, R, -, L, B, L, S P, /, N, , S, S, G, -, 1, 4, 0, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
web_data/validation_history
  • date: 23.05.2012
  • lab: ICSA
  • validation_type: Initial

  • date: 24.07.2012
  • lab:
  • validation_type: Update

  • date: 11.12.2013
  • lab:
  • validation_type: Update
  • date: 18.08.2009
  • lab: UL VERIFICATION SERVICES INC
  • validation_type: Initial

  • date: 28.01.2010
  • lab:
  • validation_type: Update

  • date: 11.12.2013
  • lab:
  • validation_type: Update
web_data/vendor_url http://www.juniper.net/us/en/ http://www.juniper.net