Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Juniper Networks SSG 520M and SSG 550M
Juniper Networks SSG 520M and SSG 550M
cert_id 1730 884
dgst dab2e78c8b5b1d04 f44b7809595e5ebe
heuristics/algorithms HMAC#953, RNG#870, SHS#1431, DSA#509, ECDSA#207, Triple-DES#1063, RSA#800, AES#1622 DSA#218, HMAC#278, AES#529, SHS#601, RSA#239, Triple-DES#535, RNG#304
heuristics/extracted_versions 6.3 5.4.0
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1: 3
    • #10: 1
    • #11: 1
    • #12: 2
    • #13: 2
    • #14: 1
    • #2: 1
    • #3: 2
    • #4: 1
    • #5: 2
    • #6: 1
    • #7: 2
    • #8: 1
    • #9: 1
  • Cert:
    • #1: 1
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES 1622: 1
    • DSA 509: 1
    • HMAC 953: 2
    • HMAC SHA-1: 16
    • HMAC SHA-256: 1
    • HMAC-SHA-1: 2
    • HMAC-SHA-256: 2
    • PKCS #1: 2
    • RSA 800: 1
    • SHA 1431: 1
    • SHA-1: 18
    • SHA-256: 3
  • Certlike:
    • HMAC SHA- 1: 1
    • HMAC SHA-1: 15
    • HMAC-SHA-1: 2
    • PKCS #1: 2
    • SHA- 1: 1
    • SHA-1: 17
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • 3DES:
      • TDES: 1
      • Triple-DES: 9
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 18
      • HMAC-SHA-256: 1
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • 3DES:
      • Triple-DES: 11
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 16
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 18
  • FF:
    • DH:
      • DH: 9
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 21
pdf_data/keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 18
    • SHA2:
      • SHA-256: 3
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 17
pdf_data/keywords/crypto_protocol
  • IKE:
    • IKE: 30
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 26
  • TLS:
    • SSL:
      • SSL: 2
  • VPN:
    • VPN: 15
  • IKE:
    • IKE: 30
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 24
  • TLS:
    • SSL:
      • SSL: 1
  • VPN:
    • VPN: 14
pdf_data/keywords/randomness
  • PRNG:
    • PRNG: 6
  • RNG:
    • RNG: 12
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 10
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140-2: 5
  • NIST:
    • NIST SP 800-57: 1
  • PKCS:
    • PKCS #1: 1
  • FIPS:
    • FIPS 140-2: 4
  • PKCS:
    • PKCS #1: 1
pdf_data/policy_metadata
  • /Author: Tim Huntley
  • /CreationDate: D:20120531152014-07'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20120601131205-04'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title: Security Policy, SSG-500 Series
  • pdf_file_size_bytes: 678485
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /Author: Tim Huntley
  • /Comments:
  • /Company: Juniper Networks, Inc.
  • /CreationDate: D:20101222122832-08'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /Keywords:
  • /ModDate: D:20101222122838-08'00'
  • /Producer: Adobe PDF Library 9.0
  • /SourceModified: D:20101222202819
  • /Subject:
  • /Title: Security Policy, SSG-500 series
  • pdf_file_size_bytes: 198864
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode with the tamper evident seals and security devices installed as indicated in the Security Policy When operated in FIPS mode
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0018.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt884.pdf
web_data/description Juniper Networks integrated security devices are purpose-built to perform essential networking security functions designed on top of robust networking and security real-time operating systems, ScreenOS. These are high-performance platforms that deliver integrated security and LAN/WAN routing across high-density LAN/WAN interfaces, Juniper Networks integrated security devices address the needs of small to medium sized locations, large distributed enterprises, and service providers as well as large and co-located datacenters. The Juniper Networks Secure Services Gateway 500 Series (SSG) represents a new class of purpose-built security appliance that delivers a perfect mix of performance, security and LAN/WAN connectivity for regional and branch office deployments. Traffic flowing in and out of the branch office is protected from worms, Spyware, Trojans, and malware by a complete set of Unified Threat Management (UTM) security features including Stateful firewall, IPSec VPN, IPS, Antivirus (includes Anti-Spyware, Anti-Adware, Anti-Phishing), Anti-Spam, and Web Filtering.
web_data/exceptions [] Cryptographic Module Specification: Level 3, EMI/EMC: Level 3
web_data/fw_versions S, c, r, e, e, n, O, S, , 6, ., 3, r, 6, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , S, c, r, e, e, n, O, S, , 5, ., 4, ., 0, r, 4, ,, , v, 5, ., 4, ., 0, r, 5, ,, , 5, ., 4, ., 0, r, 6, ,, , 5, ., 4, ., 0, r, 7, ,, , 5, ., 4, ., 0, r, 8, ,, , 5, ., 4, ., 0, r, 9, ,, , 5, ., 4, ., 0, r, 1, 0, ,, , 5, ., 4, ., 0, r, 1, 1, ,, , 5, ., 4, ., 0, r, 1, 2, ,, , 5, ., 4, ., 0, r, 1, 3, ,, , 5, ., 4, ., 0, r, 1, 4, ,, , 5, ., 4, ., 0, r, 1, 5, ,, , 5, ., 4, ., 0, r, 1, 6, ,, , 5, ., 4, ., 0, r, 1, 7, ,, , 5, ., 4, ., 0, r, 1, 8, , a, n, d, , 5, ., 4, ., 0, r, 1, 9
web_data/hw_versions [, S, S, G, -, 5, 2, 0, M, -, S, H, ,, , S, S, G, -, 5, 2, 0, M, -, S, H, -, N, ,, , S, S, G, -, 5, 2, 0, M, -, S, H, -, D, C, -, N, ,, , S, S, G, -, 5, 2, 0, M, -, N, -, T, A, A, ,, , S, S, G, -, 5, 2, 0, M, -, S, H, -, D, C, -, N, -, T, A, A, ,, , S, S, G, -, 5, 5, 0, M, -, S, H, ,, , S, S, G, -, 5, 5, 0, M, -, S, H, -, N, ,, , S, S, G, -, 5, 5, 0, M, -, S, H, -, D, C, -, N, ,, , S, S, G, -, 5, 5, 0, M, -, N, -, T, A, A, , a, n, d, , S, S, G, -, 5, 5, 0, M, -, S, H, -, D, C, -, N, -, T, A, A, ], , w, i, t, h, , J, N, P, R, -, F, I, P, S, -, T, A, M, P, E, R, -, L, B, L, S P, /, N, , S, S, G, , 5, 2, 0, M, , a, n, d, , S, S, G, , 5, 5, 0, M, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
web_data/validation_history
  • date: 12.06.2012
  • lab: ICSA
  • validation_type: Initial

  • date: 24.07.2012
  • lab:
  • validation_type: Update

  • date: 11.12.2013
  • lab:
  • validation_type: Update
  • date: 14.12.2007
  • lab: ICSA
  • validation_type: Initial

  • date: 10.07.2008
  • lab:
  • validation_type: Update

  • date: 18.05.2009
  • lab:
  • validation_type: Update
web_data/vendor_url http://www.juniper.net/us/en http://www.juniper.net