This page was not yet optimized for use on mobile devices.
Juniper Networks EX4300-48MP Ethernet Switch
Certificate #4959
Webpage information ?
Security policy ?
Symmetric Algorithms
AES, AES-, CAST, Blowfish, HMAC, CMACAsymmetric Algorithms
RSA 2048, ECDH, ECDSA, Diffie-Hellman, DH, DSAHash functions
SHA-1Schemes
Key AgreementProtocols
SSHRandomness
DRBG, RBGLibraries
OpenSSLElliptic Curves
P-256, P-384, P-521, P-512, prime256v1Block cipher modes
ECB, CBC, CTR, GCMTrusted Execution Environments
PSP, SSCSecurity level
Level 1, Level 3, level 1Standards
FIPS 140-3, FIPS186-4, SP 800-38D, SP 800-108, SP 800-38A, SP 800-38F, NIST SP 800-90B, SP 800-90B, NIST SP 800-108, ISO/IEC 24759, X.509File metadata
Author | Aniket Ingle Intertek |
---|---|
Creation date | D:20231228174130+05'30' |
Modification date | D:20231228174130+05'30' |
Pages | 54 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
References
OutgoingHeuristics ?
References ?
Updates ?
-
11.02.2025 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name Juniper Networks EX4300-48MP Ethernet Switch was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4959,
"dgst": "04e729a9c402868a",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": []
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"4304",
"4369"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"4304",
"47",
"4369"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"4369",
"4304"
]
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 19
},
"ECDSA": {
"ECDSA": 44
}
},
"FF": {
"DH": {
"DH": 20,
"Diffie-Hellman": 3
},
"DSA": {
"DSA": 3
}
},
"RSA": {
"RSA 2048": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 13
},
"CTR": {
"CTR": 7
},
"ECB": {
"ECB": 8
},
"GCM": {
"GCM": 18
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"SSH": {
"SSH": 85
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 6
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 66,
"P-384": 36,
"P-512": 4,
"P-521": 20,
"prime256v1": 2
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#4304": 1,
"#4369": 1
}
},
"fips_certlike": {
"Certlike": {
"AES CBC 128": 2,
"AES CBC 128, 192": 1,
"AES CBC 192": 2,
"AES CBC 256": 2,
"AES CMAC 128": 2,
"AES CMAC 256": 2,
"AES CTR 128": 1,
"AES GCM 128": 2,
"AES GCM 128 and 256": 1,
"AES GCM 192": 2,
"AES GCM 256": 2,
"HMAC 198": 2,
"HMAC-SHA-1": 14,
"RSA 2048": 3,
"RSA2": 1,
"SHA-1": 14,
"SHA2- 256": 47,
"SHA2- 384": 3,
"SHA2- 512": 20,
"SHA2-256": 30,
"SHA2-384": 7,
"SHA2-512": 13
}
},
"fips_security_level": {
"Level": {
"Level 1": 5,
"Level 3": 1,
"level 1": 3
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 14
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 14
},
"RNG": {
"RBG": 13
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 11,
"FIPS186-4": 7
},
"ISO": {
"ISO/IEC 24759": 2
},
"NIST": {
"NIST SP 800-108": 1,
"NIST SP 800-90B": 4,
"SP 800-108": 6,
"SP 800-38A": 1,
"SP 800-38D": 3,
"SP 800-38F": 1,
"SP 800-90B": 1
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 42,
"AES-": 3
},
"CAST": {
"CAST": 5
}
},
"constructions": {
"MAC": {
"CMAC": 6,
"HMAC": 26
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 2
}
}
},
"tee_name": {
"AMD": {
"PSP": 7
},
"IBM": {
"SSC": 11
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Aniket Ingle Intertek",
"/CreationDate": "D:20231228174130+05\u002730\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20231228174130+05\u002730\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 802436,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://csrc.nist.gov/projects/cryptographic-module-validation-program",
"https://www.acumensecurity.net/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 54
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "01a35234ca0690c8c18cf0be12a31cb78ba330453bb9d4b5840abb296b7f6955",
"policy_txt_hash": "ce6b66afb93cbfe293ecc0c3600dfb7168bb681581165e5b74b79be43ad62886"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "Interim validation. When operated in Approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy. No assurance of minimum security of SSPs (e.g., keys, bit strings) that are externally loaded, or of SSPs established with externally loaded SSPs.",
"certificate_pdf_url": null,
"date_sunset": "2027-02-06",
"description": "The cryptographic module provides for an encrypted connection, using SSH, between the management station and the module. The cryptographic module also provides for an encrypted connection, using MACsec, between devices.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, services, and authentication: Level 3",
"Non-invasive security: N/A",
"Mitigation of other attacks: N/A",
"Documentation requirements: N/A",
"Cryptographic module security policy: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Juniper Networks EX4300-48MP Ethernet Switch",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2025-02-07",
"lab": "ACUMEN SECURITY, LLC",
"validation_type": "Initial"
}
],
"vendor": "Juniper Networks, Inc.",
"vendor_url": "http://www.juniper.net"
}
}