This page was not yet optimized for use on mobile devices.
Juniper Networks PTX10008 and PTX10016 Packet Transport Routers
Certificate #4961
Webpage information ?
Security policy ?
Symmetric Algorithms
AES, AES-128, AES-192, AES-256, AES-, CAST, TDES, Blowfish, HMAC, CMACAsymmetric Algorithms
RSA 2048, ECDH, ECDSA, Diffie-Hellman, DH, DSAHash functions
SHA-1, RIPEMD160Schemes
MAC, Key AgreementProtocols
SSHRandomness
DRBG, RBGElliptic Curves
P-256, P-384, P-521, prime256v1Block cipher modes
CBC, CTR, GCMTrusted Execution Environments
PSP, SSCSecurity level
Level 1, Level 6, Level 3, level 1Standards
FIPS 140-3, FIPS186-4, FIPS 186-4, FIPS 198-1, FIPS 180-4, FIPS18, SP 800-38A, SP 800-38B, SP 800-38D, SP 800-38F, SP 800-90A, SP 800-56A, SP 800-108, SP 800-135, NIST SP 800-108, NIST SP 800-90B, PKCS 1, X.509File metadata
Author | Prasiddhi Tembulkar Intertek |
---|---|
Creation date | D:20241212153000-05'00' |
Modification date | D:20241212153122-05'00' |
Pages | 67 |
Creator | Acrobat PDFMaker 24 for Word |
Producer | Adobe PDF Library 24.3.144 |
Heuristics ?
References ?
No references are available for this certificate.
Updates ?
-
24.02.2025 The certificate data changed.
Certificate changed
The web extraction data was updated.
- The exceptions property was updated.
-
11.02.2025 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name Juniper Networks PTX10008 and PTX10016 Packet Transport Routers was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4961,
"dgst": "b0ff7bdc481ed43a",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": []
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 44
},
"ECDSA": {
"ECDSA": 79
}
},
"FF": {
"DH": {
"DH": 44,
"Diffie-Hellman": 6
},
"DSA": {
"DSA": 3
}
},
"RSA": {
"RSA 2048": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 9
},
"CTR": {
"CTR": 3
},
"GCM": {
"GCM": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 192
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 6
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 58,
"P-384": 26,
"P-521": 26,
"prime256v1": 2
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"- PKCS 1": 2,
"AES 4369": 6,
"AES CBC 128, 192": 1,
"AES CTR 128": 1,
"AES- 128": 1,
"AES- 192": 1,
"AES- 256": 1,
"AES-128": 1,
"AES-192": 1,
"AES-256": 1,
"DRBG 2": 3,
"DRBG 256": 1,
"DRBG 440": 1,
"DRBG2": 14,
"HMAC 198": 2,
"HMAC- SHA-1": 4,
"HMAC-SHA-1": 6,
"PKCS 1": 2,
"RSA 2048": 1,
"RSA2": 1,
"SHA-1": 8,
"SHA-2- 512": 1,
"SHA2- 256": 2,
"SHA2- 512": 1,
"SHA2-256": 32,
"SHA2-384": 3,
"SHA2-512": 17
}
},
"fips_security_level": {
"Level": {
"Level 1": 5,
"Level 3": 1,
"Level 6": 1,
"level 1": 3
}
},
"hash_function": {
"RIPEMD": {
"RIPEMD160": 2
},
"SHA": {
"SHA1": {
"SHA-1": 9
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 31
},
"RNG": {
"RBG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 15,
"FIPS 180-4": 6,
"FIPS 186-4": 8,
"FIPS 198-1": 4,
"FIPS18": 8,
"FIPS186-4": 30
},
"NIST": {
"NIST SP 800-108": 2,
"NIST SP 800-90B": 2,
"SP 800-108": 1,
"SP 800-135": 1,
"SP 800-38A": 5,
"SP 800-38B": 1,
"SP 800-38D": 4,
"SP 800-38F": 1,
"SP 800-56A": 4,
"SP 800-90A": 2
},
"PKCS": {
"PKCS 1": 2
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 18,
"AES-": 17,
"AES-128": 1,
"AES-192": 1,
"AES-256": 1
},
"CAST": {
"CAST": 69
}
},
"DES": {
"3DES": {
"TDES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 8,
"HMAC": 25
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 3
}
}
},
"tee_name": {
"AMD": {
"PSP": 9
},
"IBM": {
"SSC": 20
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Prasiddhi Tembulkar Intertek",
"/Comments": "",
"/Company": "",
"/CreationDate": "D:20241212153000-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 24 for Word",
"/Keywords": "",
"/ModDate": "D:20241212153122-05\u002700\u0027",
"/Producer": "Adobe PDF Library 24.3.144",
"/SourceModified": "",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 1052560,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://csrc.nist.gov/projects/cryptographic-module-validation-program",
"http://www.juniper.net/support/downloads/junos.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 67
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "c2e5b11c028327d36d0f207984c521c74651e1297274b232cf6c2e10d0c5de81",
"policy_txt_hash": "a45a2c0d04dd1f1f4f1f0f0dc702ee010c2d3fff566d0ef1f45896420f24a40d"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "Interim validation. When operated in Approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy. No assurance of minimum security of SSPs (e.g., keys, bit strings) that are externally loaded, or of SSPs established with externally loaded SSPs.",
"certificate_pdf_url": null,
"date_sunset": "2027-02-06",
"description": "The cryptographic module provides for an encrypted connection, using SSH, between the management station and the module. The cryptographic module also provides for an encrypted connection, using MACsec, between devices.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, services, and authentication: Level 3",
"Non-invasive security: N/A",
"Mitigation of other attacks: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Juniper Networks PTX10008 and PTX10016 Packet Transport Routers",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2025-02-07",
"lab": "ACUMEN SECURITY, LLC",
"validation_type": "Initial"
}
],
"vendor": "Juniper Networks, Inc.",
"vendor_url": "http://www.juniper.net"
}
}