{"product_id":4021,"v_id":4021,"product_name":"Juniper Networks M&T-Series","certification_status":"Not Certified","certification_date":"2004-01-23T00:01:00Z","tech_type":"Router","vendor_id":{"name":"HPE Juniper Networking","website":"https://www.juniper.net"},"vendor_poc":"Seyed Safakish","vendor_phone":"408.745.8158","vendor_email":"seyeds@juniper.net","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p>The TOE is all Juniper Networks M &amp; T-Series Family of Internet Routers running JUNOS 6.0r1, hereafter called JNR. The TOE is a highly scalable and flexible router. JNRs route IP traffic over any type of network, with increasing scalability of the traffic volume with each router model. All packets on the monitored network are scanned and then compared against a set of rules to determine where the traffic should be routed, and then passed to the appropriate destination.</p>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the JNR TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 2.1 and International Interpretations effective on 9 May 2003. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 1.0. Science Applications International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the product is EAL2. The product, when configured as specified in the JUNOS Internet Software Configuration Guide: Getting Started. Release 6.0 Revision 1, satisfies all of the security functional requirements stated in Juniper Networks M &amp; T-Series Family of Internet Routers running JUNOS 6.0r1 Security Target, (Version 1.0). One validator on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC. The evaluation was completed in January 2004. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report, (report number CCEVS-VR-04-0055, dated 23January 2004) prepared by CCEVS.</p>\r\n<p>The security policy or analysis on the Internet traffic passing through the router was not evaluated. Firewall or Gateway capabilities have not been tested under this evaluation. The security functions only protect the router functions from being attacked through the administrator interface by an unauthorized individual.</p>","environmental_strengths":"<p>The TOE platforms are designed as hardware devices, which perform all routing functions internally to the device. All TOE platforms are powered by JUNOS software, which provides both management functions as well as all IP routing functions. </p>\r\n<p>The TOE supports numerous routing standards, allowing it to be flexible as well as scalable. These functions can all be managed through the JUNOS software, either from a connected terminal console or via a network connection. Network management can be secured using SSL, SNMP v3, and SSH protocols. All management, whether from an administrator connecting to a terminal or from the network, requires successful authentication. JNR supports the following three security functions:</p>\r\n<ul>\r\n    <li><strong>Identification and authentication:</strong> The TOE requires users to provide unique identification and authentication data before any administrative access to the system is granted. The TOE provides the ability to define levels of authority for users, providing administrative flexibility. Full administrators have the ability to define groups and their authority and they have complete control over the TOE. <br />\r\n    <br />\r\n    </li>\r\n    <li><strong>Security Management:</strong> The TOE is managed through a Command Line Interface (CLI). Through this interface all management can be performed, including user management and the configuration of the router functions.<br />\r\n    <br />\r\n    </li>\r\n    <li><strong>Self-Protection:</strong> The TOE provides protection mechanisms for its security functions. One of the protection mechanisms is that users must authenticate before any administrative operations can be performed on the system, whether those functions are related to the management of user accounts or the configuration of routes. Another protection mechanism is that all functions of the TOE are confined to the device itself. The TOE is completely self-contained, and are therefore maintains its own execution domain. </li>\r\n</ul>","features":[]}