Understanding the Common Criteria Evaluated Configuration
This document describes the steps required to duplicate the configuration of the device running Junos OS when the device is evaluated. This is referred to as the evaluated configuration. The following list describes the standards to which the device has been evaluated:
These documents are available at https://www.niap-ccevs.org/Profile/PP.cfm?archived=1.
On MX240, MX480, MX960, MX2008, MX2010, MX2020, EX9204, EX9208, and EX9214 devices, Junos OS Release 18.1R1 is certified for Common Criteria with FIPS mode enabled on the devices.
For regulatory compliance information about Common Criteria, and FIPS for Juniper Networks products, see the Juniper Networks Compliance Advisor.
Understanding Common Criteria
Common Criteria for information technology is an international agreement signed by 28 countries that permits the evaluation of security products against a common set of standards. In the Common Criteria Recognition Arrangement (CCRA) at http://www.commoncriteriaportal.org/ccra/, the participants agree to mutually recognize evaluations of products performed in other countries. All evaluations are performed using a common methodology for information technology security evaluation.
For more information on Common Criteria, see http://www.commoncriteriaportal.org/.
Target of Evaluation (TOE) is a device or system subjected to evaluation based on Collaborative Protection Profile (cPP).
For the features described in this document, the following platforms are supported:
Routing Engine (RE-S-1800X4, RE-MX2000-1800X4, and REMX2K-1800-32G, or RE-S-X6-64G and REMX2K-X8-64G) and service PIC (MSMPC for VPNEP) have to be installed on MX240, MX480, MX960, MX2008, MX2010, and MX2020 to qualify NDcPPv2E.
Routing Engine (EX9200-RE or EX9200-RE2) has to be installed on EX9204, EX9208, and EX9214 to qualify NDcPPv2E.