Understanding the Common Criteria Evaluated Configuration
This document describes the steps required to duplicate the configuration of the device running Junos OS when the device is evaluated. This is referred to as the evaluated configuration. The following list describes the standards to which the device has been evaluated:
The CC documents are available at https://www.niap-ccevs.org/Profile/PP.cfm?archived=1.
For regulatory compliance information about Common Criteria, and FIPS for Juniper Networks products, see the Juniper Networks Compliance Advisor.
Understanding Common Criteria
Common Criteria for information technology is an international agreement signed by several countries that permits the evaluation of security products against a common set of standards. In the Common Criteria Recognition Arrangement (CCRA) at http://www.commoncriteriaportal.org/ccra/, the participants agree to mutually recognize evaluations of products performed in other countries. All evaluations are performed using a common methodology for information technology security evaluation.
For more information on Common Criteria, see http://www.commoncriteriaportal.org/.
Target of Evaluation (TOE) is a device or system subjected to evaluation based on Collaborative Protection Profile (cPP).
On MX240, MX480, MX960, MX2010, and MX2020 devices, Junos OS Release 19.1R2 is certified for Common Criteria with FIPS mode enabled on the devices.
For the features described in this document, the following platforms are supported:
Routing Engine (RE-S-1800X4, RE-MX2000-1800X4, and REMX2K-1800-32G, or RE-S-X6-64G and REMX2K-X8-64G) and service PIC (MSMPC for VPNEP) have to be installed on MX240, MX480, MX960, MX2010, and MX2020 to qualify NDcPPv2 and VPNEP.