Extreme Networks, Inc. ExtremeXOS Network Operating System v
|
|
|
- Rodger Harper
- 9 years ago
- Views:
Transcription
1 Extreme Networks, Inc. ExtremeXOS Network Operating System v Security Target Evaluation Assurance Level: EAL3+ Document Version: 0.9 Prepared for: Prepared by: Extreme Networks, Inc Monroe Street Santa Clara, CA Corsec Security, Inc Lee Jackson Memorial Hwy., Suite 220 Fairfax, VA Phone: Phone:
2 Table of Contents 1 INTRODUCTION PURPOSE SECURITY TARGET AND TOE REFERENCES TOE OVERVIEW TOE Environment TOE DESCRIPTION Architecture Physical Boundaries Logical Boundaries CONFORMANCE CLAIMS SECURITY PROBLEM THREATS TO SECURITY ORGANIZATIONAL SECURITY POLICIES ASSUMPTIONS SECURITY OBJECTIVES SECURITY OBJECTIVES FOR THE TOE SECURITY OBJECTIVES FOR THE OPERATIONAL ENVIRONMENT IT Security Objectives Non-IT Security Objectives EXTENDED COMPONENTS EXTENDED TOE SECURITY FUNCTIONAL COMPONENTS EXTENDED TOE SECURITY ASSURANCE COMPONENTS SECURITY REQUIREMENTS CONVENTIONS SECURITY FUNCTIONAL REQUIREMENTS Class FAU: Security Audit Class FDP: User Data Protection Class FIA: Identification and Authentication Class FMT: Security Management Class FPT: Protection of the TSF Class FTA: TOE Access SECURITY ASSURANCE REQUIREMENTS TOE SPECIFICATION TOE SECURITY FUNCTIONS Security Audit User Data Protection Identification and Authentication Security Management Protection of the TSF TOE Access RATIONALE CONFORMANCE CLAIMS RATIONALE SECURITY OBJECTIVES RATIONALE Security Objectives Rationale Relating to Threats Security Objectives Rationale Relating to Assumptions SECURITY REQUIREMENTS RATIONALE Security Functional Requirements Rationale SECURITY ASSURANCE REQUIREMENTS RATIONALE Requirement Dependency Rationale Extreme Networks ExtremeXOS Network Operating System v Page 2 of 46
3 9 ACRONYMS Table of Figures FIGURE 1 BLACKDIAMOND AND SUMMIT SWITCHES HIGH-LEVEL ARCHITECTURE... 7 FIGURE 2 EXOS PHYSICAL BOUNDARIES... 8 List of Tables TABLE 1 ST AND TOE REFERENCES... 4 TABLE 2 CC AND PP CONFORMANCE TABLE 3 THREATS TABLE 4 ASSUMPTIONS TABLE 5 SECURITY OBJECTIVES FOR THE TOE TABLE 6 IT SECURITY OBJECTIVES TABLE 7 NON-IT SECURITY OBJECTIVES TABLE 8 TOE SECURITY FUNCTIONAL REQUIREMENTS TABLE 9 MANAGEMENT OF TSF DATA TABLE 10 ASSURANCE REQUIREMENTS TABLE 11 MAPPING OF TOE SECURITY FUNCTIONS TO SECURITY FUNCTIONAL REQUIREMENTS TABLE 12 THREATS: OBJECTIVES MAPPING TABLE 13 ASSUMPTIONS: OBJECTIVES MAPPING TABLE 14 OBJECTIVES: SFRS MAPPING TABLE 15 FUNCTIONAL REQUIREMENTS DEPENDENCIES TABLE 16 ACRONYMS Extreme Networks ExtremeXOS Network Operating System v Page 3 of 46
4 1 Introduction This section identifies the Security Target (ST), Target of Evaluation (TOE), and the ST organization. The Target of Evaluation is the Extreme Networks ExtremeXOS Network Operating System v (EXOS), and will hereafter be referred to as the TOE throughout this document. The TOE is a software-only operating system (OS) that runs on the BlackDiamond 8500/8800/8900 series switch and all Summit model switches. The switches and EXOS are produced by Extreme Networks, Inc. The BlackDiamond and Summit switches are network switching appliances, designed to provide network traffic management and control. 1.1 Purpose This ST is divided into nine sections, as follows: Introduction (Section 1) Provides a brief summary of the ST contents and describes the organization of other sections within this document. It also provides an overview of the TOE security functions and describes the physical and logical scope for the TOE, as well as the ST and TOE references. Conformance Claims (Section 2) Provides the identification of any Common Criteria (CC), ST Protection Profile, and Evaluation Assurance Level (EAL) package claims. It also identifies whether the ST contains extended security requirements. Security Problem (Section 3) Describes the threats, organizational security policies, and assumptions that pertain to the TOE and its environment. Security Objectives (Section 4) Identifies the security objectives that are satisfied by the TOE and its environment. Extended Components (Section 5) Identifies new components (extended Security Functional Requirements (SFRs) and extended Security Assurance Requirements (SARs)) that are not included in CC Part 2 or CC Part 3. Security Requirements (Section 6) Presents the SFRs and SARs met by the TOE. TOE Specification (Section 7) Describes the security functions provided by the TOE that satisfy the security functional requirements and objectives. Rationale (Section 8) - Presents the rationale for the security objectives, requirements, and SFR dependencies as to their consistency, completeness, and suitability. Acronyms (Section 9) Defines the acronyms and terminology used within this ST. 1.2 Security Target and TOE References ST Title ST Version Version 0.9 ST Author ST Publication Date 3/12/2012 TOE Reference Keywords Table 1 ST and TOE References Extreme Networks, Inc. ExtremeXOS Network Operating System v Security Target Corsec Security, Inc. Extreme Networks ExtremeXOS Network Operating System v Modular Switching Products, Modular OS, Ethernet Network Extreme Networks ExtremeXOS Network Operating System v Page 4 of 46
5 1.3 TOE Overview The TOE is network switching software, designed to provide network traffic management and control. The TOE runs on network switch appliances. It is a software-only TOE. The TOE is a full-featured operating system that is designed specifically for the Extreme Networks BlackDiamond and Summit network switches. The TOE is limited to the EXOS version The BlackDiamond and Summit network switches are a required component of the TOE environment. The TOE is designed to protect and transfer user data across a network reliably and in a timely fashion. The TOE includes the following features: Virtual routers: This capability allows a single physical switch to be split into multiple virtual routers. This feature separates the traffic forwarded by a virtual router from the traffic on a different virtual router. Each virtual router maintains a separate logical forwarding table, which allows the virtual routers to have overlapping address spaces. Because each virtual router maintains its own separate routing information, and switch ports can belong to one and only one virtual router, packets arriving at a port on one virtual router can never be switched to the ports on another. Load Sharing: Load sharing supports an increase in bandwidth and resiliency by using a group of ports to carry traffic in parallel between systems. This feature allows the switch to use multiple ports as a single logical port TOE Environment The TOE runs on the following hardware appliances: BlackDiamond 8500/8800/8900 Series Switch Summit X150 Series Summit X250e Series Summit X350 Series Summit X450 Series Summit X450a Series Summit X450e Series Summit X650 Series SummitStack The BlackDiamond switches are referred to as chassis switches because they are designed to be physically upgradeable or extendable (i.e., new cards and interfaces can be added, etc.), while the Summit switches are referred to as fixed switches since they are generally not designed to be physically upgradeable. While the Summit switches generally consist of a mainboard and daughterboard that implement all ports, interfaces, and functionality, the BlackDiamonds are composed of: a Management Switch Module (MSM), which provides the management plane and switch plane, or a Management Module (MM), which provides just the management plane a Switch Fabric (SF) module, which provides the switch fabric if an MM (rather than an MSM) is present Extreme Networks ExtremeXOS Network Operating System v Page 5 of 46
6 several I/O 1 modules (IOB 2 s), which provide the network interfaces (copper, Fibre Channel, etc.) a control plane, which provides Gigabit Ethernet (GigE) connectivity between each of the modules The TOE relies on the switches to include a hardware clock and provides a reliable time stamp. By default, the memory buffer and the NVRAM 3 in the switch (on which the TOE runs) are configured to store the generated audit records. The TOE shall use a Syslog server in the IT environment to store the generated audit records. 1.4 TOE Description The TOE is the ExtremeXOS Network Operating System v It is a software only TOE that performs switching and security functions. The TOE provides logical connections for management of network traffic flow and for management access. The TOE consists of custom-written application software that provides the switching and other productspecific functionality, running on a customized Linux operating system Architecture The BlackDiamond and Summit switches run essentially the same software. The software images for each are compiled from the same source code, but features unusable on specific models are not compiled into the software image for that model. Each BlackDiamond runs a uniquely compiled software image, while all of the Summit appliances run the same software image. Figure 1 below provides a diagram showing the highlevel architecture and deployment posture. 1 I/O Input/Output 2 IOB Input/Output Blade; Also called Input/Output Module 3 NVRAM Non-volatile random access memory Extreme Networks ExtremeXOS Network Operating System v Page 6 of 46
7 Stac k MGMT 1 STAC MAST K FAN 2 1ER PSU-I3 2 PSU-E 4 STAC K NSummit O. TM X650-24x Management USB CONSOLE s A 4 B 5 6 Security Target, Version 0.9 March 12, 2012 EXOS Linux OS Switch Appliance Hardware 8806 EXOS Linux OS Switch Appliance Hardware BlackDiamond 8500/8800/8900 series switch Summit (any model) Corporate Network Management Workstation Servers / Workstations Figure 1 BlackDiamond and Summit Switches High-Level Architecture On the BlackDiamond, EXOS runs on the MM or MSM (whichever is present). When the IOBs boot up, they load their software images from the EXOS software running on the MM or MSM. The boot process of the BlackDiamond and Summit switches can be generalized by the following steps: 1. EXOS kernel boots from flash memory (on the mainboard on the Summit, or on the MM or MSM on the BlackDiamond) 2. EXOS kernel loads the EXOS Process Monitor (EPM) 4 3. EPM loads and monitors all other required processes After EXOS has successfully booted, the management interfaces are available (and can be dynamically enabled or disabled as desired). As an Ethernet switch, the core product functionality primarily focuses on switching packets to their intended destinations as quickly as possible. 4 EPM is the root of all EXOS processes. EPM performs active monitoring of all EXOS processes. Extreme Networks ExtremeXOS Network Operating System v Page 7 of 46
8 1.4.2 Physical Boundaries This section identifies the hardware and software components of the product that are in the TOE. Section identifies the hardware and software components that the TOE relies upon and that are part of the IT 5 environment. There are no hardware components that are part of the TOE. The TOE runs on the hardware appliances listed in Section The following software component constitutes the entire TOE: ExtremeXOS Network Operating System v EXOS is based on a MontaVista Linux real-time operating system (which is based on Linux kernel v2.4). Figure 2 below shows the physical boundary of the TOE. Switch EXOS Servers/Workstations Corporate Network Linux OS Switch Appliance Hardware Management Workstation TOE Component IT Environment Component Figure 2 EXOS Physical Boundaries Guidance Documentation The TOE includes the following guidance: ExtremeXOS Concepts Guide, Software Version 12.3, published June 2009, part number Rev.01 ExtremeXOS Command Reference Guide, Software Version 12.3, published June 2009, part number Rev.01 5 IT Information Technology Extreme Networks ExtremeXOS Network Operating System v Page 8 of 46
9 1.4.3 Logical Boundaries The logical boundaries of the TOE include the security functions of the TOE interfaces. The TOE logically supports the following security functions: Security Audit User Data Protection Identification and Authentication Security Management Protection of the TOE Security Functions (TSF) TOE Access Security Audit The TOE collects audit data on security-relevant user actions and provides an interface for reviewing the audit logs. Audit information generated by the system includes date and time of the event, user identifier (ID) that caused the event to be generated, computer where the event occurred, and other event-specific data. The TOE provides a reliable time stamp, relying on the hardware appliance to include a hardware clock. The ability to review all audit records is available to all users; however, users with the User role will see sanitized forms of certain audit records (for example, login and logout records will have the usernames removed) User Data Protection The TOE enforces a Switch Traffic Flow control policy which restricts access to the network. The TOE provides an Administrator the ability to define access rules on the traffic received by the TOE. The access control lists consist of access rules and are used to perform packet filtering and forwarding decisions on incoming traffic Identification and Authentication The TOE requires users to provide unique identification and authentication data before any administrative access to the system is granted. The TOE provides the ability to define levels of authority and access for users, providing administrative flexibility. The TOE does not require identification and authentication for information flow through the switch. The TOE supports local authentication via usernames and passwords. Administrators can configure a password policy for the product, specifying the password complexity and composition requirements and the allowed number of failed authentication attempts before lockout occurs Security Management The TOE is managed through the following management interfaces, which can be dynamically enabled or disabled as desired. Command Line Interface (CLI) ScreenPlay Web GUI 6 ( Flash interface ) Remote Manage interface XML 7 /WebServices interface 6 GUI Graphical User Interface 7 XML extensible Markup Language Extreme Networks ExtremeXOS Network Operating System v Page 9 of 46
10 The CLI is accessible through a remote console, as well as a local terminal console (a management console) via a serial port. Through this interface all management can be performed, including user management and the configuration of the switch functions. The Web GUI, called ScreenPlay, consists of Adobe Flash web applications that are served to users connecting to the switch via HTTPS 8. ScreenPlay provides a subset of the full configuration functionality available via the CLI. The XML/Web Services interface is accessible via HTTPS. It allows arbitrary external programs to administer the switch (assuming that they are properly authenticated) by exposing the switch s management functions as XML-based WebServices APIs 9. The Remote Manage is accessible via SNMP 10 v1, v2, and v3 protocol for remote reporting and remote management of the switch. In the CC-evaluated configuration, the use of SNMP v1 and v2 are excluded. The Time Stamp interface is accessible via the kernel of the operating system. It allows for a reliable source of synchronizing the internal clock of the EXOS through the hardware of the client machine. There are two types of administrative users in the system: Administrator (fully privileged administrators) and User (restricted or non-privileged users). Users only have read-only access (no changes are allowed), and certain data is sanitized for display to them (such as usernames in certain audit logs, as described above). By default two predefined users: admin and user are created. At installation time, the administrator can also choose to enable a failsafe user account, which allows recovery of the system if all of the other accounts get locked out Protection of the TSF The TOE provides protection mechanisms for its security functions. One of the protection mechanisms is that users must authenticate before any administrative operations can be performed on the system, whether those functions are related to the management of user accounts or the configuration of traffic flows. Another protection mechanism is that all functions of the TOE are confined to the TOE itself. The TOE is completely self-contained, and therefore maintains its own execution domain TOE Access An administrator can configure the TOE to display a warning banner at the beginning of each login prompt of each session Physical/Logical Features and Functionality Not Included in the Evaluated Configuration of the TOE The following features/functionalities are not included in the evaluated configuration: Use of an external TACACS+ server Use of an external RADIUS server SNMP Protocol v1, and v2 Cryptographic operations Telnet 8 HTTPS Secure HTTP, where HTTP stands for Hypertext Transport Protocol 9 API Application Programming Interface 10 SNMP Simple Network Management Protocol; SNMP version 1 and 2 are not included in the evaluated configuration. SNMP v3 is used for authentication purposes and is not being used to claim any cryptographic functionality. Extreme Networks ExtremeXOS Network Operating System v Page 10 of 46
11 Extreme Networks ExtremeXOS Network Operating System v Page 11 of 46
12 2 Conformance Claims This section provides the identification for any CC, Protection Profile (PP), and EAL package conformance claims. Rationale is provided for any extensions or augmentations to the conformance claims. Rationale for CC and PP conformance claims can be found in Section 8.1. Table 2 CC and PP Conformance Common Criteria (CC) Identification and Conformance PP Identification Evaluation Assurance Level Common Criteria for Information Technology Security Evaluation, Version 3.1, [Revision 3], [July 2009]; CC Part 2 [conformant]; CC Part 3 [conformant]; PP claim (none); Parts 2 and 3 Interpretations from the CEM as of 2009/12/14 were reviewed, and no interpretations apply to the claims made in this ST. None EAL3+ Augmented with Flaw Remediation (ALC_FLR.2) Extreme Networks ExtremeXOS Network Operating System v Page 12 of 46
13 3 Security Problem The TOE security environment describes the security aspects of the intended environment in which the TOE is to be used and the manner in which it is expected to be employed. The statement of TOE security environment defines the following: Known and presumed threats countered by either the TOE or by the security environment Organizational security policies with which the TOE must comply Assumptions made on the operational environment and the method of use intended for the product The TOE is intended to be used in environments where the TOE components can be physically protected from tampering and where necessary information will be available via other network components (e.g. routers). 3.1 Threats to Security This section identifies the threats to the IT assets against which protection is required by the TOE or by the security environment. The following threats are applicable: Table 3 Threats Name T.MEDIATE T.NOAUDIT T.NOMGMT T.PRIV Description An unauthorized person may send impermissible information through the TOE which results in the exploitation of resources on the internal network. A user may not be accountable for his actions due to his actions not being recorded or due to an administrator not reviewing the audit records. An authorized administrator is not able to manage the TOE security functions and data which results in the TOE being configured in an insecure manner. An unauthorized user may gain access to the TOE and exploit system privileges to gain access to TOE security functions and data, inappropriately changing the configuration data for TOE security functions. 3.2 Organizational Security Policies An Organizational Security Policy (OSP) is a set of security rules, procedures, or guidelines imposed by an organization on the operational environment of the TOE. There are no OSPs defined for this ST. 3.3 Assumptions This section describes the security aspects of the intended environment for the evaluated TOE. The operational environment must be managed in accordance with assurance requirement documentation for delivery, operation, and user guidance. The following specific conditions are required to ensure the security of the TOE and are assumed to exist in an environment where this TOE is employed. Extreme Networks ExtremeXOS Network Operating System v Page 13 of 46
14 Table 4 Assumptions Name A.AUDREV A.FLOW A.GENPUR A.LOCATE A.NOEVIL A.EXCLUSIVE Description The TOE administrators will periodically review the audit records generated by the TOE. The TOE will be placed in a network infrastructure such that information to be controlled will always flow through the TOE. The TOE does not have the ability to run general purpose applications and does not host public data. The processing resources of the TOE will be located within controlled access facilities, which will prevent unauthorized physical access. The users who manage the TOE are non-hostile, appropriately trained, and follow all guidance. All administrative interfaces are not accessible to non-administrators and only administrators have access to the administrative interfaces to ensure the network is secure. Extreme Networks ExtremeXOS Network Operating System v Page 14 of 46
15 4 Security Objectives This section defines the security objectives of the TOE and its supporting environment. Security objectives, categorized as either IT security objectives or non-it security objectives, reflect the stated intent to counter identified threats and/or comply with any organizational security policies identified. All of the identified threats and organizational policies are addressed under one of the categories below. 4.1 Security Objectives for the TOE The specific security objectives for the TOE are as follows: Table 5 Security Objectives for the TOE Name O.ACCESS O.ACCOUNT O.ADMIN O.AUDIT O.IDAUTH O.MEDIATE O.PROTECT Description The TOE must allow only authorized users and processes (applications) to access protected TOE functions and data. The TOE must provide user accountability for information flows through the TOE and for authorized administrators' use of security functions related to audit. The TOE must provide services that allow effective management of its functions and data. The TOE must provide a means to record an audit trail of securityrelated events, with accurate dates and times. The TOE must require that all administrative users be identified and authenticated prior to obtaining administrative access. The TOE will mediate the flow of information from users on a connected network to users on another connected network as defined by administrator-configured policies/routing information. The TOE must protect itself from unauthorized access to its functions and data. 4.2 Security Objectives for the Operational Environment IT Security Objectives The following IT security objectives are to be satisfied by the environment: Table 6 IT Security Objectives Name OE.IDAUTH OE.PROTECT Description The TOE operating environment shall provide the ability to uniquely identify and authenticate remote users. The TOE operating environment shall provide the ability to protect the data in transit from unauthorized modifications. Extreme Networks ExtremeXOS Network Operating System v Page 15 of 46
16 OE.TIME OE.SYSLOG The TOE will have access to a hardware clock from the TOE environment. The TOE operating environment will include a syslog server to provide storage for audit records Non-IT Security Objectives The following non-it environment security objectives are to be satisfied without imposing technical requirements on the TOE. That is, they will not require the implementation of functions in the TOE hardware and/or software. Thus, they will be satisfied largely through application of procedural or administrative measures. Table 7 Non-IT Security Objectives Name OE.AUDREV OE.FLOW OE.GENPUR OE.MANAGE OE.PHYS OE.ADMIN Description The TOE administrators will be trained to periodically review the audit records generated by the TOE. The network infrastructure in which the TOE is placed must be installed, administered and operated in a manner that ensures all information to be controlled flows through the TOE. The TOE will not execute general purpose applications and the TOE does not host public data. Authorized administrators are trained, non-hostile and follow all administrator guidance. Those responsible for the TOE must ensure that those parts of the TOE critical to security policy are protected from any physical attack. The administrator must not be careless, negligent, or willfully hostile; must be appropriately trained; and must follow all guidance. Extreme Networks ExtremeXOS Network Operating System v Page 16 of 46
17 5 Extended Components This section defines the extended SFRs and extended SARs met by the TOE. These requirements are presented following the conventions identified in Section Extended TOE Security Functional Components There are no extended TOE security functional components defined for this evaluation. 5.2 Extended TOE Security Assurance Components There are no extended TOE security assurance components defined for this evaluation. Extreme Networks ExtremeXOS Network Operating System v Page 17 of 46
18 6 Security Requirements This section defines the SFRs and SARs met by the TOE. 6.1 Conventions There are several font variations used within this ST. Selected presentation choices are discussed here to aid the Security Target reader. The CC allows for assignment, refinement, selection and iteration operations to be performed on security functional requirements. Assignment and selection operations are used within this ST. These operations are performed as described in Part 2 of the CC, and are shown as follows: Completed assignment statements are identified using [italicized text within brackets]. Completed selection statements are identified using [underlined italicized text within brackets]. Refinements are identified using bold text. Any text removed is stricken (Example: TSF Data) and should be considered as a refinement. Extended Functional and Assurance Requirements are identified using EXT_ at the beginning of the short name. Iterations are identified by appending a letter in parentheses following the component title. For example, FAU_GEN.1(a) Audit Data Generation would be the first iteration and FAU_GEN.1(b) Audit Data Generation would be the second iteration. 6.2 Security Functional Requirements This section specifies the SFRs for the TOE. This section organizes the SFRs by CC class. Table 8 identifies all SFRs implemented by the TOE and indicates the ST operations performed on each requirement. Table 8 TOE Security Functional Requirements Name Description S A R I FAU_GEN.1 Audit data generation FAU_SAR.1 Audit review FDP_IFC.1 Subset information flow control FDP_IFF.1 Simple security attributes FIA_AFL.1 Authentication failure handling FIA_ATD.1 User attribute definition FIA_SOS.1 Verification of secrets FIA_UAU.1 Timing of authentication FIA_UID.1 Timing of identification FMT_MSA.1 Management of security attributes FMT_MSA.3 Static attribute initialisation FMT_MTD.1 Management of TSF data FMT_SMF.1 Specification of management functions FMT_SMR.1 Security roles Extreme Networks ExtremeXOS Network Operating System v Page 18 of 46
19 FPT_STM.1 Reliable time stamps FTA_TAB.1 Default TOE access banners Note: S=Selection; A=Assignment; R=Refinement; I=Iteration Extreme Networks ExtremeXOS Network Operating System v Page 19 of 46
20 6.2.1 Class FAU: Security Audit FAU_GEN.1 Audit Data Generation Hierarchical to: No other components. FAU_GEN.1.1 The TSF shall be able to generate an audit record of the following auditable events: a) Start-up and shutdown of the audit functions; b) All auditable events, for the [not specified] level of audit; and c) [authentication attempts FIA_UID.1 & FIA_UAU.1) and administrative actions (FMT_MSA.1, FMT_MSA3, FMT_MTD.1)]. FAU_GEN.1.2 The TSF shall record within each audit record at least the following information: a) Date and time of the event, type of event, subject identity, and the outcome (success or failure) of the event; and b) For each audit event type, based on the auditable event definitions of the functional components included in the PP/ST, [no additional information]. Dependencies: FPT_STM.1 Reliable time stamps FAU_SAR.1 Audit review Hierarchical to: No other components. FAU_SAR.1.1 The TSF shall provide [administrator, user 11 ] with the capability to read [all auditable events] from the audit records. FAU_SAR.1.2 The TSF shall provide the audit records in a manner suitable for the user to interpret the information. Dependencies: FAU_GEN.1 Audit data generation 11 The user role will see sanitized forms of certain audit records (for example, login and logout records will have the usernames removed. Extreme Networks ExtremeXOS Network Operating System v Page 20 of 46
21 6.2.2 Class FDP: User Data Protection FDP_IFC.1 Subset information flow control Hierarchical to: No other components. FDP_IFC.1.1 The TSF shall enforce the [Switch Traffic Flow SFP 12 ] on [ subjects: IT entities sending and receiving information through the TOE, information: network traffic; and, operations: switching and routing of information]. Dependencies: FDP_IFF.1 Simple security attributes FDP_IFF.1 Simple security attributes Hierarchical to: No other components. FDP_IFF.1.1 The TSF shall enforce the [Switch Traffic Flow SFP] based on the following types of subject and information security attributes: [a. subject security: attributes: the presumed address b. information security attributes: presumed address of the source subject; presumed address of the destination subject; IP 13 protocol field; TCP 14 /UDP 15 source port (DHCP 16, NTP 17, etc.); TCP/UDP destination port (DHCP, NTP, etc); TCp flags; ICMP 18 message type; ICMP code field; ICMP-type; Source Service Advertising Protocol (SAP); Destination SAP; Snap Type; IP Type of Service (TOS) field; Fragments; Virtual Local Area Network (VLAN) ID Ethernet packet type (e.g., IP, IPv6, 8021.Q); Ethernet source Media Access Control (MAC) address; 12 SFP Security Function Policy 13 IP Internet Protocol 14 TCP Transport Control Protocol 15 UDP User Datagram Protocol 16 DHCP - Dynamic Host Configuration Protocol 17 NTP Network Time Protocol 18 ICMP Internet Control Message Protocol Extreme Networks ExtremeXOS Network Operating System v Page 21 of 46
22 Ethernet destination MAC address; TOE interface on which traffic information arrives and depart]. FDP_IFF.1.2 The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following rules hold: [a) A virtual circuit has been established between the inbound TOE interface and some other interface (in which case the information is forwarded to the associated outbound TOE interface) AND all of the information security attribute values are unambiguously permitted by the Access Control List (ACL) rules, where such rules may be composed from all possible combinations of the values of the information flow security attributes, created by an authorized administrator OR b) The presumed destination address of the information identifies a subject associated with an outbound TOE interface (in which case the information is forwarded to the identified outbound TOE interface) AND all of the information security attribute values are unambiguously permitted by the ACL rules, where such rules may be composed from all possible combinations of the values of the information flow security attributes, created by an authorized administrator. OR c) The presumed destination address of the information identifies a subject that is not associated with any TOE interface AND the TOE has been configured to broadcast traffic when it doesn't recognize the presumed address of the destination subject (in which case the information is broadcast out all TOE interfaces that are not configured as part of a virtual circuit) AND all of the information security attribute values are unambiguously permitted by the ACL rules, where such rules may be composed from all possible combinations of the values of the information flow security attributes, created by an authorized administrator]. FDP_IFF.1.3 The TSF shall enforce the [no additional information flow rules]. FDP_IFF.1.4 The TSF shall explicitly authorize an information flow based on the following rules: [no additional information flow rules]. FDP_IFF.1.5 The TSF shall explicitly deny an information flow based on the following rules: [no additional denial information flow rules]. Dependencies: FDP_IFC.1 Subset information flow control FMT_MSA.3 Static attribute initialisation Extreme Networks ExtremeXOS Network Operating System v Page 22 of 46
23 6.2.3 Class FIA: Identification and Authentication FIA_AFL.1 Authentication failure handling Hierarchical to: No other components. FIA_AFL.1.1 The TSF shall detect when [an administrator configurable positive integer within [the range of 1-10]] unsuccessful authentication attempts occur related to [user's attempts or processes (application) attempts to establish a new session]. FIA_AFL.1.2 When the defined number of unsuccessful authentication attempts has been met or surpassed, the TSF shall [terminate the session or if configured by the administrator, disable user account if attempting to establish a new session]. A session includes SSH and non-ssh session components. Dependencies: FIA_UAU.1 Timing of authentication FIA_ATD.1 User attribute definition Hierarchical to: No other components. FIA_ATD.1.1 The TSF shall maintain the following list of security attributes belonging to individual users: [user identity, authentication data, and role]. Dependencies: No dependencies FIA_SOS.1 Verification of secrets Hierarchical to: No other components. FIA_SOS.1.1 The TSF shall provide a mechanism to verify that secrets meet [the following administrator configurable conditions: a) Minimum password length between 8 and 32 characters b) Password must not be one of the previous 5 passwords recorded c) Password includes at least 2 characters from each of the following sets: 1. Uppercase characters (A-Z) 2. Lowercase characters (a-z) 3. Numeric characters (0-9) 4. Non-alphanumeric characters [( #, $, %, ^, *, ) )]. Dependencies: No dependencies FIA_UAU.1 Timing of authentication Hierarchical to: No other components. FIA_UAU.1.1 Extreme Networks ExtremeXOS Network Operating System v Page 23 of 46
24 The TSF shall allow [switch traffic flow subject to TOE policies] on behalf of the user to be performed before the user is authenticated. FIA_UAU.1.2 The TSF shall require each user to be successfully authenticated before allowing any other TSFmediated actions on behalf of that user. Dependencies: FIA_UID.1 Timing of identification FIA_UID.1 Timing of identification Hierarchical to: No other components. FIA_UID.1.1 The TSF shall allow [switch traffic flow subject to TOE policies] on behalf of the user to be performed before the user is identified. FIA_UID.1.2 The TSF shall require each user to be successfully identified before allowing any other TSFmediated actions on behalf of that user. Dependencies: No dependencies Extreme Networks ExtremeXOS Network Operating System v Page 24 of 46
25 6.2.4 Class FMT: Security Management FMT_MSA.1 Management of security attributes Hierarchical to: No other components. FMT_MSA.1.1 The TSF shall enforce the [Switch Flow Traffic Flow SFP] to restrict the ability to [query, modify, delete, [create]] the security attributes [ACL rules on the switch] to [Administrators]. Dependencies: [FDP_ACC.1 Subset access control or FDP_IFC.1 Subset information flow control] FMT_SMF.1 Specification of management functions FMT_SMR.1 Security roles FMT_MSA.3 Static attribute initialisation Hierarchical to: No other components. FMT_MSA.3.1 The TSF shall enforce the [Switch Traffic Flow SFP] to provide [permissive] default values for security attributes that are used to enforce the SFP. FMT_MSA.3.2 The TSF shall allow the [Administrator] to specify alternative initial values to override the default values when an object or information is created. Dependencies: FMT_MSA.1 Management of security attributes FMT_SMR.1 Security roles FMT_MTD.1 Management of TSF data Hierarchical to: No other components. FMT_MTD.1.1 The TSF shall restrict the ability to [perform operations identified in column 1 of Table 9] the [list of TSF data identified in column 2 of Table 9] to [Administrator]. Table 9 Management of TSF Data Operation modify query, modify, delete, [create] modify modify modify TSF data switch configuration user accounts system time the number of failed logins before terminating a session or disabling an account Password restrictions policy Dependencies: FMT_SMF.1 Specification of management functions Extreme Networks ExtremeXOS Network Operating System v Page 25 of 46
26 FMT_SMR.1 Security roles FMT_SMF.1 Specification of Management Functions Hierarchical to: No other components. FMT_SMF.1.1 The TSF shall be capable of performing the following security management functions: [ ]. modify switch configuration manage user accounts modify the system time manage ACL rules terminate process modify the number of failed logins before terminating a session or disabling an account modify the password restrictions policy management and configuration of the information flow policies and routing policies Dependencies: No Dependencies FMT_SMR.1 Security roles Hierarchical to: No other components. FMT_SMR.1.1 The TSF shall maintain the roles [Administrator and User]. FMT_SMR.1.2 The TSF shall be able to associate users with roles. Dependencies: FIA_UID.1 Timing of identification Extreme Networks ExtremeXOS Network Operating System v Page 26 of 46
27 6.2.5 Class FPT: Protection of the TSF FPT_STM.1 Reliable time stamps Hierarchical to: No other components. FPT_STM.1.1 The TSF shall be able to provide reliable time stamps. Dependencies: No dependencies Extreme Networks ExtremeXOS Network Operating System v Page 27 of 46
28 6.2.6 Class FTA: TOE Access FTA_TAB.1 Default TOE access banners Hierarchical to: No other components. FTA_TAB.1.1 Before establishing a user session, the TSF shall display an advisory warning message regarding unauthorised use of the TOE. Dependencies: No dependencies Extreme Networks ExtremeXOS Network Operating System v Page 28 of 46
29 6.3 Security Assurance Requirements The security assurance requirements for the TOE are the EAL 3 components as specified in Part 3 of the Common Criteria with ALC_FLR.2. No operations are applied to the assurance components. Assurance Requirements Table 10 Assurance Requirements Class ASE: Security Target evaluation ASE_CCL.1 Conformance claims ASE_ECD.1 Extended components definition ASE_INT.1 ST introduction ASE_OBJ.2 Security objectives ASE_REQ.2 Derived security requirements ASE_SPD.1 Security problem definition ASE_TSS.1 TOE summary specification Class ALC : Life Cycle Support ALC_CMC.3 Authorization controls ALC_CMS.3 Implementation representation CM 19 coverage ALC_DEL.1 Delivery Procedures ALC_DVS.1 Identification of security measures ALC_LCD.1 Developer defined life-cycle model ALC_FLR.2 Flaw Reporting Procedures Class ADV: Development ADV_ARC.1 Security Architecture Description ADV_FSP.3 Functional specification with complete summary ADV_TDS.2 Architectural design Class AGD: Guidance documents AGD_OPE.1 Operational user guidance AGD_PRE.1 Preparative procedures Class ATE: Tests ATE_COV.2 Analysis of coverage ATE_DPT.1 Testing: basic design ATE_FUN.1 Functional testing ATE_IND.2 Independent testing sample Class AVA: Vulnerability assessment AVA_VAN.2 Vulnerability analysis 19 CM Configuration Management Extreme Networks ExtremeXOS Network Operating System v Page 29 of 46
30 7 TOE Specification This section presents information to detail how the TOE meets the functional requirements described in previous sections of this ST. 7.1 TOE Security Functions Each of the security requirements and the associated descriptions correspond to the security functions. Hence, each function is described by how it specifically satisfies each of its related requirements. This serves to both describe the security functions and rationalize that the security functions satisfy the necessary requirements. Table 11 Mapping of TOE Security Functions to Security Functional Requirements TOE Security Function SFR ID Description Security Audit FAU_GEN.1 Audit data generation FAU_SAR.1 Audit review User Data Protection FDP_IFC.1 Subset information flow control FDP_IFF.1 Simple security attributes Identification and Authentication FIA_AFL.1 Authentication failure handling FIA_ATD.1 FIA_SOS.1 FIA_UAU.1 FIA_UID.1 User attribute definition Verification of secrets Timing of authentication Timing of identification Security Management FMT_MSA.1 Management of security attributes FMT_MSA.3 FMT_MTD.1 FMT_SMF.1 FMT_SMR.1 Static attribute initialisation Management of TSF data Specification of management functions Security roles Protection of TOE Security Functions FPT_STM.1 Reliable time stamps TOE Access FTA_TAB.1 Default TOE access banners Security Audit The TOE provides fully configurable audit record generation capability for all actions performed by authorized administrators and authorized users on the system. The TOE generates audit records for the following auditable events: Start-up and shutdown of the audit functions (via log records that indicate that the system is booting and shutting down) Authentication attempts (login and logout on all management interfaces) Extreme Networks ExtremeXOS Network Operating System v Page 30 of 46
31 All administrative actions including management and configuration of the information flow policies and routing policies. Audit records can be generated for all of the commands issued using the CLI and Web GUI. The use of the XML/Web Services and SNMP interfaces can also be audited. The administrator can configure where the audit event messages are sent/stored upon generation. Audit records can be sent to more than one location (target). Not all event messages are sent to every enabled target. Each target receives only the messages for which it is configured. Storage filtering can be based on message content and type. The records can be sent to the following locations: Console display Current remote session Internal memory buffer, which can contain 200 to 20,000 messages (1000 by default) NVRAM, where the messages remain after a reboot Remote syslog host Primary MSM/MM for BlackDiamond or primary node for Summit Backup MSM/MM for BlackDiamond or backup node for Summit The memory buffer and NVRAM can only contain a limited number of messages, so the oldest message is lost when a new message arrives when the buffer is full. In the evaluated configuration, a copy of the audit records must be sent to the syslog host for persistent storage and to maintain a history of events worthy of forensic analysis. The TOE protects the audit records stored in the memory buffer until a copy is sent to a syslog host and the TOE environment protects the audit records that are sent for historical purposes. Each audit record will include the date and time of the event, type of event, subject identity (host ID or username), and the outcome (success or failure) of the event. The CLI commands provide the capability for the administrator to configure various aspects of the switch s system audit log messages. The log messages contain configuration and fault information pertaining to the device. The log messages can be formatted to contain various items of information, such as: the timestamp when the event occurred the severity level of the event (critical, error, warning, notice, info, debug-summary, debugverbose, and debug-data) the component or functional area where the event tool place a message that details the event. The ability to review all audit records is available to users with the administrator or user role. However, the entities with the user role will see sanitized forms of certain audit records (for example, login and logout records will have the usernames removed). TOE Security Functional Requirements Satisfied: FAU_GEN.1, FAU_SAR User Data Protection The TOE enforces a Switch Traffic Flow control policy restricting access to the network and providing the administrator with the ability to define access rules on the traffic received by the TOE. The Switch Traffic Flow control policy is enforced upon all IT entities sending and receiving information through the TOE, network traffic and switching and routing of information. Extreme Networks ExtremeXOS Network Operating System v Page 31 of 46
32 The Switch Traffic Flow control policy allows combinations of network traffic attributes to be used to dictate allowable information flows between IT entities respective of the current operational environment. The Switch Traffic Flow control policy enforcement is based on the following security attributes: presumed address of the source subject; presumed address of the destination subject; IP protocol field; TCP/UDP source port (DHCP, NTP, etc); TCP/UDP destination port (DHCP, NTP, etc) TCP flags; ICMP message type; ICMP code field; ICMP-type; Source SAP; Destination SAP; Snap Type; IP TOS field; Fragments; VLAN ID Ethernet packet type (e.g., IP, IPv6, 802.1Q); Ethernet source MAC address; Ethernet destination MAC address; TOE interface on which traffic information arrives and depart The TOE permits an information flow between a controlled subject and controlled information via a controlled operation if the following rules hold: A virtual circuit has been established between the inbound TOE interface and some other interface (in which case the information is forwarded to the associated outbound TOE interface) AND all of the information security attribute values are unambiguously permitted by the ACL rules, where such rules may be composed from all possible combinations of the values of the information flow security attributes, created by an authorized administrator. OR The presumed destination address of the information identifies a subject associated with an outbound TOE interface (in which case the information is forwarded to the identified outbound TOE interface) AND all of the information security attribute values are unambiguously permitted by the ACL rules, where such rules may be composed from all possible combinations of the values of the information flow security attributes, created by an authorized administrator. OR Extreme Networks ExtremeXOS Network Operating System v Page 32 of 46
33 The presumed destination address of the information identifies a subject that is not associated with any TOE interface AND The TOE has been configured to broadcast traffic when it doesn t recognize the presumed address of the destination subject (in which case the information is broadcast out all TOE interfaces that are not configured as part of a virtual circuit) AND all of the information security attribute values are unambiguously permitted by the ACL rules, where such rules may be composed from all possible combinations of the values of the information flow security attributes, created by an authorized administrator. Access Control Lists (ACLs) consist of access rules and are used to perform packet filtering and forwarding decisions on incoming traffic. For example, each packet arriving on an ingress port is compared to the ACL applied to that port and is either permitted or denied. ACLs apply to all traffic. For example, if you deny all the traffic to a port, no traffic, including control packets, such as Open Shortest Path First (OSPF) or Routing Information Protocol (RIP), will reach the switch and the adjacency will be dropped. The administrator must explicitly allow those types of packets (if desired). TOE Security Functional Requirements Satisfied: FDP_IFC.1, FDP_IFF Identification and Authentication The TOE requires users to provide unique identification and authentication data before any administrative access to the system is granted. The TSF permits traffic flow through the switch as allowed by the switch traffic flow SFP for unidentified and unauthenticated subjects. The TOE can detect unsuccessful user authentication attempts and will deny the new session if the number of consecutive unsuccessful authentication attempts meets or surpasses the number specified by the administrator. The TOE can also be configured to disable a user account if the number of consecutive unsuccessful authentication attempts meets or surpasses the number specified by the administrator when a user is attempting to establish a new session (includes both SSH and non-ssh interfaces). The default administrator account and failsafe accounts are never locked out. The TOE is, by default, configured with two accounts, user and administrator, and can have a total of 16 user accounts. The TOE maintains a list of user security attributes for each user which include user identity (username), authentication data (password) and role. The TOE limits the number of user accounts to 16. In addition, the TOE also maintains the following information related to user accounts: password expiry date, number of successful login attempts, and number of failed login attempts. The TOE provides the capability to enforce strong password restrictions for all users or for specific users as configured by an administrator. An administrator can set any or all of the following password restriction parameters and the TOE will enforce these restrictions. Minimum password length between 8 and 32 characters; Password must not be one of the previous passwords recorded (checks new password against the previous 5 passwords recorded); Password includes at least 2 characters from each of the following sets: Uppercase characters (A-Z) Lowercase characters (a-z) Numeric characters (0-9) Non-alphanumeric characters [( #, $, %, ^, *, ) )]. The TOE handles authentication failure in different ways on different interfaces: Extreme Networks ExtremeXOS Network Operating System v Page 33 of 46
34 CLI: users can re-try logging in through the serial console or via a remote console; this is subjected to a set number of retry login attempts based on a value configured by an administrator, after which the user triggers a lockout if too many fail attempts are performed Web GUI, SNMP, and XML/Web Services: User logins through these system are subjected to a set number of retry login attemps based on a value configured by an administrator, after which the user is disconnected if too many fail attempts are performed TOE Security Functional Requirements Satisfied: FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UID Security Management The TOE is managed through a Command Line Interface (CLI). This interface is accessible through remote sessions, as well as a local terminal console (a management console). Through this interface all management can be performed, including user management and the configuration of the switch functions. The TOE supports two roles: User and Administrator. Below is the description for each role. User: A user has viewing access to all manageable parameters, with the exception of the User account database and the Simple Network Management Protocol (SNMP) community strings. A user-level account can change the password assigned to the account name and use the ping command to test device accessibility. The ping command is used to test for connectivity to a specific host. The ping command is available for both the user and administrator privilege level. Administrator: The system must have at least one administrator account; the command will fail if an attempt is made to delete the last administrator account on the system. Administrators are allowed access to all Switch functions, (i.e. configuration commands) and can view and change all switch parameters. They can also add and delete users and change the password associated with any account name. You must have administrator privileges to change passwords for accounts other than your own, view accounts that have been created, delete user accounts. The CLI is accessible through a remote console, as well as a local terminal console (a management console) via a serial port. Through this interface all management can be performed, including user management and the configuration of the switch functions. Only administrators will be given accounts on the appliance and must provide unique identification and authentication data in order to access the TOE and its management functions. The Web GUI, called ScreenPlay, consists of Adobe Flash web applications that are served to users connecting to the switch via HTTPS. ScreenPlay provides a subset of the full configuration functionality available via the CLI. The XML/Web Services interface is accessible via HTTPS. It allows arbitrary external programs to administer the switch (assuming that they are properly authenticated) by exposing the switch s management functions as XML-based WebServices APIs. The Time Stamp interface is accessible via the kernel of the operating system. It allows for a reliable source of synchronizing the internal clock of the EXOS through the hardware of the client machine. Only authorized administrators have the ability to modify ACLs. Permissive default values are provided for security attributes that are used to enforce the SFP. If no action is specified in the ACL rule, the packet is permitted by default. Only authorized administrators can perform the operations identified in Table 9 using the CLI, Web GUI, XML/Web Services, or SNMP interfaces. The TOE provides an interface to perform all of the security management functions identified in the Section Extreme Networks ExtremeXOS Network Operating System v Page 34 of 46
35 TOE Security Functional Requirements Satisfied: FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR Protection of the TSF The TOE provides a reliable time stamp using the hardware clock that is located in the IT environment. TOE Security Functional Requirements Satisfied: FPT_STM TOE Access The TOE shall be configured to display a logon banner (showing an administrator-configured message) when any user attempts to access the management interfaces of the system. TOE Security Functional Requirements Satisfied: FTA_TAB.1. Extreme Networks ExtremeXOS Network Operating System v Page 35 of 46
36 8 Rationale 8.1 Conformance Claims Rationale This Security Target conforms to Part 2 and Part 3 of the Common Criteria Standard for Information Technology Security Evaluations, version 3.1 revision Security Objectives Rationale This section provides a rationale for the existence of each threat and assumption that compose the Security Target. Sections 8.2.1, and demonstrate that the mappings between the threats, polices, and assumptions to the security objectives is complete. The following discussion provides detailed evidence of coverage for each threat, policy, and assumption Security Objectives Rationale Relating to Threats Table 12 displays the mapping of threats to objectives. Table 12 Threats: Objectives Mapping Threats Objectives Rationale T.MEDIATE An unauthorized person may send impermissible information through the TOE which results in the exploitation of resources on the internal network. T.NOAUDIT A user may not be accountable for his actions due to his actions not being recorded or due to an administrator not reviewing the audit records. O.MEDIATE The TOE will mediate the flow of information from users on a connected network to users on another connected network as defined by administratorconfigured information. policies/routing O.ACCOUNT The TOE must provide user accountability for information flows through the TOE and for authorized administrators' use of security functions related to audit. OE.AUDREV The TOE administrators will be trained to periodically review the audit records generated by the TOE. OE.SYSLOG The TOE operating environment will include a syslog server to provide storage for audit records. OE.TIME The TOE will have access to a hardware clock from the TOE environment. O.MEDIATE counters this threat by mediating the flow of information from users on a connected network to users on another connected network. O.ACCOUNT counters this threat by providing user accountability for information flows through the TOE and for authorized administrators' use of security functions related to audit. OE.AUDREV counters this threat by providing a means to record and audit trail of security-related events, with accurate dates and times. OE. SYSLOG counters this threat by ensuring that the operating environment will provide a syslog server to provide a sufficient amount of persistent storage for the audit events. OE.TIME counters this threat by ensuring that the operating environment will provide a hardware clock used by the TOE to provide a reliable time stamp Extreme Networks ExtremeXOS Network Operating System v Page 36 of 46
37 T.NOMGMT An authorized administrator is not able to manage the TOE security functions and data which results in the TOE being configured in an insecure manner. T.PRIV An unauthorized user may gain access to the TOE and exploit system privileges to gain access to TOE security functions and data, inappropriately changing the configuration data for TOE security functions. O.AUDIT The TOE must provide a means to record an audit trail of security-related events, with accurate dates and times. O.ADMIN The TOE must provide services that allow effective management of its functions and data. O.ACCESS The TOE must allow only authorized users and processes (applications) to access protected TOE functions and data. O.IDAUTH The TOE must require that all administrative users be identified and authenticated prior to obtaining administrative access. OE.IDAUTH The TOE operating environment shall provide the ability to uniquely identify and authenticate remote users. O.PROTECT The TOE must protect itself from unauthorized access to its functions and data. OE.PROTECT The TOE operating environment shall provide the ability to protect the data in transit from unauthorized modifications. when generating the audit records. O.AUDIT counters this threat by providing a means to record and audit trail of security-related events, with accurate dates and times. O.ADMIN counters this threat by requiring the TOE to provide management services that allow administrators to manage the security functions and data. O.ACCESS counters this threat by only allowing authorized users and processes (applications) to access protected TOE functions and data. O.IDAUTH counters this threat by ensuring that all users and administrators must be authenticated and identified before allowing use of the TOE or its resources. OE.IDAUTH counters this threat by providing the technology to identify and authenticate all remote users and administrators before allowing use of the TOE or its resources. O.PROTECT counters this threat by requiring the TOE to protect itself from unauthorized access to its functions and data. The OE.PROTECT objective ensures that the data in transit is protected from unauthorized inspection or tampering by individuals or applications. Every Threat is mapped to one or more Objectives in the table above. demonstrates that the defined security objectives counter all defined threats. This complete mapping Extreme Networks ExtremeXOS Network Operating System v Page 37 of 46
38 8.2.2 Security Objectives Rationale Relating to Assumptions A.AUDREV The TOE administrators will periodically review the audit records generated by the TOE. A.FLOW Table 13 Assumptions: Objectives Mapping Assumptions Objectives Rationale OE.AUDREV The TOE administrators will be trained to periodically review the audit records generated by the TOE. The TOE will be placed in a network infrastructure such that information to be controlled will always flow through the TOE. A.GENPUR The TOE does not have the ability to run general purpose applications and does not host public data. A.LOCATE The processing resources of the TOE will be located within controlled access facilities, which will prevent unauthorized physical access. A.NOEVIL The authorized administrators are competent, not careless, willfully negligent, or hostile and will follow and abide by the instructions provided by TOE documentation. A.EXCLUSIVE All administrative interfaces are not accessible to nonadministrators and only administrators have access to the administrative interfaces to ensure the network is secure. OE.FLOW The network infrastructure in which the TOE is placed must be installed, administered and operated in a manner that ensures all information to be controlled flows through the TOE. OE.GENPUR The TOE will not execute general purpose applications and the TOE does not host public data. OE.PHYS Those responsible for the TOE must ensure that those parts of the TOE critical to security policy are protected from any physical attack. OE.MANAGE Authorized administrators are trained, non-hostile and follow all administrator guidance. OE.ADMIN The administrator must not be careless, negligent, or willfully hostile; must be appropriately trained; and must follow all guidance. OE.AUDREV satisfies this assumption by requiring that training provided to the TOE administrators will include instructions to periodically review the audit records. OE.FLOW satisfies this assumption by ensuring that the network infrastructure in which the TOE is installed, administered and operated ensures that all information to be controlled flows through the TOE. OE.GENPUR satisfies this assumption by ensuring that the TOE will not execute general purpose applications or host public data. OE.PHYS satisfies this assumption by ensuring that those responsible for the TOE ensure that those parts of the TOE critical to security policy are protected from any physical attack. OE.MANAGE satisfies this assumption by ensuring that authorized administrators are nonhostile and follow all administrator guidance. OE.ADMIN upholds this assumption by ensuring that administrators are willfully not hostile and properly trained to not grant users without privileges to access administrative interfaces. Every assumption is mapped to one or more Objectives in the table above. This complete mapping demonstrates that the defined security objectives uphold all defined assumptions. 8.3 Security Requirements Rationale This section provides evidence supporting the internal consistency and completeness of the components (requirements) in the Security Target. Extreme Networks ExtremeXOS Network Operating System v Page 38 of 46
39 8.3.1 Security Functional Requirements Rationale Objective O.ACCESS The TOE must allow only authorized users and processes (applications) to access protected TOE functions and data. O.ACCOUNT The TOE must provide user accountability for information flows through the TOE and for authorized administrators' Table 14 Objectives: SFRs Mapping Requirements Addressing the Objective FIA_AFL.1 Authentication Failure Handling FIA_ATD.1 User attribute definition FIA_SOS.1 Verification of secrets FIA_UAU.1 Timing of authentication FIA_UID.1 Timing of identification FMT_MSA.1 Management of security attributes FMT_MTD.1 Management of TSF data FMT_SMR.1 Security roles FAU_GEN.1 Audit data generation Rationale FIA_AFL.1 supports this objective by ensuring that the TOE will detect an administrator specified number of unsuccessful authentication attempts related to a user's attempt or processes (applications) attempt to logon during the current session and will terminate the current session when this number has been met or surpassed. FIA_ATD.1 supports this objective by ensuring that the TOE will maintain a list of security attributes belonging to individual users. FIA_SOS.1 supports this objective by ensuring that the TOE is capable of enforcing strict password policies related to the composition of the password, password length, and password history/reuse. FIA_UAU.1 supports this objective by ensuring that the TOE will require each user to be successfully authenticated before allowing any actions on behalf of the user, except for switch traffic flow allowed by TOE policies. FIA_UID.1 supports this objective by ensuring that the TOE will require that each user be successfully identified before allowing any actions on behalf of the user, except for switch traffic flow allowed by TOE policies. FMT_MSA.1 supports this objective by restricting the ability to modify security attributes to administrators. FMT_MTD.1 supports this objective by ensuring that the TOE will restrict the ability to perform the operations identified in Table 9. FMT_SMR.1 supports this objective by associating authorized users with roles, to access protected TOE functions and data. FAU_GEN.1 supports this objective by providing an audit trail listing all securityrelevant user and administrator actions on the TOE and on the information passing through the TOE. Extreme Networks ExtremeXOS Network Operating System v Page 39 of 46
40 Objective use of security functions related to audit. O.ADMIN The TOE must provide services that allow effective management of its functions and data. Requirements Addressing the Objective FAU_SAR.1 Audit review FPT_STM.1 Reliable time stamps FMT_MSA.1 Management of security attributes FMT_MSA.3 Static attribute initialisation FMT_MTD.1 Management of TSF data FMT_SMF.1 Specification of Management Functions FMT_SMR.1 Security Roles Rationale FAU_SAR.1 supports this objective by presenting the audit records in a readable format so that authorized administrators can read all audit records. FPT_STM.1: The TOE provides a reliable time stamp for use in generating audit records so that a timeline of events can be created to provide user accountability. The TOE relies upon the IT environment to provide the hardware clock. FMT_MSA.1 supports this objective by restricting the ability to modify security attributes to administrators. FMT_MSA.3 supports this objective by allowing administrators to specify alternative values to override the default restrictive or permissive values. FMT_MTD.1 supports this objective by ensuring that the TOE will restrict the ability to perform the operations identified in Table 9. FMT_SMF.1 supports this objective by providing administrators the capability to: modify switch configuration manage user accounts modify the system time manage ACL rules terminate process modify the number of failed logins before terminating a session or locking an account modify the password restrictions policy FMT_SMR.1 supports this objective by maintaining the roles of User and Administrator. Extreme Networks ExtremeXOS Network Operating System v Page 40 of 46
41 Objective O.AUDIT The TOE must provide a means to record an audit trail of security-related events, with accurate dates and times. O.IDAUTH The TOE must require that all administrative users be identified and authenticated prior to obtaining administrative access. O.MEDIATE The TOE will mediate the flow of information from users on a connected network to users on another connected network as defined by administrator-configured policies/routing information. O.PROTECT The TOE must protect itself from unauthorized access to its functions and data. Requirements Addressing the Objective FAU_GEN.1 Audit data generation FPT_STM.1 Reliable time stamps FIA_UAU.1 Timing of authentication FIA_UID.1 Timing of identification FDP_IFC.1 Subset information flow control FDP_IFF.1 Simple security attributes FIA_AFL.1 Authentication failure handling Rationale FAU_GEN.1 supports this objective by providing an audit trail listing all securityrelevant user and administrator actions on the TOE and on the information passing through the TOE. The TOE generates an audit record of all security relevant user actions which includes the date and time of the event. FPT_STM.1: The TOE provides a reliable time stamp for its own use. The TOE relies upon the IT environment to provide the hardware clock. FIA_UAU.1 supports this objective by ensuring that the TOE will require each user to be successfully authenticated before allowing any administrative actions on behalf of the user. FIA_UID.1 supports this objective by ensuring that the TOE will require that each user be successfully identified before allowing any administrative actions on behalf of that user. FDP_IFC.1 supports this objective by ensuring that the TOE enforces the information flow control policy on all IT entities sending network traffic and switching and routing information through the TOE. FDP_IFF.1 supports this objective by ensuring that the TOE identifies the attributes of the users sending and receiving the information in the Switch Traffic Flow SFP, as well as the attributes for the information itself. The policy is defined by the requirement saying under what conditions information is permitted to flow. FIA_AFL.1 supports this objective by ensuring that the TOE will detect an administrator specified number of unsuccessful authentication attempts related to a user's attempt or processes (applications) attempt to logon during the current session and will terminate the current session when this number has been met or surpassed. Extreme Networks ExtremeXOS Network Operating System v Page 41 of 46
42 Objective Requirements Addressing the Objective FIA_ATD.1 User attribute definition FIA_SOS.1 Verification of secrets FIA_UAU.1 Timing of authentication FIA_UID.1 Timing of identification FTA_TAB.1 Default TOE access banners Rationale FIA_ATD.1 supports this objective by ensuring that the TOE will maintain a list of security attributes belonging to individual users. FIA_SOS.1 supports this objective by ensuring that the TOE is capable of enforcing strict password policies related to the composition of the password, password length, and password history/reuse. FIA_UAU.1 supports this objective by ensuring that the TOE requires each user to be successfully authenticated before allowing any other TSF-mediated actions on behalf of the user. FIA_UID.1 supports this objective by ensuring that the TOE requires that each user be successfully identified before allowing any other TSF-mediated actions on behalf of that user. FTA_TAB.1 supports this objective by allowing the administrator to configure to the TOE to display a warning message prior to the login prompt of each session. All Security Functional Requirements (SFR) identified in this Security Target are fully addressed in this section and each SFR is mapped to the objective for which it is intended to satisfy. 8.4 Security Assurance Requirements Rationale EAL3+ was chosen to provide a moderate level of assurance that is consistent with good commercial practices. As such minimal additional tasks are placed upon the vendor assuming the vendor follows reasonable software engineering practices and can provide support to the evaluation for design and testing efforts. The chosen assurance level is appropriate with the threats defined for the environment. While the TOE may operate in a hostile environment, it is expected to be in a non-hostile position and embedded in or protected by other products designed to address threats that correspond with the intended environment. At EAL3+ the TOE will have incurred a search for obvious flaws to support its introduction into the nonhostile environment. The augmentation of ALC_FLR.2 was chosen to give greater assurance of the developer s on-going flaw remediation processes Requirement Dependency Rationale This ST does satisfy all the requirement dependencies of the Common Criteria. Table 15 lists each requirement to which the TOE claims conformance with a dependency and indicates whether the dependent requirement was included. As the table indicates, all dependencies have been met. Extreme Networks ExtremeXOS Network Operating System v Page 42 of 46
43 Table 15 Functional Requirements Dependencies SFR ID Dependencies Dependency Met Rationale FAU_GEN.1 FPT_STM.1 The TOE relies upon the BlackDiamond or Summit Switch to provide a hardware clock. FAU_SAR.1 FAU_GEN.1 FDP_IFC.1 FDP_IFF.1 FDP_IFF.1 FDP_IFC.1 FMT_MSA.3 FIA_AFL.1 FIA_UAU.1 FIA_ATD.1 None FIA_SOS.1 None FIA_UAU.1 FIA_UID.1 FIA_UID.1 None FMT_MSA.1 FMT_SMF.1 FMT_SMR.1 FDP_ACC.1 or FDP_IFC.1 FMT_MSA.3 FMT_MSA.1 FMT_SMR.1 FMT_MTD.1 FMT_SMF.1 FMT_SMR.1 FMT_SMF.1 None FMT_SMR.1 FIA_UID.1 FPT_STM.1 None FTA_TAB.1 None Extreme Networks ExtremeXOS Network Operating System v Page 43 of 46
44 9 Acronyms This section describes the acronyms used in this document. Table 16 Acronyms Acronym ACL API CC CLI CM DHCP EAL EPM GigE GUI DHCP EAL EPM GigE GUI HTTP HTTPS ICMP I/O IOB IP IT LAN MAC MM MSM N/A NTP NVRAM OS Definition Access Control List Application Programming Interface Common Criteria Command Line Interface Configuration Management Dynamic Host Configuration Protocol Evaluation Assurance Level EXOS Process Manager Gigabit Ethernet Graphical User Interface Dynamic Host Configuration Protocol Evaluation Assurance Level EXOS Process Manager Gigabit Ethernet Graphical User Interface Hypertext Transport Protocol Secure HTTP Internet Control Message Protocol Input/Output Input/Output Blade; Input/Output Module Internet Protocol Information Technology Local Area Network Media Access Control Management Module Management Switch Fabric Module Not Applicable Network Time Protocol Non-volatile Random Access Memory Operating System Extreme Networks ExtremeXOS Network Operating System v Page 44 of 46
45 Acronym OSP OSPF PP RADIUS RIP SAP SF SFP SNMP SSH SSL ST TACACS+ TCP TOE TOS TSF TLS UDP VLAN XML TOS Definition Organizational Security Policy Open Shortest Path First Protection Profile Remote Authentication Dial In User Service Routing Information Protocol Service Advertising Protocol Switch Fabric Security Function Policy Simple Network Management Protocol Secure Shell Secure Sockets Layer Security Target Terminal Access Controller Access-Control System Plus Transport Control Protocol Target of Evaluation Type of Service TOE Security Functions Transport Layer Security User Datagram Protocol Virtual Local Area Network extensible Markup Language Type of Service Extreme Networks ExtremeXOS Network Operating System v Page 45 of 46
46 Prepared by: Corsec Security, Inc Lee Jackson Memorial Highway, Suite 220 Fairfax, VA Phone:
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 0.7 Prepared for: Prepared by: Enterasys Networks, Inc. Corsec Security,
EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.
EMC Corporation Data Domain Operating System Version 5.2.1.0 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.11 Prepared for: Prepared by: EMC Corporation 176 South Street Hopkinton,
Security Target. Astaro Security Gateway V8 Packet Filter Version 1.000. Assurance Level EAL4+ Common Criteria v3.1
Astaro Security Gateway V8 Packet Filter Version 1.000 Assurance Level EAL4+ Common Criteria v3.1 This Security Target also covers the secunet wall 2 packet filter Version : 1.03 Date: 2011-05-20 Author:
Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012
Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction
Security Target. Symantec TM Network Access Control Version 12.1.2. Document Version 0.12. February 14, 2013
Security Target Symantec TM Network Access Control Version 12.1.2 Document Version 0.12 February 14, 2013 Document Version 0.12 Symantec Page 1 of 39 Prepared For: Prepared By: Symantec Corporation 350
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Author: Microsoft Corp. Version: 1.0 Last Saved: 2011-03-10 File Name: MS_UAG_ST_1.0.docx
DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75
DataPower S40 ML Security Gateway and DataPower I50 Integration Appliance Version 3.6 Security Target Version 0.75 10/09/2008 Prepared for: IBM SOA Appliance Group One Rogers St Cambridge, MA 02142 Prepared
Mobile Billing System Security Target
Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing
Firewall Protection Profile V2.0 2008. 4. 24
Firewall Protection Profile V2.0 2008. 4. 24 (This page left blank on purpose for double-side printing) Protection Profile Title Firewall Protection Profile for Government Evaluation Criteria Version This
Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target
Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target Evaluation Assurance Level: EAL2 augmented with ALC_FLR.2 Document Version: 1 Prepared for: Prepared by: Citrix
Security Target. McAfee Enterprise Mobility Management 12.0. Document Version 1.16
Security Target McAfee Enterprise Mobility Management 12.0 Document Version 1.16 September 17, 2014 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 Primasec Ltd
Security Target. Securonix Security Intelligence Platform 4.0. Document Version 1.12. January 9, 2015
Security Target Securonix Security Intelligence Platform 4.0 Document Version 1.12 January 9, 2015 Document Version 1.12 Copyright Securonix Page 1 of 41 Prepared For: Prepared By: Securonix 5777 W. Century
How To Understand The Toe
Rapid7 Nexpose Vulnerability Management and Penetration Testing System V.5.1 Security Target Version 1.7 May 11, 2012 Prepared for: Rapid7 LLC 545 Boylston Street, Suite 400 Boston, MA 02116 Prepared By:
gateprotect Firewall Packet-Filtering-Core v10.3 Security Target Version:
Version: Status: Last Update: Classification: 1.0 Release 2013-02-08 public Legal tice This document is provided AS IS with no express or implied warranties. Use the information in this document at your
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle
How To Evaluate A Security Target Of Evaluation (Toe)
Security Target McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 Document Version 1.1
BMC Real End User Experience Monitoring and Analytics 2.5. Security Target
BMC Real End User Experience Monitoring and Analytics 2.5 Security Target Version 0.07 5 March 2015 Copyright 2015 BMC Software, Inc. All rights reserved. BMC, BMC Software, and the BMC Software logo
JMCS Northern Light Video Conferencing System Security Target
JMCS Northern Light Video Conferencing System Security Target Common Criteria: EAL2 Version 1.2 22 FEB 12 Document management Document identification Document ID Document title Product version NLVC_ST_EAL2
SenSage, Inc. SenSage 4.6.2. Security Target. Evaluation Assurance Level: EAL2+ Document Version: 1.2
SenSage, Inc. SenSage 4.6.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 1.2 Prepared for: Prepared by: SenSage, Inc. 55 Hawthorne Street San Francisco, CA 94105 United States of
Xceedium GateKeeper Version 5.2.1 Security Target
ceedium GateKeeper Version 521 Security Target February 3, 2011 Prepared for: ceedium, Inc 30 Montgomery Street Jersey City, NJ 07302 Prepared By: Science Applications International Corporation Common
RSA, The Security Division of EMC envision platform v4.0 SP 1. Security Target
RSA, The Security Division of EMC envision platform v4.0 SP 1 Security Target Evaluation Assurance Level: 3+ Document Version: 0.8 Prepared for: Prepared by: RSA, The Security Division of EMC 174 Middlesex
CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target
CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target Version 2.0 June Version 21, 2010 0.6 December 29, 2008 Prepared for: Prepared CA for: 100 Staples CA, Inc. Drive Framingham, 100
U.S. Government Protection Profile for Database Management Systems
U.S. Government Protection Profile for Database Management Systems Information Assurance Directorate Version 1.3 December 24, 2010 Protection Profile Title: 1 U.S. Government Protection Profile for Database
BMC ProactiveNet Performance Management 9.5. Security Target
BMC ProactiveNet Performance Management 9.5 Security Target Version 0.4 18 July 2014 Copyright 2014 BMC Software, Inc. All rights reserved. BMC, BMC Software, and the BMC Software logo are the exclusive
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT
REF: 2010-16-INF-682 v2 Difusión: Expediente Fecha: 13.07.2011 Creado: CERT2 Revisado: TECNICO Aprobado: JEFEAREA CERTIFICATION REPORT Expediente: 2010-16 Datos del solicitante: 440301192W HUAWEI References:
Top Layer Networks. Security Target V2.3
Top Layer Networks IDS Balancer TM Version 2.2 Appliance (IDSB3531-CCV1.0, IDSB3532-CCV1.0, IDSB4508-CCV1.0) Security Target V2.3 August 31, 2004 AppBalancing, AppSafe, DCFD, Flow Mirror, SecureWatch,
Security Target. Symantec Data Loss Prevention 11.1.1. Document Version 1.0. January 23, 2012
Security Target Symantec Data Loss Prevention 11.1.1 Document Version 1.0 January 23, 2012 Document Version 1.0 Symantec Corporation Page 1 of 40 Prepared For: Prepared By: Symantec Corporation 350 Ellis
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3)
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3) Reference: ST January 2001 Version: 1.6 Europe: USA: CISCO Systems Ltd CISCO Systems Inc. 3 The Square 170 West Tasman Drive Stockley
EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0
EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305
RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5. Security Target
RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5 Security Target Evaluation Assurance Level: EAL2 Augmented with ALC_FLR.1 Document Version: 0.7 Prepared for: Prepared by: RSA, The
Firewall Protection Profile
samhällsskydd och beredskap 1 (38) ROS-ISÄK Ronny Janse 010-2404426 [email protected] Firewall Protection Profile samhällsskydd och beredskap 2 (38) Innehållsförteckning 1. Introduction... 4 1.1 PP reference...
EAL4+ Security Target
EAL4+ Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 21-DEC-10 Document management Document identification Document ID Document title Release authority E14_EAL4_ASE Microsoft
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN
REF: 2010-22-INF-764 V1 Distribution: Expediente Date: 21.11.2011 Created: CERT3 Reviewed: CALIDAD Approbed: TECNICO CERTIFICATION REPORT FOR FOR HUAWEI INTEGRATED MANAGEMENT APPLICATION PLATFORM VERSION
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING Document No. 1735-005-D0001 Version: 1.0, 3 June 2014 Prepared for: Fortinet, Incorporated 326 Moodie Drive Ottawa, Ontario Canada, K2H
Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0
Security Target NetIQ Access Manager 4.0 Document Version 1.13 August 7, 2014 Document Version 1.13 NetIQ Page 1 of 36 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite 810 Houston, TX
SolarWinds Log and Event Manager Software Security Target
SolarWinds Log and Event Manager Software Security Target Version 1.5 August 25, 2014 SolarWinds Worldwide, LLC 3711 South MoPac Expressway Building Two Austin, Texas 78746 Copyright 2013 SolarWinds Worldwide,
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows,
Certification Report StoneGate FW/VPN 5.2.5
Ärendetyp: 6 Diarienummer: 11FMV3127-87:1 Dokument ID HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2012-01-23 Country of origin: Sweden Försvarets materielverk Swedish Certification Body
Marimba Client and Server Management from BMC Software Release 6.0.3
Marimba Client and Server Management from BMC Software Release 6.0.3 Version 2.3.0 4 June, 2007 Prepared by: BMC Software, Inc. 2101 City West Blvd. Houston, Texas 77042 TABLE OF CONTENTS 1. Introduction...
National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report
Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target
Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Revision 1.0 August 2011 1 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms
Trustwave DbProtect Version 6.4.3 Security Target
Trustwave DbProtect Version 6.4.3 Security Target Version 1.8 July 21, 2015 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane
Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0
Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 ST Version 1.6 August 20, 2007 Document Version 1.6 Symantec Corporation Page 1 of 55 Prepared For: Prepared By: Symantec Corporation
Natek Network Access Control (NAC)
Natek Network Access Control (NAC) V 5.4.2 Security Target Release Date: 28.08.2014 Version 1.13 AUTHOR: NATEK BİLİŞİM BİLGİSAYAR EĞİTİM DANIŞMANLIK YAZILIM TİCARET SANAYİ ANONİM ŞİRKETİ 1 Revision History
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT
REF: 2010-15-INF-681 v1 Difusión: Expediente Fecha: 05.07.2011 Creado: CERT2 Revisado: TECNICO Aprobado: JEFEAREA CERTIFICATION REPORT Expediente: 2010-15 Datos del solicitante: 440301192W HUAWEI References:
Trustwave Secure Web Gateway Security Target
Trustwave Secure Web Gateway Security Target Version 1.5 September 18, 2013 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane
Certification Report
Certification Report EAL 3+ Evaluation of Extreme Networks ExtremeXOS Network Operating System v12.3.6.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Forefront Identity Manager (FIM) 2010
Forefront Identity Manager (FIM) 2010 Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 24-MAR-2012 Document history Version Date Description 0.1 28-APR-11 Initial draft for review.
FOR EAL2 AUGMENTED WITH ALC_FLR.1. Version: 1.2 November 20, 2013
SECURITY TARGET FOR A10 NETWORKS THUNDER 5430S AND 6430S APPLICATIONS DELIVERY CONTROLLERS EAL2 AUGMENTED WITH ALC_FLR.1 Version: 1.2 November 20, 2013 DENMARK FINLAND NORWAY SWEDEN THE NETHERLANDS www.secode.no
IBM WebSphere Message Broker Security Target
IBM WebSphere Message Broker Security Target Version 2.1.2 2007-08-22 Document History Version Date Summary Author 1.0 2006-10-23 Final EAL3 ST plus changes by IBM. SAIC / IBM 1.1 2006-12-11 Fixed inconsistencies.
Blue Coat Systems, Inc. ProxySG v5.3.1.9 running on SG510, SG810, and SG8100. Security Target
Blue Coat Systems, Inc. ProxySG v5.3.1.9 running on SG510, SG810, and SG8100 Security Target Evaluation Assurance Level: EAL 2+ Document Version: 0.7 Prepared for: Prepared by: Blue Coat Systems, Inc.
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented
Security Target for BorderWare Firewall Server 6.5
Security Target for BorderWare Firewall Server 6.5 Reference: ST January 2002 Version : 2.4 North America: Europe: 50 Burnhamthorpe Rd. W. 1 The Harlequin Centre Suite 502 Southall Lane Mississauga Southall
WATCHGUARD XCS SERVER V9.2 SECURITY TARGET
WATCHGUARD XCS SERVER V9.2 SECURITY TARGET Evaluation Assurance Level: 4+ Augmented with ALC_FLR.2 Version: 1.9 WatchGuard Technologies Inc WatchGuard Canada 505 Fifth Avenue South, Suite 500 50 Burnhamthorpe
Security Target: Symantec Endpoint Protection Version 11.0
Security Target: Symantec Endpoint Protection Version 11.0 ST Version 1.6 June 2, 2008 Document Version 1.6 Symantec Corporation Page 1 of 68 Prepared For: Prepared By: Symantec Corporation 20330 Stevens
McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 Security Target
v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 10 January 2012 Version 1.1 Prepared By: Primasec Ltd For McAfee Inc 2340 Energy Park Drive St. Paul, MN 55108 USA Contents 1 Introduction...
Wyse Technology Inc. Wyse Device Manager Enterprise Edition Version 4.7.2 Security Target
Wyse Technology Inc. Wyse Device Manager Enterprise Edition Version 4.7.2 Security Target Version 1.8 April 18, 2011 Wyse Technology Inc. 3471 N. First Street San Jose, CA 95134 DOCUMENT INTRODUCTION Prepared
HP TippingPoint Intrusion Prevention Systems Security Target
HP TippingPoint Intrusion Prevention Systems Security Target Version 1.0 July 29, 2011 Prepared for: TippingPoint/Hewlett-Packard Corporation 14231 Tandem Blvd Austin, TX 78728 USA Prepared By: Science
CERTIFICATION REPORT
REF: 2010-24-INF-831 v1 Target: Público Date: 07.03.2012 Created by: CERT3 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2010-24 Huawei BSC6900 Multimode Base Station Controller (MBSC)
McAfee Firewall Enterprise v7.0.1.02 Security Target
McAfee Firewall Enterprise v7.0.1.02 Security Target 8 Nov 2010 Version 1.3 Prepared By: Primasec Ltd For McAfee Inc 2340 Energy Park Drive St. Paul, MN 55108 USA McAfee Inc. Page 1 of 60 Contents 1 Introduction...
SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2
SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2 Document No. 1769-000-D0007 Version: v0.89, 12 September 2013 Prepared for: Centrify Corporation 785 N. Mary Avenue, Suite 200 Sunnyvale, California USA,
Security Target. McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5. Document Version 1.1. September 9, 2011
Security Target McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5 Document Version 1.1 September 9, 2011 Document Version 1.1 McAfee Page 1 of 61 Prepared For: Prepared By: McAfee, Inc. 2821
EXTOL epassport Suite v2.5 Security Target v2.0. ECSB/MyCC/JL/002 Common Criteria EAL1 Certification
Doc Ref RD/JL/069 Replaces: N/A EXTOL epassport Suite v2.5 ECSB/MyCC/JL/002 Common Criteria EAL1 Certification Extol Corporation (M) Sdn Bhd (121135-U) (643683-U) Extol Group www.extolcorp.com Unit G1,
Top Layer Networks IPS 5500 E Security Target
Top Layer Networks IPS 5500 E Security Target Version 1.1 April 10, 2009 Prepared For: Top Layer Networks 2400 Computer Drive Westborough, MA 01581 Prepared By: CygnaCom Solutions Security Evaluations
Secuware Virtual System (SVS)
Secuware Virtual System (SVS) SECURITY TARGET EAL2 Copyright 2008 by SECUWARE All rights reserved. The information in this document is exclusive property of SECUWARE and may not be changed without express
Common Criteria Security Target For NetScaler Platinum Edition Load Balancer Version 10.0
Common Criteria Security Target For NetScaler Platinum Edition Load Balancer Version 10.0 Version 1-1 5 July 2013 2013 Citrix Systems, Inc. All rights reserved. Summary of Amendments Version 1-1 5 July
Intrusion, Inc. SecureNet Pro Intrusion Detection System Version 4.1 SP1 Security Target December 20, 2002 Document No.
Intrusion, Inc. SecureNet Pro Intrusion Detection System Version 4.1 SP1 Security Target December 20, 2002 Document No. F2-1202-004 COACT, Inc. Rivers Ninety Five 9140 Guilford Road, Suite L Columbia,
Cisco Catalyst Switches (3560-X and 3750-X) Security Target
Cisco Catalyst Switches (3560- and 3750-) Security Target Revision 1.0 6 June 2012 1 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms and Abbreviations...
Fingerprint Spoof Detection Protection Profile
Fingerprint Spoof Detection Protection Profile based on Organisational Security Policies FSDPP_OSP v1.7 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Tel.: +49 228 99
Common Criteria for Information Technology Security Evaluation. Part 3: Security assurance components. September 2012. Version 3.
Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components September 2012 Version 3.1 Revision 4 CCMB-2012-09-003 Foreword This version of the Common Criteria
RSA, The Security Division of EMC RSA Access Manager v6.1. Security Target
RSA, The Security Division of EMC RSA Access Manager v6.1 Security Target Evaluation Assurance Level: EAL3+ Augmented with ALC_FLR.2 Document Version: 0.8 Prepared for: Prepared by: RSA, The Security Division
TRUSTED SECURITY FILTER SECURITY TARGET
TRUSTED SECURITY FILTER SECURITY TARGET Edition: 4 29 Oct 07 Previous editions: Ed. 1 11 May 2006 Ed. 2 16 Aug 2006 Ed. 3 28 June 2007 Author: KKK Appr.: PÅT All pages in this document shall have the same
How To Protect Your Computer From Being Hacked
Senforce Endpoint Security Suite Version 3.1.175 Security Target Version 1.0 06/19/07 Prepared for: Senforce Technologies, Inc. 147 W Election Rd Ste 110 Draper UT 84020 Prepared By: Science Applications
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1
Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller July 24, 2015 Version 1 1 Table of Contents 1 Introduction... 4 1.1 Conformance Claims...4 1.2 How to
Check Point Endpoint Security Media Encryption Security Target
Check Point Endpoint Security Media Encryption Security Target Version 1.0 June 23, 2010 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared By: Science Applications International Corporation
HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target
HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target Version 1.0 February 12, 2014 Prepared for: Hewlett-Packard Long Down Avenue Stoke Gifford Bristol BS34 8QZ UK Prepared By: Leidos
Enterasys Dragon-EAL Intrusion Defense System. Security Target
Enterasys Dragon-EAL Intrusion Defense System Security Target Version 11 August 31, 2004 Enterasys Networks 50 Minuteman Road Andover Massachusetts 01810 www.enterasys.com Table of Contents 1. SECURITY
Cisco IronPort S-Series Web Security Appliance Security Target
Cisco IronPort S-Series Web Security Appliance Security Target Version 1.0 October 12, 2009 Prepared for: Cisco IronPort Systems 1100 Grundy Lane San Bruno, CA 94066 Prepared By: Science Applications International
Intrusion Detection System System Protection Profile
Intrusion Detection System System Protection Profile Prepared for National Security Agency 9800 Savage Road Fort Meade MD, 20755 Prepared by Science Applications International Corporation 7125 Gateway
Network Intrusion Prevention System Protection Profile V1.1
Network Intrusion Prevention System Protection Profile V1.1 December 21, 2005 (This page left blank on purpose for double-side printing) Protection Profile Title Network Intrusion Prevention System Protection
IBM Internet Security Systems GX6116 Security Appliance Version 2.2 and SiteProtector Version 2.0 Service Pack 7.0 with Reporting Module
Security Target IBM Internet Security Systems GX6116 Security Appliance Version 2.2 and SiteProtector Version 2.0 Service Pack 7.0 with Reporting Module Document Version 2.0 July 6, 2011 Document Version
ARKOON FAST Firewall v3.0 SECURITY TARGET
Version Date October 28, 2004 Version 2.7p Ref. AKV3-CRT-EAL2-ST ARKOON FAST Firewall v3.0 SECURITY TARGET 20 Prepared for 40 ARKOON Network Security 13A avenue Victor HUGO F-69160 Tassin La Demi-Lune
Protection Profile for Server Virtualization
Protection Profile for Server Virtualization 29 October 2014 Version 1.0 i 0 Preface 0.1 Objectives of Document This document presents the Common Criteria (CC) Protection Profile (PP) to express the fundamental
Check Point Endpoint Security Full Disk Encryption Security Target
Check Point Endpoint Security Full Disk Encryption Security Target ST Version 2.4 June 22, 2009 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared by: Metatron Ltd. 66 Yosef St., Modiin, Israel
SAMSUNG SDS FIDO Server Solution V1.1 Certification Report
KECS-CR-15-73 SAMSUNG SDS FIDO Server Solution V1.1 Certification Report Certification No.: KECS-ISIS-0645-2015 2015. 9. 10 IT Security Certification Center History of Creation and Revision No. Date Revised
CERTIFICATION REPORT
REF: 2010-23-INF-808 v4 Target: Expediente Date: 22.12.2011 Created by: CERT3 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2010-23 Huawei 3900 Series LTE enodeb Software V100R004C00SPC100
LogLogic v4.6.1 Open Log Management Platform Security Target. Release Date: 30 June 2009 Version: 2.0
LogLogic v4.6.1 Open Log Management Platform Security Target Release Date: 30 June 2009 Version: 2.0 Prepared for: LogLogic Inc. 110 Rose Orchard Way, Suite 200 San Jose, CA 95134 Prepared by: Savvis Federal
Green Hills Software INTEGRITY-178B Separation Kernel Security Target
Green Hills Software INTEGRITY-178B Separation Kernel Security Target Version 1.0 Prepared for: Green Hills Software, Inc. 34125 US Hwy 19 North Suite 100 Palm Harbor, FL 34684 USA Prepared By: Science
