National Information Assurance Partnership
|
|
|
- Marilyn McKenzie
- 10 years ago
- Views:
Transcription
1 National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Cisco IOS Firewall Versions 12.3(14)T and 12.4(4)T Report Number: CCEVS-VR Dated: November 27, 2006 Version: 3.0 National Institute of Standards and Technology National Security Agency Information Technology Laboratory Information Assurance Directorate 100 Bureau Drive 9600 Savage Road Suite 6740 Gaithersburg, Maryland Fort George G. Meade, MD i
2 Acknowledgements: The TOE evaluation was sponsored by: Cisco Systems Inc. 170 West Tasman Drive San Jose, CA USA Evaluation Personnel: Arca Common Criteria Testing Laboratory Alicia Squires Ken Dill Maria Musa. Validation Personnel: Kenneth Eggers, Orion Security Solutions John Nilles, The Aerospace Corporation ii
3 Table of Contents 1 Executive Summary Identification Security Policy Identification and Authentication Password Based Authentication External Authentication Roles Security Management Security Audit Information Flow Control Protection of the TSF Assumptions Physical Security Assumption Personnel Security Assumption IT Environment Assumptions Architectural Information Documentation IT Product Testing Developer Testing Evaluation Team Independent Testing Evaluated Configuration Validator Comments Security Target List of Acronyms Bibliography Interpretations International Interpretations NIAP Interpretations Interpretations Validation iii
4 1 Executive Summary This report documents the National Information Assurance Partnership (NIAP) assessment of the evaluation of the Cisco IOS Firewall. It presents the evaluation results, their justifications, and the conformance results. This Validation Report is not an endorsement of the Target of Evaluation (TOE) by any agency of the U.S. Government and no warranty of the TOE is either expressed or implied. The evaluation of the Cisco IOS Firewall was performed by the Arca Common Criteria Testing Laboratory (CCTL) in the United States and was completed during October The information in this report is largely derived from the Security Target (ST), written by Cisco Systems, Inc. and the Evaluation Technical Report (ETR) and associated Evaluation Team Test Report, both written by Arca CCTL. The evaluation team determined the product to be CC version 2.2 Part 2 and Part 3 conformant, including all Information Technology Security Evaluation Final Interpretations from January 2004 through September 30, 2004, and concluded that the Common Criteria requirements for Evaluation Assurance Level (EAL) 4 augmented with ALC_FLR.1 have been met. In addition, the evaluation team confirmed that the TOE uses CCEVS precedent PD-0113, to satisfy SFR FAU_STG.1. The Cisco IOS Firewall is the firewall functionality that operates within a specific group of Cisco routers running the Cisco Internetwork Operating System (IOS). Figure 1 illustrates the TOE and its environment. The TOE includes the Cisco IOS Firewall Router, Trusted Network, and PIX Firewall Syslog Server (PFSS). The evaluated configuration is specified in Section 8, Evaluated Configuration. Figure 1: Typical TOE Configuration Cisco IOS / Firewall router Internal Network External Network Trusted Network Authentication Server PIX Firewall Syslog Server (PFSS) The validation team monitored the activities of the evaluation team, provided guidance on technical issues and evaluation processes, reviewed successive versions of the Security Target, 1
5 reviewed selected evaluation evidence, reviewed test plans, reviewed intermediate evaluation results (i.e., the Common Evaluation Methodology (CEM) work unit verdicts), and reviewed successive versions of the ETR and test report. The validation team determined that the evaluation team showed that the product satisfies all of the functional and assurance requirements defined in the Security Target for an EAL 4 evaluation. Therefore the validation team concludes that the Arca CCTL findings are accurate, and the conclusions justified. 2 Identification The CCEVS is a joint National Security Agency (NSA) and National Institute of Standards and Technology (NIST) effort to establish commercial facilities to perform trusted product evaluations. Under this program, security evaluations are conducted by commercial testing laboratories called Common Criteria Testing Laboratories (CCTLs) or candidate CCTLs using the CEM for EAL 1 through EAL 4 in accordance with National Voluntary Laboratory Assessment Program (NVLAP) accreditation. The NIAP Validation Body assigns Validators to monitor the CCTLs and candidate CCTLs to ensure quality and consistency across evaluations. Developers of information technology products desiring a security evaluation contract with a CCTL and pay a fee for their product s NIAP s Validated Products List. Table 1 provides information needed to completely identify the product, including: The Target of Evaluation (TOE): the fully qualified identifier of the product as evaluated; The Security Target (ST), describing the security features, claims, and assurances of the product; The conformance result of the evaluation; The organizations and individuals participating in the evaluation. Table 1: Evaluation Identifiers Item Evaluation Scheme Target of Evaluation Identifier United States NIAP Common Criteria Evaluation and Validation Scheme Cisco IOS Firewall Versions 12.3(14)T and 12.4(4)T, including Windows PC in its evaluated configuration as specified by the Windows 2000 Security Target, Version 2.0, 18 October 2002, and PIX Firewall Syslog Server version 5.1(3). Security Target Security Target for Cisco IOS Firewall Version 1.0 Evaluation Technical Report ACM_AUT.1, ACM_CAP.4, ACM_SCP.2 Evaluation Technical Report for Cisco IOS Firewall Versions 12.3(14)T and 12.4(4)T, Version: 1.4, 27 August 2006 ADO_DEL.2; ADO_IGS.1 Evaluation Technical Report for Cisco IOS Firewall Versions 12.3(14)T and 12.4(4)T, Version 1.3, 27 November
6 Item Conformance Result Applicable interpretations and precedents Sponsor Common Criteria Testing Lab (CCTL) CCEVS Validator(s) Identifier AGD_ADM.1; AGD_USR.1 Evaluation Technical Report for IOS Firewall Versions 12.3 (14)T and 12.4(4)T, Version 1.4, 27 November 2006 ALC_DVS.1, ALC_LCD.1, ALC_TAT.1 Evaluation Technical Report for Cisco IOS Firewall Versions 12.3(14)T and 12.4(4)T, Version 1.5, 27 November 2006 ASE Evaluation Technical Report for IOS Firewall Versions 12.3(14)T and 12.4(4)T, Version 1.2, 19 September 2006 AVA_MSU.1; AVA_SOF.1; AVA_VLA.2 Evaluation Technical Report for IOS Firewall Versions 12.3(14)T and 12.4(4)T, Version 1.5, 27 November 2006 ADV - ADV_FSP.2; ADV_HLD.2; ADV_RCR.1; ADV_LLD.1; ADV_IMP.1; ADV_SPM.1 Evaluation Technical Report for IOS Firewall Versions 12.3(14)T and 12.4(4)T, Version August 2006 ATE - ATE_COV.2; ATE_DPT.1 ATE_FUN.1; ATE_IND.2 Evaluation Technical Report for IOS /Firewall Versions 12.3(14)T and 12.4(4)T, Version 1.2, 25 August 2006 CC Part 2 and CC Part 3 conformant, EAL 4 augmented with ALC_FLR.1 PD 0113: Use of Third-party Security Mechanisms in TOE Evaluations. PD 0115: Third Party Authentication is permitted by the ALFWPP-MR I-0463: Platform Inclusion In A TOE With FPT_SEP Cisco Systems Inc. 170 West Tasman Drive San Jose, CA SAVVIS Communications Arca Common Criteria Testing Laboratory NVLAP Lab Code Nokes Boulevard Sterling, VA Kenneth W. Eggers Orion Security Solutions, Inc Earl Lee Cove Williamsburg, VA John Nilles The Aerospace Corporation 8840 Stanford Boulevard Suite 4400 Columbia, MD
7 3 Security Policy 3.1 Identification and Authentication The TOE requires each user to identify itself and provide authentication information before performing any other TSF-mediated action for the user. The TSF implements a password based user authentication mechanism that is used by administrative users that log via a directly connected terminal. In addition, the TSF supports the use of an external authentication server to provide single-use identity authentication for administrative users authenticating remotely via an in-band network connection. TOE support for authentication of application message traffic (e.g., telnet or FTP messages) transiting through the router was not included in the evaluation Password Based Authentication When authenticating using a directly-connected terminal device, the TOE authenticates the user upon entry of the user s identity and password, relying on the following attributes, which are maintained for each user: User identity, Password, User s authorized administrator role association, Privilege level of user role, Number of failed logins, and Lockout status. In the event that a user fails to authenticate more than an authorized administrator-defined, nonzero number of times, the TOE locks out the user s account until an authorized administrator takes the appropriate action to allow the locked-out user to again authenticate to the TOE successfully External Authentication When authenticating using a remotely connected terminal device, the TOE forwards the user s identity authentication information to an external authentication server to provide authentication of the user s identity. 3.2 Roles The TOE maintains three administrator roles: privileged administrator, semi-privileged administrator, and audit administrator. Only privileged administrators have the authority and permission to execute security management actions on the TOE. The audit administrator is authorized to perform all privileged and administrative actions on the audit trail, which resides on the PFSS server. 3.3 Security Management The TSF requires that authenticated administrators explicitly enter the enable command and password prior to performing commands restricted to the privileged administrator role. The TSF restricts management of the following TOE management data to privileged administrators: Creation, modification, and deletion of information flow rules; Overriding default object or information attribute values; Creation, modification, and deletion of user attributes; Setting system time; Setting the limit on authentication failures; Enabling and disabling TOE operation; Enabling and disabling single-use authentication functions; 4
8 Enabling, disabling, and managing audit trail management, including backup and restore of audit trail data on the router; Enabling, disabling, and managing backup and restore for TSF data and information flow rules; and Enabling, disabling, and managing communication of authorized external IT entities with the TOE. 3.4 Security Audit The TOE maintains an audit trail that records the date, time, subject identity, and outcome of each of the following events: Startup and shutdown of audit functions; User attribute modifications, including user role assignments; User login and logout attempts; User lockout (exceeding the configured number of failed logins) and restoration from lockout; All decisions on information flow requests; Success and failure of all cryptographic operations; Time changes; and Use of all audit management functions. The TSF restricts management of the following TOE management data to audit administrators: Enabling, disabling, and managing audit trail management, including backup and restore of audit trail data on the PFSS Server. TCP syslog is used to transmit data to the PIX Firewall Syslog Server (PFSS). The PFSS stores audit data to the local hard disk, using the Windows 2000 operating system to provide protection of the stored audit records. Purpose-built Cisco software included with the PFSS can be used to view, search, and sort the audit logs. 3.5 Information Flow Control The TOE performs packet filtering by applying an information flow security policy, in the form of access control lists (ACLs) and stateful inspection, to the specific interfaces of the TOE-enabled router. The policy ACLs and rules can include: presumed source and destination IP addresses, protocol identifiers, interface identifiers, and source or destination User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) port numbers. The TOE permits a packet arriving through one external information technology (IT) system interface to be transmitted out through another external IT system interface if each of the ACLs and rules for the interfaces is satisfied. Packets that do not satisfy any of these rules are logged and discarded by the TOE. The TOE also rejects packets arriving on an external IT system interface where the presumed address associated with the packet is associated with an external IT system interface different from the one on which it arrived, effectively blocking traffic from known spoofed addresses, broadcasts, and loopbacks. 5
9 3.6 Protection of the TSF The TOE protects itself from external access by untrusted subjects by implementing a passwordbased authentication mechanism for user terminals connected directly to the router and a singleuse authentication mechanism for user terminals connected through network interfaces. In addition, in the evaluated configuration, the TOE provides network filtering on all network ports. The TOE implements trusted administrator accounts and permits only authenticated privileged administrators to configure the TOE. The TOE does not support non-administrative user accounts. The TOE implements purpose-built operating system software that does not provide the capability to load and execute additional software. All access to router memory is restricted to functions implemented by the TOE s IOS software, which is the only software that executes on TOEenabled routers. Internally, the TOE distinguishes and separates information flows through the router based on the presumed address of source and destination subjects, identification of the transport layer protocol, arriving and departing TOE interface, and network service. The privileged administrator can use these subject and information security attributes to construct access control lists that further limit information flows through the TOE. The TOE also uses the identified subject and information attributes to maintain control and separation among multiple information flows. 4 Assumptions 4.1 Physical Security Assumption A.PHYSEC: The TOE is physically secure. 4.2 Personnel Security Assumption A.NOEVIL: Authorized administrators are non-hostile and follow all administrator guidance; however, they are capable of error. 4.3 IT Environment Assumptions A.MODEXP: The threat of malicious attacks aimed at discovering exploitable vulnerabilities is considered moderate. A.GENPUR: There are no general purpose computing capabilities (e.g., the ability to execute arbitrary code or applications) and storage repository capabilities on the TOE. A.PUBLIC: The TOE does not host public data. A.SINGEN: Information cannot flow among the internal and external networks unless it passes through the TOE. A.DIRECT: Human users within the physically secure boundary protecting the TOE may attempt to access the TOE from some direct connection (e.g., a console port) if the connection is part of the TOE. A.REMACC: Authorized administrator may access the TOE remotely from the internal and external networks. A.PROTECTIF: The PFSS is to be connected to the IOS\Firewall enabled router such that the network interface of the PFSS is only accessible by the TSF. This may be achieved by either directly connecting the PFSS to the router, or indirectly over the trusted network. This protection of the PFSS network interface is required by PD
10 5 Architectural Information The TOE consists of two physical devices: One of the following Cisco routers: o Model c871, c876, c877, or c878, o Model c1811 or c1812, or o Model c1801, c1802, or c1803, configured with the IOS operating system and firewall software version 12.4(4)T; or o Model c1841, o Model c2801, c2851, c2821, or c2811, o o Model c3845 or c3825, or Model 7206VXR, 7204VXR, or CISCO7301 configured with the IOS operating system and firewall software version 12.3(14)T, and PIX Firewall Syslog Server (PFSS) software version 5.1(3) running on a Windows 2000 PC in its evaluated configuration as specified by the Windows 2000 Security Target, Version 2.0, 18 October 2002 (referred to as the PIX Firewall Syslog Server). 6 Documentation Following is a list of the evaluation evidence, each of which was issued by the developer (and sponsor): Table 2: Evaluation Evidence Document Title Version & Date Installation and Configuration for Common Criteria EAL4 Evaluated Cisco IOS version 1-0, October Firewall (ADM) 2006 Functional Specification for Cisco IOS Firewall (FSP) version A.20, 28 July TOE Security Policy Model for Cisco IOS Firewall (SPM) version A.13, 24 August 2005 High Level Design for Cisco IOS Firewall (HLD) version A.14, 30 June 2006 Low Level Design for Cisco IOS /Firewall (LLD), version 1-5, 28 June 2006 Cisco s Configuration Management Plan and Delivery Procedures (CMP) version 0-8, 7 August 2006 Cisco IOS Firewall Specific Configuration Items List and Delivery Procedures (CL) version 0-9, 30 June 2006 Development Security for Cisco IOS (DEVSEC) version 0-3, September 2005 IOSFirewall-EAL4-COV-DPT spreadsheet (ATE) version 0-11, June 2006 Misuse Analysis for Cisco IOS Firewall (MSU) version 0-3, August 2005 Vulnerability Analysis/Strength of Function Analysis for Cisco IOS Firewall (VLA- version 0-8, April SOF),
11 Document Title Representational Correspondence Demonstration for Cisco IOS Firewall (RCR) Version & Date version A.10, 30 June 2006 The following is the list of other non-proprietary evaluation evidence provided by the sponsor: Cisco IOS Configuration Fundamentals and Network Management Configuration Guide Cisco IOS Configuration Fundamentals Command Reference Cisco IOS Security Configuration Guide (12.3) Cisco IOS Security Command Reference Cisco IOS IP Configuration Guide Cisco IOS IP and IP Routing Command Reference Cisco IOS Software System Error Messages Release Notes for Cisco IOS Release 12.3(x) Caveats for Cisco IOS Release 12.3 Hardware Installation Guides for each router platform (Table 4) Regulatory Compliance and Safety Information specific to each router platform (Table 2) RSA SecurID Ready Implementation Guide Windows 2000 Security Target, Version 2.0, dated 18 October 2002 Security Target for Cisco IOS/Firewall, Version 1.0, dated October 2006 PIX Firewall Syslog Server Release Notes for Version 6.0(1) 7 IT Product Testing This section describes the testing efforts of the developer and the evaluation team. 7.1 Developer Testing The developer performed a testing and coverage analysis, which examined each SFR and identified one or more existing IOS test case documents that includes test cases that verify the function or command requirement. Where tests did not exist for SFRs or functions, additional test procedures were created and documented in an evaluation-specific Adjunct Test Procedure document. The scope of the developer tests included all TOE Security Functions. Cisco performs regression testing on major IOS releases, including T releases, on a weekly basis according to a schedule. The goal of regression testing is to find defects in the product prior to release. Cisco product developers write tests for their products and they are scripted for repeatability. They are then turned over to Cisco s Automated Regression Facility group, who runs them regularly on new releases of the product. The developer testing addresses the following security functionality claimed by the TOE: acls, ssh communications, user lockout, logging, syslog connections, tracking of attributes for administrators, ability of administrators to carry out management functions, residual information testing, and traffic-filtering requirements. Table 4, Router Model Families, identifies the individual router models that can host the evaluated product. The developer performed an analysis of hardware equivalency that showed that each router model in a model family is equivalent to the other routers in the same family with respect to testing. The developer selected one representative router from each router family, configured it according to the evaluated configuration, and built a test environment to facilitate testing each of the routers. Table 4: Router Model Families Model Family Models IOS Version 8xx c871, c876, c877,c (4)T 18xx c1841, c (14)T 8
12 18xx c1811, c (4)T c1801, c1802, c (4)T 28xx c2851, c2821, c (14)T 38xx c3845, c (14)T 72xx, 73xx 7206VXR, 7204VXR, CISCO (14)T The developer used an existing test suite to test the PFSS component of the product. The evaluation team determined that the developer s test methodology met the coverage and depth requirements and that the actual test results matched the expected results. 7.2 Evaluation Team Independent Testing The evaluation team ensured that the TOE performed as described in the design documentation and demonstrated that the TOE enforces the TOE security functional requirements. Specifically, the evaluation team ensured that the developer test documentation sufficiently addresses the security functions as described in the functional specification. The evaluation team also ensured that all subsystem interfaces were tested by the developer. The evaluation team performed a sample of the developer s test suite and devised an independent set of team tests and penetration tests. The evaluation team reran a subset of the developer s test suite that tested each of the 26 SFRs. The CCTL met with Cisco test developers to determine how a sample of these tests exercised the SFRs. The evaluation team was satisfied with the results of this walk through. The evaluation team also performed a penetration flaw hypothesis analysis of the product to prepare for a penetration testing effort. The analysis examined each SFR to determine whether it was possible that the evaluated configuration could be susceptible to a vulnerability. The specific penetration tests executed include the following: Use a port scanner to determine whether the PFSS (Windows 2000) platform can interfere with the router, and initiate connection attempts to port 80 and 443 on the router. Confirm that messages are held in a buffer on the router in case they need to be resent. The ST states that only the events from a 9-minute period can be lost. Test the different privilege levels and granting command access to the different levels. Search for buffer overflows that result in command execution or bypassing the TSF. Use a port scanner to check for open ports on the router unmanaged by a rule. In working with the validation team, the following two additional penetration tests were constructed: Layer 2 (VLAN tagging) testing against the IOS Firewall enabled routers Configure the firewall between two VLAN-enabled, trunked, switched ports (on 9
13 same VLAN) and test whether those packets pass through the same CEF engine as other received traffic. Determine whether source-routed packets arriving at the firewall are dropped. The evaluation team constructed and ran each of the identified tests. The results of the penetration test execution verified that none of the hypothesized flaws was exploitable. 10
14 8 Evaluated Configuration The evaluated configuration was tested in the configuration identified in Figure 2, below. The evaluation results are valid for all configurations of IOS operating system and Cisco IOS Firewall on Cisco routers identified in Table 2. Figure 2: Cisco IOS Firewall testing environment Table 3 - Hardware and Software Components Component Cisco Router Model c871, c876, c877, c878, c1811 c1812, c1801, c1802, or c1803 Cisco Router Model c1841,model c2801, c2851, c2821, c2811, c3845, c3825, 7206VXR, 7204VXR, or CISCO7301 PIX Firewall Syslog Server (PFSS) Description Router configured with the Cisco IOS Firewall software version 12.4(4)T Router configured with the Cisco IOS Firewall software version 12.3(14)T PFSS software version 5.1(3) running on a Windows 2000 PC in its evaluated configuration as specified by the Windows 2000 Security Target, Version 2.0, 18 October 2002 (referred to as the PIX Firewall Syslog Server). 11
15 9 Validator Comments None. 10 Security Target Security Target for Cisco IOS Firewall Version Versions 12.3(14)T and 12.4(4)T, Version 1-0, October
16 11 List of Acronyms ACL API CC CCEVS CCIMB CCTL CEM CLI CMS CRL EAL ETR FW FIPS ID IOS IT NIAP NIST NSA NVLAP OS PC PD PFSS RFC SAR SFR SSL ST TCP TLS TOE TSC TSF UDP URL VR Access Control List Application Programming Interface Common Criteria Common Criteria Evaluation and Validation Scheme (US CC Validation Scheme) Common Criteria Implementation Board Common Criteria Testing laboratory Common Evaluation Methodology Command Line Interface Certificate Management System Certificate Revocation List Evaluation Assurance Level Evaluation Technical Report Firewall Federal Information Processing Standard Identifier Internetwork Operating System Information Technology National Information Assurance Partnership National Institute of Standards and Technology National Security Agency National Voluntary Laboratory Assessment Program Operating System Personal Computer Precedent Database PIX Firewall Syslog Server Request for Comment Security Functional Requirement Security Assurance Requirement Secure Socket Layer Security Target Transmission Control Protocol Transport Layer Security Target Of Evaluation TSF Scope of Control TOE Security Function User Datagram Protocol Uniform Resource Locator Validation Report 13
17 12 Bibliography The validation team used the following documents to prepare the validation report. [1] Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model, dated January 2004, Version 2.2. [2] Common Criteria for Information Technology Security Evaluation Part 2: Security functional requirements, dated January 2004, Version 2.2. [3] Common Criteria for Information Technology Security Evaluation Part 2: Annexes, dated January 2004, Version 2.2. [4] Common Criteria for Information Technology Security Evaluation Part 3: Security assurance requirements, dated January 2004, Version 2.2. [5] Common Evaluation Methodology for Information Technology Security Part 1: Introduction and general model, dated January 2004, Version 2.2. [6] Common Evaluation Methodology for Information Technology Security Part 2: Evaluation Methodology, dated January 2004, Version 2.2. [7] Security Target for Cisco IOS Firewall Versions 12.3(14)T and 12.4(4)T, Version 1-0, October [8] Common Criteria Evaluation and Validation Scheme for IT Security, Guidance to Validators of IT Security Evaluations. Scheme Publication # 3, Version 1.0, January [9] Cisco IOS Firewall, Versions 12.3(14)T and 12.4(4)T EAL4 Team Test Plan and Report Version 1.6, 28 August
18 13 Interpretations 13.1 International Interpretations Official start date of the evaluation was September 30, The evaluation team performed an analysis of the international interpretations and applied those that were applicable and had impact to the TOE evaluation as the CEM work units were applied. The following international interpretations were applied for this evaluation: 13.2 NIAP Interpretations The Evaluation Team determined that the following NIAP interpretations were applicable to this evaluation: Precedent Database (PD) 0113: Use of Third-party Security Mechanisms in TOE Evaluations Interpretations Validation The Validation Team concluded that the Evaluation Team correctly addressed the interpretations that it identified. I-0463: Platform Inclusion In A TOE With FPT_SEP 15
National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report
DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75
DataPower S40 ML Security Gateway and DataPower I50 Integration Appliance Version 3.6 Security Target Version 0.75 10/09/2008 Prepared for: IBM SOA Appliance Group One Rogers St Cambridge, MA 02142 Prepared
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3)
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3) Reference: ST January 2001 Version: 1.6 Europe: USA: CISCO Systems Ltd CISCO Systems Inc. 3 The Square 170 West Tasman Drive Stockley
National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Report Number: CCEVS-VR-VID10257-2011 Dated: 31 March 2011 Version: 1.0 National Institute
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Common Criteria Evaluation and Validation Scheme Validation Report Arbor Networks Peakflow X Version 3.1.4 Report
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government
How To Evaluate Watchguard And Fireware V11.5.1
Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation
Trust Technology Assessment Program. Validation Report
Trust Technology Assessment Program Validation Report U.S. Government Traffic Filter Firewall Protection Profile for Low-Risk Environments version 1.1 TTAP Report Number: TTAP-VR-0007 June, 1999 Mutual
How To Protect Your Computer From Being Hacked
Senforce Endpoint Security Suite Version 3.1.175 Security Target Version 1.0 06/19/07 Prepared for: Senforce Technologies, Inc. 147 W Election Rd Ste 110 Draper UT 84020 Prepared By: Science Applications
Certification Report
Certification Report Symantec Network Access Control Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme
Voltage Security, Inc. Palo Alto, CA
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Report Number: CCEVS-VR-07-0029 Dated: 29 May 2007 Version: 1.3 Validation Report TM Voltage Security, Inc. Palo
Certification Report
Certification Report EAL 3+ Evaluation of Rapid7 Nexpose Vulnerability Management and Penetration Testing System V5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian
TIBCO ActiveMatrix BusinessWorks TM. Release 5.8
National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report TIBCO ActiveMatrix BusinessWorks TM Release 5.8 Report Number: CCEVS-VR-VID10230-2010 Dated:
Certification Report StoneGate FW/VPN 5.2.5
Ärendetyp: 6 Diarienummer: 11FMV3127-87:1 Dokument ID HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2012-01-23 Country of origin: Sweden Försvarets materielverk Swedish Certification Body
Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report
KECS-CR-16-36 Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report Certification No.: KECS-PP-0717-2016 2016. 6. 10 IT Security Certification Center History of Creation
Security Target for BorderWare Firewall Server 6.5
Security Target for BorderWare Firewall Server 6.5 Reference: ST January 2002 Version : 2.4 North America: Europe: 50 Burnhamthorpe Rd. W. 1 The Harlequin Centre Suite 502 Southall Lane Mississauga Southall
Certification Report
Certification Report HP Universal CMDB and Universal Discovery v10.21 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
IBM WebSphere Message Broker Security Target
IBM WebSphere Message Broker Security Target Version 2.1.2 2007-08-22 Document History Version Date Summary Author 1.0 2006-10-23 Final EAL3 ST plus changes by IBM. SAIC / IBM 1.1 2006-12-11 Fixed inconsistencies.
TRUSTED SECURITY FILTER SECURITY TARGET
TRUSTED SECURITY FILTER SECURITY TARGET Edition: 4 29 Oct 07 Previous editions: Ed. 1 11 May 2006 Ed. 2 16 Aug 2006 Ed. 3 28 June 2007 Author: KKK Appr.: PÅT All pages in this document shall have the same
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle
Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1.
Supporting Document Mandatory Technical Document Evaluation Activities for Stateful Traffic Filter Firewalls cpp February-2015 Version 1.0 CCDB-2015-01-002 Foreword This is a supporting document, intended
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows,
Compucat Research Pty Limited 14 Wales St, Belconnen ACT 2617 ABN 48 008 602 980
Compucat Research Pty Limited 14 Wales St, Belconnen ACT 2617 ABN 48 008 602 980 Secure Optical Switch Version-01 Security Target P/N 2066-0012-05 P/N 2066-0012-05 February 08 Page -1 Table of Contents
Certification Report
Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme 2008 Government of Canada, Communications
Certification Report
Certification Report EAL 3+ Evaluation of Extreme Networks ExtremeXOS Network Operating System v12.3.6.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Certification Report
Certification Report EAL 4+ Evaluation of WatchGuard Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of
National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. ArcSight ESM 4.
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report ArcSight ESM 4.5 SP3 Patch 2 Report Number: CCEVS-VR-VID10423-2012 Dated: 05 October 2012
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
Security Target: Symantec Endpoint Protection Version 11.0
Security Target: Symantec Endpoint Protection Version 11.0 ST Version 1.6 June 2, 2008 Document Version 1.6 Symantec Corporation Page 1 of 68 Prepared For: Prepared By: Symantec Corporation 20330 Stevens
Security Target. Astaro Security Gateway V8 Packet Filter Version 1.000. Assurance Level EAL4+ Common Criteria v3.1
Astaro Security Gateway V8 Packet Filter Version 1.000 Assurance Level EAL4+ Common Criteria v3.1 This Security Target also covers the secunet wall 2 packet filter Version : 1.03 Date: 2011-05-20 Author:
Certification Report
Certification Report EAL 3+ Evaluation of AccessData Cyber Intelligence and Response Technology v2.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 11.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report - Firewall Protection Profile and Firewall Protection Profile Extended Package: NAT
Template: CSEC_mall_doc.dot, 7.0 Ärendetyp: 6 Diarienummer: 14FMV10188-21:1 Dokument ID CB-015 HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2015-06-12 Country of origin: Sweden Försvarets
Certification Report on REDOWL SecuOS V4.0 for RHEL4 of TSonNet Co., Ltd.
KECS-CR-07-01 Certification Report on REDOWL SecuOS V4.0 for RHEL4 of TSonNet Co., Ltd. Certification No. : KECS-CISS-0060-2007 Jan. 2007 National Intelligence Service IT Security Certification Center
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented
Top Layer Networks. Security Target V2.3
Top Layer Networks IDS Balancer TM Version 2.2 Appliance (IDSB3531-CCV1.0, IDSB3532-CCV1.0, IDSB4508-CCV1.0) Security Target V2.3 August 31, 2004 AppBalancing, AppSafe, DCFD, Flow Mirror, SecureWatch,
Courtesy Translation
PREMIER MINISTRE Secretariat General for National Defence French Network and Information Security Agency Certification Report ANSSI-CC-2010/15 OmniPCX Enterprise solution : OmniPCX Enterprise (release
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications
Certification Report
Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
CERTIFICATION REPORT No. CRP253
122-B CERTIFICATION REPORT No. CRP253 Citrix NetScaler Platinum Edition Load Balancer Version 9.1 (Build 100.3.cl) running on NetScaler 9010 FIPS, MPX 7000 platform, MPX 9000 platform, MPX 10000 platform
Certification Report
Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,
Certification Report
Certification Report EAL 3+ Evaluation of RSA envision platform v4.0 SP 1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Check Point Endpoint Security Media Encryption Security Target
Check Point Endpoint Security Media Encryption Security Target Version 1.0 June 23, 2010 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared By: Science Applications International Corporation
Common Criteria Evaluation for a Trusted Entrust/PKI
Common Criteria Evaluation for a Trusted Entrust/PKI Author: Marc Laroche Date: March 2000 Version: 2.0 2000, Entrust, Inc. Entrust is a registered trademark of Entrust Technologies Inc. in the United
Cisco IronPort S-Series Web Security Appliance Security Target
Cisco IronPort S-Series Web Security Appliance Security Target Version 1.0 October 12, 2009 Prepared for: Cisco IronPort Systems 1100 Grundy Lane San Bruno, CA 94066 Prepared By: Science Applications International
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
F5 Networks FirePass 4100 Version 5.5.2 Security Target EAL 2 + ALC_FLR.1, ADV_SPM.1
F5 Networks FirePass 4100 Version 5.5.2 Security Target EAL 2 + ALC_FLR.1, ADV_SPM.1 Release Date: December 19, 2007 Document ID: Version: 1.3 06-1023-R-0018 Prepared By: InfoGard Laboratories, Inc. Prepared
Intrusion Detection System System Protection Profile
Intrusion Detection System System Protection Profile Prepared for National Security Agency 9800 Savage Road Fort Meade MD, 20755 Prepared by Science Applications International Corporation 7125 Gateway
National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Sourcefire 3D System (Sourcefire Defense Center: models DC750, DC1500, and DC3500 Sourcefire
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
gateprotect Firewall Packet-Filtering-Core v10.3 Security Target Version:
Version: Status: Last Update: Classification: 1.0 Release 2013-02-08 public Legal tice This document is provided AS IS with no express or implied warranties. Use the information in this document at your
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
Citrix NetScaler Platinum Edition Load Balancer
122-B CERTIFICATION REPORT No. CRP262 Citrix NetScaler Platinum Edition Load Balancer Version 9.2 running on platforms MPX 5500, MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS, MPX 7500,
Lab 5.2.5 Configure IOS Firewall IDS
Lab 5.2.5 Configure IOS Firewall IDS Objective Scenario Topology: Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, the student will learn how to perform
U.S. Government Protection Profile for Database Management Systems
U.S. Government Protection Profile for Database Management Systems Information Assurance Directorate Version 1.3 December 24, 2010 Protection Profile Title: 1 U.S. Government Protection Profile for Database
Certification Report
Certification Report McAfee Network Security Platform M-Series and NS- Series Sensors Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances
122 CERTIFICATION REPORT No. CRP294 Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances Issue 1.0 November 2015
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction
F5 Networks BIG-IP Local Traffic Manager 6400 High Availability pair (qty 2) Security Target
F5 Networks BIG-IP Local Traffic Manager 6400 High Availability pair (qty 2) Security Target Release Date: April 9, 2007 Document ID: 05-948-R-0105 Version: V1.4 Prepared By: InfoGard Laboratories, Inc.
Firewall Protection Profile
samhällsskydd och beredskap 1 (38) ROS-ISÄK Ronny Janse 010-2404426 [email protected] Firewall Protection Profile samhällsskydd och beredskap 2 (38) Innehållsförteckning 1. Introduction... 4 1.1 PP reference...
C015 Certification Report
C015 Certification Report NexCode National Security Suite Release 3 File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 0.7 Prepared for: Prepared by: Enterasys Networks, Inc. Corsec Security,
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0
EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0
Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 ST Version 1.6 August 20, 2007 Document Version 1.6 Symantec Corporation Page 1 of 55 Prepared For: Prepared By: Symantec Corporation
Joint Interpretation Library. Security Evaluation and Certification of Digital Tachographs
Joint Interpretation Library Security Evaluation and Certification of Digital Tachographs JIL interpretation of the Security Certification according to Commission Regulation (EC) 1360/2002, Annex 1B Version
Canon ir6570/ir5570 Series ir Security Kit-B3. Security Target
Document ID: CANON-Device05-001 Canon ir6570/ir5570 Series ir Security Kit-B3 Security Target This document is a translation of the security target written in Japanese, which has been evaluated and certified.
Common Criteria Evaluations for the Biometrics Industry
Common Criteria Evaluations for the Biometrics Industry Kathy Malnick Senior Manager Criterian Independent Labs An initiative of the WVHTC Foundation Presentation outline Common Criteria defined Common
Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012
Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa
Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target
Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Revision 1.0 August 2011 1 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms
