Cisco Aggregation Services Router (ASR) 900 Series

Size: px
Start display at page:

Download "Cisco Aggregation Services Router (ASR) 900 Series"

Transcription

1 Cisco Aggregation Services Router (ASR) 900 Series Security Target Version March 2015

2 Table of Contents 1 SECURITY TARGET INTRODUCTION ST AND TOE REFERENCE TOE OVERVIEW TOE Product Type Supported non-toe Hardware/ Software/ Firmware TOE DESCRIPTION TOE EVALUATED CONFIGURATION PHYSICAL SCOPE OF THE TOE LOGICAL SCOPE OF THE TOE Security audit Cryptographic support User Data Protection Identification and Authentication Security Management Protection of the TSF TOE Access Trusted path/channels EXCLUDED FUNCTIONALITY CONFORMANCE CLAIMS COMMON CRITERIA CONFORMANCE CLAIM PROTECTION PROFILE CONFORMANCE PROTECTION PROFILE CONFORMANCE CLAIM RATIONALE TOE Appropriateness TOE Security Problem Definition Consistency Statement of Security Requirements Consistency SECURITY PROBLEM DEFINITION ASSUMPTIONS THREATS ORGANIZATIONAL SECURITY POLICIES SECURITY OBJECTIVES SECURITY OBJECTIVES FOR THE TOE SECURITY OBJECTIVES FOR THE ENVIRONMENT SECURITY REQUIREMENTS CONVENTIONS TOE SECURITY FUNCTIONAL REQUIREMENTS Security audit (FAU) Cryptographic Support (FCS) User data protection (FDP) Identification and authentication (FIA) Security management (FMT) Protection of the TSF (FPT) TOE Access (FTA) Page 2 of 52

3 5.2.1 Trusted Path/Channels (FTP) TOE SFR DEPENDENCIES RATIONALE FOR SFRS FOUND IN NDPP SECURITY ASSURANCE REQUIREMENTS SAR Requirements Security Assurance Requirements Rationale ASSURANCE MEASURES TOE SUMMARY SPECIFICATION TOE SECURITY FUNCTIONAL REQUIREMENT MEASURES ANNEX A: KEY ZEROIZATION KEY ZEROIZATION ANNEX B: REFERENCES Page 3 of 52

4 List of Tables TABLE 1: ACRONYMS... 5 TABLE 2 TERMINOLOGY... 6 TABLE 3: ST AND TOE IDENTIFICATION... 8 TABLE 4 IT ENVIRONMENT COMPONENTS... 9 TABLE 5 ASR 902 CHASSIS REFERENCES TABLE 6 ASR 903 CHASSIS REFERENCES TABLE 7 ASR 920 (12CZ-A/12CD-D) CHASSIS REFERENCES TABLE 8 ASR 920 (4SZ/4SZ-A) CHASSIS REFERENCES TABLE 9 FIPS REFERENCES TABLE 10 TOE PROVIDED CRYPTOGRAPHY TABLE 11 EXCLUDED FUNCTIONALITY TABLE 12 PROTECTION PROFILES TABLE 13 TOE ASSUMPTIONS TABLE 14 THREATS TABLE 15 ORGANIZATIONAL SECURITY POLICIES TABLE 16 SECURITY OBJECTIVES FOR THE TOE TABLE 17 SECURITY OBJECTIVES FOR THE ENVIRONMENT TABLE 18 SECURITY FUNCTIONAL REQUIREMENTS TABLE 19 AUDITABLE EVENTS TABLE 20: ASSURANCE MEASURES TABLE 21 ASSURANCE MEASURES TABLE 22 HOW TOE SFRS MEASURES TABLE 23: TOE KEY ZEROIZATION TABLE 24: REFERENCES Page 4 of 52

5 List of Acronyms The following acronyms and abbreviations are common and may be used in this Security Target: Acronyms/Abbreviations AAA AES BGP Bridge Domain BSC BTS CC CE CEM CLI CM DH DHCP EAL EFP ENI EtherChannel EVC FIPS GE HA HMAC HTTPS IS-IS IT LAN MEF MSC NDPP NNI NTP OS OSPF Table 1: Acronyms Definition Administration, Authorization, and Accounting Advanced Encryption Standard Border Gateway Protocol. An inter-domain routing protocol designed to provide loop-free routing between separate routing domains that contain independent routing policies (autonomous systems) A bridge domain is a local broadcast domain that is VLAN-ID-agnostic. Base Station Controllers Base Transceiver Stations Common Criteria for Information Technology Security Evaluation Carrier Ethernet Common Evaluation Methodology for Information Technology Security Command Line Interface Configuration Management Diffie-Hellman Dynamic Host Configuration Protocol Evaluation Assurance Level Ethernet Flow Point. An EFP service instance is a logical interface that connects a bridge domain to a physical port or to an EtherChannel group in a router. Enhanced Network Interfaces (ENIs). An ENI is typically a user-network facing interface and has the same default configuration and functionality as UNIs, but can be configured to support protocol control packets for Cisco Discovery Protocol (CDP), Spanning-Tree Protocol (STP), EtherChannel Link Aggregation Control Protocol (LACP). An EtherChannel bundles individual Ethernet links into a single logical link that provides the aggregate bandwidth of up to eight physical links. Ethernet Virtual Connection., a conceptual service pipe within the service provider network. Federal Information Processing Standard Gigabit Ethernet port High Availability (device or component failover) Hashed Message Authentication Code Hyper-Text Transport Protocol Secure Intermediate System to Intermediate System. An Open System Interconnection (OSI) protocol that specifies how routers communicate with routers in different domains. Information Technology Local Area Network Metro-Ethernet Forum. A MEF defines Ethernet Virtual Connection (EVC) as an association between two or more user network interfaces that identifies a point-topoint or multipoint-to-multipoint path within the service provider network. Mobile Switching Center Network Device Protection Profile Network Node Interfaces (NNIs) to connect to the service provider network Network Time Protocol Operating System Open Shortest Path First. An interior gateway protocol (routes within a single Page 5 of 52

6 Acronyms/Abbreviations Definition autonomous system). A link-state routing protocol which calculates the shortest path to each node. PP Protection Profile RAN Radio Access Network RSP Route Switch Processor QoS Quality of Service SFP Small form-factor pluggable port SHS Secure Hash Standard SSHv2 Secure Shell (version 2) ST Security Target TCP TDM Trunk Port TSC TSF TSP UNI WAN VLAN Transport Control Protocol Time-division multiplexing. Is a method of putting multiple data streams in a single transmission signal, separating the signal into many segments, each having a very short duration, hence each data stream having their own time slot on the channel. A port that sends and receives tagged frames on all VLANs, except the native VLAN, if one is configured. Frames belonging to the native VLAN do NOT carry VLAN tags when sent over the trunk. Conversely, if an untagged frame is received on a trunk port, the frame is associated with the native VLAN configured on that port. TSF Scope of Control TOE Security Function TOE Security Policy User Network Interfaces (UNIs) to connect to customer networks. Wide Area Network Virtual Local Area Network Terminology Term Authorized Administrator Peer router Privilege level Remote VPN Gateway/Peer Security Administrator User Vty Table 2 Terminology Definition Any user which has been assigned to a privilege level that is permitted to perform all TSFrelated functions. Another router on the network that the TOE interfaces with. Assigns a user specific management access to the TOE to run specific commands. The privilege levels are from 1-15 with 15 having full administrator access to the TOE similar to root access in UNIX or Administrator access on Windows. Privilege level 1 has the most limited access to the CLI. By default when a user logs in to the Cisco IOS, they will be in user EXEC mode (level 1). From this mode, the administrator has access to some information about the TOE, such as the status of interfaces, and the administrator can view routes in the routing table. However, the administrator can't make any changes or view the running configuration file. The privilege levels are customizable so that an Authorized Administrator can also assign certain commands to certain privilege levels. A remote VPN Gateway/Peer is another network device that the TOE sets up a VPN connection with. This could be a VPN client or another router. Synonymous with Authorized Administrator for the purposes of this evaluation. Any entity (human user or external IT entity) outside the TOE that interacts with the TOE. vty is a term used by Cisco to describe a single terminal (whereas Terminal is more of a verb or general action term). Page 6 of 52

7 DOCUMENT INTRODUCTION Prepared By: Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA This document provides the basis for an evaluation of a specific Target of Evaluation (TOE), the Aggregation Services Router (ASR) 900 Series. This Security Target (ST) defines a set of assumptions about the aspects of the environment, a list of threats that the product intends to counter, a set of security objectives, a set of security requirements, and the IT security functions provided by the TOE which meet the set of requirements. Page 7 of 52

8 1 SECURITY TARGET INTRODUCTION The Security Target contains the following sections: Security Target Introduction [Section 1] Conformance Claims [Section 2] Security Problem Definition [Section 3] Security Objectives [Section 4] IT Security Requirements [Section 5] TOE Summary Specification [Section 6] Rationale [Section 7] The structure and content of this ST comply with the requirements specified in the Common Criteria (CC), Part 1, Annex A, and Part 3, Chapter ST and TOE Reference This section provides information needed to identify and control this ST and its TOE. Table 3: ST and TOE Identification Name Description ST Title Cisco Aggregation Services Router (ASR) 900 Series Security Target ST Version 1.0 Publication Date 26 March 2015 Developer and Cisco Systems, Inc. ST Author TOE Reference Cisco Aggregation Services Router (ASR) 900 Series TOE Hardware Models ASR 902 and 903 including the RSP (RSP1A-55, RSP1B-55, RSP2A-64 and RSP2A- 128) and 920 (ASR CZ-A, ASR CZ-D, ASR-920-4SZ-A and ASR SZ-D) TOE Software IOS-XE 3.13.(1)S Version Keywords Audit, Authentication, Encryption, Protection, Router, Traffic 1.2 TOE Overview The Cisco Aggregation Services Router (ASR) 900 Series TOE are full-featured, modular aggregation platforms. They are designed for the cost-effective delivery of converged mobile, residential, and business services. The TOE provides scalable feature set of layer 2 switching and layer 3 routing services, redundancy, low power consumption, and high service scale in routers optimized for small aggregation and remote point-of-presence (POP) applications. The TOE consists of any one of a number of hardware configurations as noted above in Table 3: ST and TOE Identification. Each of the hardware configurations run the same version of IOS- XE software. The Cisco ASR 902 Router uses the same design as the Cisco ASR 903 Router, Page 8 of 52

9 but due to its smaller size, it has four interface module cards and one Route Switch Processor (RSP) card. The RSP card is the centralized card in the system performing the data plane, network timing, and control plane functions for the system. All components support online replacement and field upgrades, with the exception of the RSP card, which requires the system to be brought down for a replacement or upgrade. The Cisco ASR 920 Router comes in multiple versions with different port densities that include ASR CZ-A, ASR CZ-D, ASR-920-4SZ-A and ASR-920-4SZ-D. Cisco IOS-XE is a Cisco-developed highly configurable proprietary operating system that provides for efficient and effective routing. Although IOS-XE performs many networking functions, this TOE only addresses the functions that provide for the security of the TOE itself as described in Section TOE logical scope below TOE Product Type The Cisco Aggregation Services Router (ASR) 900 Series are temperature hardened, highthroughput, small form factor, low-power-consumption routers optimized for mobile backhaul, residential, and business service applications. The ASR 900 Series supports broadband access for delivering voice, video, data, and mobility services. Designed to support thousands of subscribers, QoS on the ASR 920 Series can scale up to a large number of queues per device. The ASR 900 Series are a full-featured Layer 2 switch and Layer 3 router that supports a variety of broadband applications, including IPTV and video on demand Supported non-toe Hardware/ Software/ Firmware The TOE supports (in some cases optionally) the following hardware, software, and firmware in its environment: Table 4 IT Environment Components Component Required Usage/Purpose Description for TOE performance Management Workstation with SSH Client Yes This includes any IT Environment Management workstation with a SSH client installed that is used by the TOE administrator to support TOE administration through SSH protected channels. Any SSH client that supports SSHv2 may be used. NTP Server No The TOE supports communications with an NTP server to synchronize date and time. Syslog server Yes The syslog audit server is used for remote storage of audit records that have been generated by and transmitted from the TOE. RADIUS or TACACS+ AAA Server No This includes any IT environment RADIUS or TACACS+ AAA server that provides authentication services to TOE administrators. Page 9 of 52

10 1.3 TOE DESCRIPTION This section provides an overview of the Cisco Aggregation Services Router (ASR) 900 Series Target of Evaluation (TOE). This section also defines the TOE components included in the evaluated configuration of the TOE. The TOE consists of a number of components including: Chassis: The TOE chassis is designed for low power consumption, line rate performance for all Layer 2 and Layer 3 interfaces, the different hardware configuration options include 3-RU modular chassis and slots to support various cards and processors. There are also flexible clocking options, and redundant power and cooling. The chassis is the component of the TOE in which all other TOE components are housed. Route/Switch Processor (RSP) as noted above, this card the centralized card in the system performing the data plane, network timing, and control plane functions for the system. The four supported RSP cards, RSP1A-55, RSP1B-55, RSP2A-64 and RSP2A- 128 are very similar in their performance, switching capabilities, interface (port) density, can be installed in both the ASR902 and ASR903. The differences are mainly in the services support scalability such as the amount of DRAM, the number of supported IP and multicast routes, MAC addresses, bridge domains and Ethernet flow points. Cisco IOS-XE software is a Cisco-developed highly configurable proprietary operating system that provides for efficient and effective routing and switching. Although IOS-XE performs many networking functions, this TOE only addresses the functions that provide for the security of the TOE itself as described in Section 1.7 Logical Scope of the TOE below. 1.4 TOE Evaluated Configuration The TOE consists of one or more physical devices as specified in section 1.5 below and includes the Cisco IOS-XE software. The TOE has two or more network interfaces and is connected to at least one internal and one external network. The Cisco IOS-XE configuration determines how packets are handled to and from the TOE s network interfaces. The TOE also provides timing services required in today s converged access networks by offering integrated support for the Building Integrated Timing Supply (BITS), 1 Pulse Per Second (1PPS) and Time Of Day (TOD) interfaces. The ASR 900 Series also supports Synchronous Ethernet (SyncE) and IEEE-1588 and can act as the source for network clocking for time-division multiplexing (TDM), Synchronous Digital Hierarchy (SDH), and Synchronous Optical Network (SONET), SyncE, and Global Positioning Satellite (GPS) interfaces. The ASR 900 Series router configuration will prioritize and process the data and signaling traffic for transport across the available networks. Typically, packet flows are passed through the internetworking device and forwarded to their configured destination. The TOE can optionally connect to an NTP server on its internal network for time services. Also, if the ASR 900 Series is to be remotely administered, then the management workstation station must be connected to an internal network, SSHv2 must be used to connect to the TOE. A syslog server is also used to store audit records. If these servers are used, they must be attached to the internal (trusted) network. The internal (trusted) network is meant to be separated effectively from unauthorized individuals and user traffic; one that is in a controlled environment where implementation of security policies can be enforced. Page 10 of 52

11 The following figure provides a visual depiction of an example TOE deployment. The TOE boundary is surrounded with a hashed red line. =TOE Boundary ASR 900 Series Routers Network 1 ASR902 VPN Peer Management Workstation ASR903 NTP Server ASR920 Network 2 Network 3 AAA Server VPN Peer Syslog Server Figure 1 TOE Example Deployment The previous figure includes the following: Examples of TOE Models (models listed in order of diagram) o Cisco ASR RU modular chassis Dedicated slots in the chassis that support the following: Up to four interface modules One Route Switch Processor (RSP) Page 11 of 52

12 Up to two DC or two AC or a combination of AC and DC power supply units One fan tray o Cisco ASR RU modular chassis Dedicated slots in the chassis that support the following: Up to six interface modules Up to two Route Switch Processors (RSP) Up to two DC power supply units One fan tray o Cisco ASR 920 Indoor version includes ASR CZ-A and ASR CZ-D models that have fixed ENET interfaces (12 x 1GE + 2 x 10GE or 2 x 1GE or any combinations of 1 GE and 10 GE among the two ports available) and dual power supplies (AC/DC) Compact version includes ASR-920-4SZ-A and ASR-920-4SZ-D models that have a compact form factor and configurable ports: 4 x 1 GE or 4 x 10 GE or any combinations of 1 GE and 10 GE among the four ports available. In addition, there are 2 x 1 GE copper ports available. 2 - Peer Routers (IT Environment) Management Workstation Syslog Server AAA Server NTP Server NOTE: While the previous figure includes the available TOE devices and several non-toe IT environment devices, the TOE is only the ASR 900 Series (902, 902 and 920) devices with the Cisco IOS-XE software. Only one TOE device is required in an evaluated configuration. 1.5 Physical Scope of the TOE The TOE is a hardware and software solution that makes up the router models as described above in Section 1.4. The TOE guidance documentation that is considered to be part of the TOE can be found listed in the Cisco Aggregation Services Router (ASR) 900 Series Common Criteria Operational User Guidance and Preparative Procedures document and are downloadable from the web site. The TOE is comprised of the following physical specifications as described below: Page 12 of 52

13 Figure 2 ASR 902 chassis design Table 5 ASR 902 chassis References Label Component 1 Interface modules 2 One RSP unit slot; supports the RSP1A- 55, RSP1B-55, RSP2A-64 and RSP2A Fan tray 4 Redundant power units; two DC power units are shown Figure 3 ASR 902 chassis design Table 6 ASR 903 chassis References Label Component 1 Interface modules 2 Two RSP unit slots; supports the RSP1A-55, RSP1B-55, RSP2A-64 and RSP2A Fan tray 4 Redundant power units; two DC power units are shown ASR 920 chassis design Page 13 of 52

14 Figure 4 Front Panel of Cisco ASR CZ-A Router Figure 5 Front Panel of Cisco ASR CZ-D Router Table 7 ASR 920 (12CZ-A/12CD-D) chassis References Label Component Label Component 1 Power Supply 0 (AC or DC) 10 Eight Copper port 2 Power Supply 1 (AC or DC) 11 1G/10G Dual Rate port 3 Power Supply 0 LED (AC 12 1G/10G Dual Rate port or DC) 4 Power Supply 1 LED (AC 13 USB Console port or DC) 5 RJ-48 slots for BITS (upper 14 Alarm port slot) and ToD (lower slot) 6 Management port 15 USB Memory port 7 Console port (TIA/EIA- 16 Board power LED 232F) 8 Auxiliary Console port 17 Zero Touch Provisioning 9 4x1GE SFP + 8x1GE SFP combo ports button 18 System Status LED Figure 6 Front Panel of Cisco ASR-920-4SZ Router Page 14 of 52

15 Figure 7 Front Panel of Cisco ASR-920-4SZ -A Router Table 8 ASR 920 (4SZ/4SZ-A) chassis References Label Component Label Component 1 Power Supply 0 (AC or DC) 9 2 1GE Copper ports 2 Power Supply 1 (AC or DC) 10 Four 1G/10G Dual Rate ports 3 Power Supply 0 LED (AC 11 USB Console port or DC) 4 Power Supply 1 LED (AC 12 Alarm port or DC) 5 RJ-48 slots for BITS (upper 13 USB Memory port slot) and ToD (lower slot) 6 Management port 14 Board power LED 7 Console port (TIA/EIA- 232F) 15 Zero Touch Provisioning button 8 Auxiliary Console port 16 System Status LED The network, on which the TOE resides, is considered part of the environment. The software is pre-installed and is comprised of the Cisco IOS-XE software image Release IOS-XE 3.13.(1)S. In addition, the software image is also downloadable from the Cisco web site. A login id and password is required to download the software image. 1.6 Logical Scope of the TOE The TOE is comprised of several security features. Each of the security features identified above consists of several security functionalities, as identified below. 1. Security Audit 2. Cryptography Support 3. User Data Protection 4. Identification & Authentication 5. Security Management 6. Protection of the TSF 7. Trusted Path/Channel 8. TOE Access Page 15 of 52

16 These features are described in more detail in the subsections below. In addition, the TOE implements all RFCs of the NDPP as necessary to satisfy testing/assurance measures prescribed therein Security audit The Cisco Aggregation Services Router (ASR) 900 Series provides extensive auditing capabilities. The TOE generates a comprehensive set of audit logs that identify specific TOE operations. For each event, the TOE records the date and time of each event, the type of event, the subject identity, and the outcome of the event. Auditable events include: failure on invoking cryptographic functionality such as establishment, termination and failure of an IPsec SA; establishment, termination and failure of an SSH session; modifications to the group of users that are part of the authorized administrator roles; all use of the user identification mechanism; any use of the authentication mechanism; any change in the configuration of the TOE, changes to time, initiation of TOE update, indication of completion of TSF self-test, maximum sessions being exceeded, termination of a remote session and attempts to unlock a termination session; and initiation and termination of a trusted channel. The TOE is configured to transmit its audit messages to an external syslog server. Communication with the syslog server is protected using IPsec and the TOE can determine when communication with the syslog server fails. If that should occur, the TOE can be configured to block new permit actions. The logs can be viewed on the TOE using the appropriate IOS commands. The records include the date/time the event occurred, the event/type of event, the user associated with the event, and additional information of the event and its success and/or failure. The TOE does not have an interface to modify audit records, though there is an interface available for the authorized administrator to clear audit data stored locally on the TOE Cryptographic support The TOE provides cryptography in support of other Cisco Aggregation Services Router (ASR) 900 Series security functionality. The algorithms shown in Table 9 FIPS References are implemented in the Cisco IOS Common Cryptographic Module (IC2M) Algorithm Module firmware version 2.0. This cryptography has been validated for conformance to the requirements of FIPS (see Table 9 for certificate references). Table 9 FIPS References Algorithm Cert. # AES 2817 DRBG 481 SHS (SHA-1, 256, 384, 512) HMAC SHA-1, 256, 384, Page 16 of 52

17 Algorithm Cert. # RSA 1471 ECDSA 493 While the algorithm implementations listed in the preceding table were not tested on the exact processor installed within the ASR 900, the algorithm certificates are applicable to the TOE based on the following, 1. The cryptographic implementation which is tested is identical (unchanged) to the cryptographic implementation on the ASR 900s. 2. The cryptographic implementation does not depend on hardware for cryptographic acceleration I.e. there are no hardware specific cryptographic dependency. The cryptographic algorithms are implemented completely in software. 3. This is consistent with the guidance provided in NIST IG G.5 allowing portability amongst platforms as long as no software modification is required. The ASR 900 platforms contain the following processors, 1. Freescale P2020 using the Freescale instruction set 2. Cisco Carrier Ethernet ASIC using a processor specific instruction set The TOE provides cryptography in support of VPN connections and remote administrative management via SSHv2. The cryptographic services provided by the TOE are described in Table 10 below. Table 10 TOE Provided Cryptography Cryptographic Method Internet Key Exchange Secure Shell Establishment RSA/DSA Signature Services SP RBG SHS AES Use within the TOE Used to establish initial IPsec session. Used to establish initial SSH session. Used in IPsec session establishment. Used in SSH session establishment. Used in IPsec session establishment. Used in SSH session establishment. Used to provide IPsec traffic integrity verification Used to provide SSH traffic integrity verification Used to encrypt IPsec session traffic. Used to encrypt SSH session traffic. Page 17 of 52

18 1.6.1 User Data Protection The TOE ensures that all information flows from the TOE do not contain residual information from previous traffic. Packets are padded with zeros. Residual data is never transmitted from the TOE Identification and Authentication The TOE performs two types of authentication: device-level authentication of the remote device (VPN peers) and user authentication for the Authorized Administrator of the TOE. Device-level authentication allows the TOE to establish a secure channel with a trusted peer. The secure channel is established only after each device authenticates the other. Device-level authentication is performed via IKE/IPsec mutual authentication. The IKE phase authentication for the IPsec communication channel between the TOE and authentication server and between the TOE and syslog server is considered part of the Identification and Authentication security functionality of the TOE. The TOE provides authentication services for administrative users to connect to the TOEs secure CLI administrator interface. The TOE requires Authorized Administrators to authenticate prior to being granted access to any of the management functionality. The TOE can be configured to require a minimum password length of 15 characters as well as mandatory password complexity rules. The TOE provides administrator authentication against a local user database. Passwordbased authentication can be performed on the serial console or SSH interfaces. The SSHv2 interface also supports authentication using SSH keys. The TOE optionally supports use of a RADIUS or TACACS+ AAA server (part of the IT Environment) for authentication of administrative users attempting to connect to the TOE s CLI Security Management The TOE provides secure administrative services for management of general TOE configuration and the security functionality provided by the TOE. All TOE administration occurs either through a secure SSHv2 session or via a local console connection. The TOE provides the ability to securely manage: All TOE administrative users; All identification and authentication; All audit functionality of the TOE; All TOE cryptographic functionality; The timestamps maintained by the TOE; Update to the TOE; and TOE configuration file storage and retrieval. The TOE supports two separate administrator roles: non-privileged administrator and privileged administrator. Only the privileged administrator can perform the above security relevant management functions. Page 18 of 52

19 Administrators can create configurable login banners to be displayed at time of login, and can also define an inactivity timeout for each admin interface to terminate sessions after a set period of inactivity Protection of the TSF The TOE protects against interference and tampering by untrusted subjects by implementing identification, authentication, and access controls to limit configuration to Authorized Administrators. The TOE prevents reading of cryptographic keys and passwords. Additionally Cisco IOS is not a general-purpose operating system and access to Cisco IOS memory space is restricted to only Cisco IOS functions. The TOE internally maintains the date and time. This date and time is used as the timestamp that is applied to audit records generated by the TOE. Administrators can update the TOE s clock manually, or can configure the TOE to use NTP to synchronize the TOE s clock with an external time source. Finally, the TOE performs testing to verify correct operation of the switch itself and that of the cryptographic module. The TOE is able to verify any software updates prior to the software updates being installed on the TOE to avoid the installation of Authorized Administrator software TOE Access The TOE can terminate inactive sessions after an Authorized Administrator configurable timeperiod. Once a session has been terminated the TOE requires the user to re-authenticate to establish a new session. The TOE can also display an Authorized Administrator specified banner on the CLI management interface prior to allowing any administrative access to the TOE Trusted path/channels The TOE allows trusted paths to be established to itself from remote administrators over SSHv2, and initiates outbound IPsec tunnels to transmit audit messages to remote syslog servers. In addition, IPsec is used to secure the session between the TOE and the authentication servers. The TOE can also establish trusted paths of peer-to-peer IPsec sessions. The peer-to-peer IPsec sessions can be used for securing the communications between the TOE and authentication server/syslog server. 1.7 Excluded Functionality The following functionality is excluded from the evaluation. Table 11 Excluded Functionality Excluded Functionality Non-FIPS mode of operation on the Exclusion Rationale This mode of operation includes non-fips allowed operations. Page 19 of 52

20 Telnet Telnet sends authentication data in the clear. This feature is enabled by default and must be disabled in the evaluated configuration. Including this feature would not meet the security policies as defined in the Security Target. The exclusion of this feature has no effect on the operation of the TOE. Refer to the Guidance documentation for configuration syntax and information These services will be disabled by configuration. The exclusion of this functionality does not affect compliance to the compliance to the U.S. Government Protection Profile for Security Requirements for Network Devices Version 1.1 with Security Requirements for Network Devices Errata#2. Page 20 of 52

21 2 CONFORMANCE CLAIMS 2.1 Common Criteria Conformance Claim The TOE and ST are compliant with the Common Criteria (CC) Version 3.1, Revision 4, dated: September For a listing of Assurance Requirements claimed see section 5.4. The TOE and ST are CC Part 2 extended and CC Part 3 conformant. 2.2 Protection Profile Conformance The TOE and ST are conformant with the Protection Profiles as listed in Table 12 below: None (NDPP) Table 12 Protection Profiles Protection Profile Version Date Security Requirements for Network Devices Errata Protection Profile for Network Devices (NDPP) June 8, 2012 #2 13 January Protection Profile Conformance Claim Rationale TOE Appropriateness The TOE provides all of the functionality at a level of security commensurate with that identified in the U.S. Government Protection Profile: U.S. Government Protection Profile for Security Requirements for Network Devices, Version 1.1 Security Requirements for Network Devices Errata# TOE Security Problem Definition Consistency The Assumptions, Threats, and Organization Security Policies included in the Security Target represent the Assumptions, Threats, and Organization Security Policies specified in the U.S. Government Protection Profile for Security Requirements for Network Devices Version 1.1 for which conformance is claimed verbatim. All concepts covered in the Protection Profile Security Problem Definition are included in the Security Target Statement of Security Objectives Consistency. The Security Objectives included in the Security Target represent the Security Objectives specified in the NDPPv1.1, for which conformance is claimed verbatim. All concepts covered in the Protection Profile s Statement of Security Objectives are included in the Security Target. Page 21 of 52

22 2.3.3 Statement of Security Requirements Consistency The Security Functional Requirements included in the Security Target represent the Security Functional Requirements specified in the NDPPv1.1, for which conformance is claimed verbatim. All concepts covered in the Protection Profile s Statement of Security Requirements are included in this Security Target. Additionally, the Security Assurance Requirements included in this Security Target are identical to the Security Assurance Requirements included in section 4.3 of the NDPPv1.1. Page 22 of 52

23 3 SECURITY PROBLEM DEFINITION This chapter identifies the following: Significant assumptions about the TOE s operational environment. IT related threats to the organization countered by the TOE. Environmental threats requiring controls to provide sufficient protection. Organizational security policies for the TOE as appropriate. This document identifies assumptions as A.assumption with assumption specifying a unique name. Threats are identified as T.threat with threat specifying a unique name. Organizational Security Policies (OSPs) are identified as P.osp with osp specifying a unique name. 3.1 Assumptions The specific conditions listed in the following subsections are assumed to exist in the TOE s environment. These assumptions include both practical realities in the development of the TOE security requirements and the essential environmental conditions on the use of the TOE. Table 13 TOE Assumptions Assumption A.NO_GENERAL_PURPOSE A.PHYSICAL A.TRUSTED_ADMIN Assumption Definition It is assumed that there are no general-purpose computing capabilities (e.g., compilers or user applications) available on the TOE, other than those services necessary for the operation, administration and support of the TOE. Physical security, commensurate with the value of the TOE and the data it contains, is assumed to be provided by the environment. TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner. 3.2 Threats The following table lists the threats addressed by the TOE and the IT Environment. The assumed level of expertise of the attacker for all the threats identified below is Enhanced-Basic. Table 14 Threats Threat T.ADMIN_ERROR T.TSF_FAILURE T.UNDETECTED_ACTIONS Threat Definition An administrator may unintentionally install or configure the TOE incorrectly, resulting in ineffective security mechanisms. Security mechanisms of the TOE may fail, leading to a compromise of the TSF. Malicious remote users or external IT entities may take actions that adversely affect the security of the TOE. These actions may remain undetected and thus their effects cannot be effectively mitigated. Page 23 of 52

24 Threat T.UNAUTHORIZED_ACCESS T.UNAUTHORIZED_UPDATE T.USER_DATA_REUSE Threat Definition A user may gain unauthorized access to the TOE data and TOE executable code. A malicious user, process, or external IT entity may masquerade as an authorized entity in order to gain unauthorized access to data or TOE resources. A malicious user, process, or external IT entity may misrepresent itself as the TOE to obtain identification and authentication data. A malicious party attempts to supply the end user with an update to the product that may compromise the security features of the TOE. User data may be inadvertently sent to a destination not intended by the original sender. 3.3 Organizational Security Policies The following table lists the Organizational Security Policies imposed by an organization to address its security needs. Table 15 Organizational Security Policies Policy Name P.ACCESS_BANNER Policy Definition The TOE shall display an initial banner describing restrictions of use, legal agreements, or any other appropriate information to which users consent by accessing the TOE. Page 24 of 52

25 4 SECURITY OBJECTIVES This Chapter identifies the security objectives of the TOE and the IT Environment. The security objectives identify the responsibilities of the TOE and the TOE s IT environment in meeting the security needs. This document identifies objectives of the TOE as O.objective with objective specifying a unique name. Objectives that apply to the IT environment are designated as OE.objective with objective specifying a unique name. 4.1 Security Objectives for the TOE The following table, Security Objectives for the TOE, identifies the security objectives of the TOE. These security objectives reflect the stated intent to counter identified threats and/or comply with any security policies identified. An explanation of the relationship between the objectives and the threats/policies is provided in the rationale section of this document. Table 16 Security Objectives for the TOE TOE Objective O.PROTECTED_COMMUNICATIONS O.VERIFIABLE_UPDATES O.SYSTEM_MONITORING O.DISPLAY_BANNER O.TOE_ADMINISTRATION O.RESIDUAL_INFORMATION_CLEARING O.SESSION_LOCK O.TSF_SELF_TEST TOE Security Objective Definition The TOE will provide protected communication channels for administrators, other parts of a distributed TOE, and authorized IT entities. The TOE will provide the capability to help ensure that any updates to the TOE can be verified by the administrator to be unaltered and (optionally) from a trusted source. The TOE will provide the capability to generate audit data and send those data to an external IT entity. The TOE will display an advisory warning regarding use of the TOE. The TOE will provide mechanisms to ensure that only administrators are able to log in and configure the TOE, and provide protections for logged-in administrators. The TOE will ensure that any data contained in a protected resource is not available when the resource is reallocated. The TOE shall provide mechanisms that mitigate the risk of unattended sessions being hijacked. The TOE will provide the capability to test some subset of its security functionality to ensure it is operating properly. Page 25 of 52

26 4.2 Security Objectives for the Environment All of the assumptions stated in section 3.1 are considered to be security objectives for the environment. The following are the Protection Profile non-it security objectives, which, in addition to those assumptions, are to be satisfied without imposing technical requirements on the TOE. That is, they will not require the implementation of functions in the TOE hardware and/or software. Thus, they will be satisfied largely through application of procedural or administrative measures. Table 17 Security Objectives for the Environment Environment Security Objective OE.NO_GENERAL_PURPOSE OE.PHYSICAL OE.TRUSTED_ADMIN IT Environment Security Objective Definition There are no general-purpose computing capabilities (e.g., compilers or user applications) available on the TOE, other than those services necessary for the operation, administration and support of the TOE. Physical security, commensurate with the value of the TOE and the data it contains, is provided by the environment. TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner. Page 26 of 52

27 5 SECURITY REQUIREMENTS This section identifies the Security Functional Requirements for the TOE. The Security Functional Requirements included in this section are derived from Part 2 of the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 4, dated: September 2012 and all international interpretations. 5.1 Conventions The CC defines operations on Security Functional Requirements: assignments, selections, assignments within selections and refinements. This document uses the following font conventions to identify the operations defined by the CC: Assignment: Indicated with italicized text; Refinement: Indicated with bold text; Selection: Indicated with underlined text; Iteration: Indicated by appending the iteration number in parenthesis, e.g., (1), (2), (3). Where operations were completed in the NDPP itself, the formatting used in the NDPP has been retained. Explicitly stated SFRs are identified by having a label EXT after the requirement name for TOE SFRs. Formatting conventions outside of operations and iterations matches the formatting specified within the NDPP. 5.2 TOE Security Functional Requirements This section identifies the Security Functional Requirements for the TOE. The TOE Security Functional Requirements that appear in the following table are described in more detail in the following subsections. Class Name Table 18 Security Functional Requirements Component Identification FAU: Security audit FAU_GEN.1 Audit data generation FCS: Cryptographic support FAU_GEN.2 FAU_STG_EXT.1 FCS_CKM.1 FCS_CKM_EXT.4 FCS_COP.1(1) FCS_COP.1(2) FCS_COP.1(3) FCS_COP.1(4) FCS_IPSEC_EXT.1 User Identity Association External Audit Trail Storage Component Name Cryptographic Key Generation (for asymmetric keys) Cryptographic Key Zeroization Cryptographic Operation (for data encryption/decryption) Cryptographic Operation (for cryptographic signature) Cryptographic Operation (for cryptographic hashing) Cryptographic Operation (for keyed-hash message authentication) Explicit: IPSEC Page 27 of 52

28 Class Name FDP: User data protection FIA: Identification and authentication FMT: Security management FPT: Protection of the TSF Component Identification FCS_RBG_EXT.1 FC_SSH_EXT.1 FDP_RIP.2 FIA_PMG_EXT.1 FIA_PSK_EXT.1 FIA_UIA_EXT.1 FIA_UAU_EXT.2 FIA_UAU.7 FMT_MTD.1 FMT_SMF.1 FMT_SMR.2 FPT_SKP_EXT.1 FPT_APW_EXT.1 FPT_STM.1 FPT_TUD_EXT.1 FPT_TST_EXT.1 Component Name Extended: Cryptographic Operation (Random Bit Generation) Explicit: SSH Full Residual Information Protection Password Management Extended: Pre-Shared Key Composition User Identification and Authentication Password-based Authentication Mechanism Protected Authentication Feedback Management of TSF Data (for general TSF data) Specification of Management Functions Restrictions on Security Roles Extended: Protection of TSF Data (for reading of all symmetric keys) Extended: Protection of Administrator Passwords Reliable Time Stamps Extended: Trusted Update TSF Testing FTA: TOE Access FTA_SSL_EXT.1 TSF-initiated Session Locking FTP: Trusted path/channels FTA_SSL.3 FTA_SSL.4 FTA_TAB.1 FTP_ITC.1 FTP_TRP.1 TSF-initiated Termination User-initiated Termination Default TOE Access Banners Trusted Channel Trusted Path Security audit (FAU) FAU_GEN.1: Audit data generation FAU_GEN.1.1 The TSF shall be able to generate an audit record of the following auditable events: a) Start-up and shut-down of the audit functions; b) All auditable events for the not specified level of audit; and c) All administrative actions; d) [Specifically defined auditable events listed in Table 19]. Page 28 of 52

29 FAU_GEN.1.2 The TSF shall record within each audit record at least the following information: a) Date and time of the event, type of event, subject identity, and the outcome (success or failure) of the event; and b) For each audit event type, based on the auditable event definitions of the functional components included in the PP/ST, [information specified in column three of Table 19]. Table 19 Auditable Events SFR Auditable Event Additional Audit Record Contents FAU_GEN.1 None. None. FAU_GEN.2 None. None. FAU_STG_EXT.1 None. None. FCS_CKM.1 None. None. FCS_CKM_EXT.4 None. None. FCS_COP.1(1) None. None. FCS_COP.1(2) None. None. FCS_COP.1(3) None. None. FCS_COP.1(4) None. None. FCS_IPSEC_EXT.1 FCS_SSH_EXT.1 Failure to establish an IPsec SA. Establishment/Termination of an IPsec SA. Failure to establish an SSH session Establishment/Termination of an SSH session. Reason for failure. Non-TOE endpoint of connection (IP address) for both successes and failures. Reason for failure. Non-TOE endpoint of connection (IP address) for both successes and failures. FCS_RBG_EXT.1 None. None. FDP_RIP.2 None. None. FIA_PMG_EXT.1 None. None. FIA_PSK_EXT None. None. FIA_UIA_EXT.1 All use of the identification and authentication mechanism. Provided user identity, origin of the attempt (e.g., IP address). FIA_UAU_EXT.2 All use of the authentication mechanism. Origin of the attempt (e.g., IP address). FIA_UAU.7 None. None. FMT_MTD.1 None. None. FMT_SMF.1 None. None. FMT_SMR.2 None. None. FPT_SKP_EXT.1 None. None. FPT_APW_EXT.1 None. None. Page 29 of 52

30 SFR Auditable Event Additional Audit Record Contents FPT_STM.1 Changes to the time. The old and new values for the time. Origin of the attempt (e.g., IP address). FPT_TUD_EXT.1 Initiation of update. No additional information. FPT_TST_EXT.1 None. None. FTA_SSL_EXT.1 FTA_SSL.3 FTA_SSL.4 Any attempts at unlocking of an interactive session. The termination of a remote session by the session locking mechanism. The termination of an interactive session. No additional information. No additional information. No additional information. FTA_TAB.1 None. None. FTP_ITC.1 FTP_TRP.1 Initiation of the trusted channel. Termination of the trusted channel. Failure of the trusted channel functions. Initiation of the trusted channel. Termination of the trusted channel. Failures of the trusted path functions. Identification of the initiator and target of failed trusted channels establishment attempt Identification of the claimed user identity FAU_GEN.2 User Identity Association FAU_GEN.2.1 For audit events resulting from actions of identified users, the TSF shall be able to associate each auditable event with the identity of the user that caused the event FAU_STG_EXT.1 External Audit Trail Storage FAU_STG_EXT.1.1 The TSF shall be able to [transmit the generated audit data to an external IT entity] using a trusted channel implementing the [IPsec] protocol Cryptographic Support (FCS) FCS_CKM.1 Cryptographic Key Generation (for asymmetric keys) FCS_CKM.1.1 Refinement: The TSF shall generate asymmetric cryptographic keys used for key establishment in accordance with [NIST Special Publication B, Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography for RSA-based key establishment schemes] and specified cryptographic key sizes equivalent to, or greater than, a symmetric key strength of Page 30 of 52

31 112 bits FCS_CKM_EXT.4 Cryptographic Key Zeroization FCS_CKM_EXT.4.1 The TSF shall zeroize all plaintext secret and private cryptographic keys and CSPs when no longer required FCS_COP.1(1) Cryptographic Operation (for data encryption/decryption) FCS_COP.1.1(1) Refinement: The TSF shall perform [encryption and decryption] in accordance with a specified cryptographic algorithm [AES operating in [CBC] and cryptographic key sizes 128-bits and 256-bits that meets the following: FIPS PUB 197, Advanced Encryption Standard (AES) [NIST SP A, NIST SP D] FCS_COP.1(2) Cryptographic Operation (for cryptographic signature) FCS_COP.1.1(2) Refinement: The TSF shall perform cryptographic signature services in accordance with a [(2) RSA Digital Signature Algorithm (rdsa) with a key size (modulus) of 2048 bits or greater] that meets the following: [Case: Digital Signature Algorithm FIPS PUB 186-3, Digital Signature Standard ] FCS_COP.1(3) Cryptographic Operation (for cryptographic hashing) FCS_COP.1.1(3) Refinement: The TSF shall perform [cryptographic hashing services] in accordance with a specified cryptographic algorithm [SHA-1, SHA-256, SHA-384, SHA-512] and message digest sizes [160, 256, 384, 512] bits that meet the following: FIPS Pub 180-3, Secure Hash Standard FCS_COP.1(4) Cryptographic Operation (for keyed-hash message authentication) FCS_COP.1.1(4) Refinement: The TSF shall perform [keyed-hash message authentication] in accordance with a specified cryptographic algorithm HMAC-[SHA-1], key size [160 bits], and message digest sizes [160] bits that meet the following: FIPS Pub 198-1, "The Keyed-Hash Message Authentication Code, and FIPS Pub 180-3, Secure Hash Standard FCS_IPSEC_EXT.1 Explicit: IPSEC FCS_IPSEC_EXT.1.1 The TSF shall implement the IPsec architecture as specified in RFC FCS_IPSEC_EXT.1.2 The TSF shall implement [tunnel mode]. Page 31 of 52

32 FCS_IPSEC_EXT.1.3 The TSF shall have a nominal, final entry in the SPD that matches anything that is otherwise unmatched, and discards it. FCS_IPSEC_EXT.1.4 The TSF shall implement the IPsec protocol ESP as defined by RFC 4303 using [the cryptographic algorithms AES-CBC-128 (as specified by RFC 3602) together with a Secure Hash Algorithm (SHA)-based HMAC, AES-CBC-256 (as specified by RFC 3602)]. FCS_IPSEC_EXT.1.5 The TSF shall implement the protocol: [IKEv1 as defined in RFCs 2407, 2408, 2409, RFC 4109, [no other RFCs for extended sequence numbers], and [no other RFCs for hash functions]]. FCS_IPSEC_EXT.1.6 The TSF shall ensure the encrypted payload in the [IKEv1] protocol uses the cryptographic algorithms AES-CBC-128, AES-CBC-256 as specified in RFC 6379 and [no other algorithm]. FCS_IPSEC_EXT.1.7 The TSF shall ensure that IKEv1 Phase 1 exchanges use only main mode. FCS_IPSEC_EXT.1.8 The TSF shall ensure that [IKEv1 SA lifetimes can be established based on [number of packets/number of bytes and length of time, where the time values can be limited to: 24 hours for Phase 1 SAs and 8 hours for Phase 2 SAs]. FCS_IPSEC_EXT.1.9 The TSF shall ensure that all IKE protocols implement DH Groups 14 (2048-bit MODP), and [no other DH groups]. FCS_IPSEC_EXT.1.10 The TSF shall ensure that all IKE protocols perform Peer Authentication using the [RSA] algorithm and [Pre-shared Keys] FCS_RBG_EXT.1 Extended: Cryptographic Operation (Random Bit Generation) FCS_RBG_EXT.1.1 The TSF shall perform all random bit generation (RBG) services in accordance with [NIST Special Publication using [CTR_DRBG (AES)] seeded by an entropy source that accumulated entropy from [a TSF-hardware-based noise source]. FCS_RBG_EXT.1.2 The deterministic RBG shall be seeded with a minimum of [256 bits] of entropy at least equal to the greatest security strength of the keys and hashes that it will generate FCS_SSH_EXT.1 Explicit: SSH FCS_SSH_EXT.1.1 The TSF shall implement the SSH protocol that complies with RFCs 4251, 4252, 4253, 4254, and [no other RFCs]. FCS_SSH_EXT.1.2 The TSF shall ensure that the SSH protocol implementation supports the following authentication methods as described in RFC 4252: public key-based, password-based. Page 32 of 52

Cisco Email Security Appliance. Security Target. Version 1.0. October 2014

Cisco Email Security Appliance. Security Target. Version 1.0. October 2014 Cisco Email Security Appliance Security Target Version 1.0 October 2014 Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA 2014 Cisco Systems, Inc. All rights

More information

Security Target. ST Version 1.1. August 26, 2014

Security Target. ST Version 1.1. August 26, 2014 Security Target Juniper Networks M, T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8 and Juniper QFX and EX Switches Running Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20 ST Version

More information

Dell Networking Switches Security Target. Version 1.0 January 22, 2015

Dell Networking Switches Security Target. Version 1.0 January 22, 2015 Version 1.0 January 22, 2015 Revision History Date Version Author Description 06/16/2014 0.1 Cygnacom Solutions First Draft 08/01/2014 0.2 Cygnacom Solutions Vendor review & OS v9.6 updates 08/31/2014

More information

Cisco Unified Communications Manager

Cisco Unified Communications Manager Cisco Unified Communications Manager Security Target Version 1.0 10 August 2015 EDCS - 1502591 Page 1 of 53 Table of Contents 1 SECURITY TARGET INTRODUCTION... 8 1.1 ST and TOE Reference... 8 1.2 TOE Overview...

More information

Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target

Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Revision 1.0 August 2011 1 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms

More information

Protection Profile for Network Devices

Protection Profile for Network Devices Protection Profile for Network Devices Information Assurance Directorate 08 June 2012 Version 1.1 Table of Contents 1 INTRODUCTION... 1 1.1 Compliant Targets of Evaluation... 1 2 SECURITY PROBLEM DESCRIPTION...

More information

Security Requirements for Network Devices

Security Requirements for Network Devices Security Requirements for Network Devices Information Assurance Directorate 10 December 2010 Version 1.0 Table of Contents 1 INTRODUCTION... 1 1.1 Compliant Targets of Evaluation... 1 2 SECURITY PROBLEM

More information

Cisco Integrated Services Routers (ISR) 4400 Series

Cisco Integrated Services Routers (ISR) 4400 Series Cisco Integrated Services Routers (ISR) 4400 Series Security Target Version 0.5 January 28, 2015 Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA 2015 Cisco

More information

Assurance Activities Report for a Target of Evaluation. Security Target (Version 0.9)

Assurance Activities Report for a Target of Evaluation. Security Target (Version 0.9) Assurance Activities Report for a Target of Evaluation Cisco Integrated Services Router (ISR) 800 Series Security Target (Version 0.9) Assurance Activities Report (AAR) Version 1.0 10/31/2014 Evaluated

More information

Protection Profile for Wireless Local Area Network (WLAN) Access Systems

Protection Profile for Wireless Local Area Network (WLAN) Access Systems Protection Profile for Wireless Local Area Network (WLAN) Access Systems Information Assurance Directorate 01 December 2011 Version 1.0 Table of Contents 1 Introduction to the PP... 1 1.1 PP Overview of

More information

HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target

HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target Version 1.0 February 12, 2014 Prepared for: Hewlett-Packard Long Down Avenue Stoke Gifford Bristol BS34 8QZ UK Prepared By: Leidos

More information

3e Technologies International 3e-636 Series Network Security Device. Security Target

3e Technologies International 3e-636 Series Network Security Device. Security Target 3e Technologies International 3e-636 Series Network Security Device Security Target 45040-007-01 Revision J March 12, 2015 Version 1.0 Page 1 2015 3e Technologies International, Inc. All rights reserved.

More information

Microsoft Windows Common Criteria Evaluation

Microsoft Windows Common Criteria Evaluation Microsoft Windows Common Criteria Evaluation Microsoft Windows 8 Microsoft Windows RT Microsoft Windows Server 2012 IPsec VPN Client Security Target Document Information Version Number 1.0 Updated On January

More information

collaborative Protection Profile for Network Devices

collaborative Protection Profile for Network Devices collaborative Protection Profile for Network Devices Version 0.1 05-Sep-2014 Acknowledgements This collaborative Protection Profile (cpp) was developed by the Network international Technical Community

More information

Cisco Catalyst Switches (3560-X and 3750-X) Security Target

Cisco Catalyst Switches (3560-X and 3750-X) Security Target Cisco Catalyst Switches (3560- and 3750-) Security Target Revision 1.0 6 June 2012 1 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms and Abbreviations...

More information

Common Criteria NDPP SIP Server EP Assurance Activity Report

Common Criteria NDPP SIP Server EP Assurance Activity Report Common Criteria NDPP SIP Server EP Assurance Activity Report Pascal Patin ISSUED BY Acumen Security, LLC. 1 Revision History: Version Date Changes Initial Release 7/20/2015 Initial Release Version 1.0

More information

SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING

SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING Document No. 1735-005-D0001 Version: 1.0, 3 June 2014 Prepared for: Fortinet, Incorporated 326 Moodie Drive Ottawa, Ontario Canada, K2H

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report 3eTI 3e-636 Series Network Security Devices Report Number: CCEVS-VR-VID10580 Dated: March 25,

More information

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government

More information

Extended Package for Mobile Device Management Agents

Extended Package for Mobile Device Management Agents Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes

More information

Security Target, Version 2.5 June 27, 2013

Security Target, Version 2.5 June 27, 2013 Dell SonicWALL, Inc. SonicOS Enhanced v5.9.0 on NSA Series and TZ Series Appliances Security Target Document Version: 2.5 Prepared for: Prepared by: Dell SonicWALL, Inc. 2001 Logic Avenue San Jose, CA

More information

AAR Test Summary. FireEye CM, FX, EX, and NX Series Appliances

AAR Test Summary. FireEye CM, FX, EX, and NX Series Appliances AAR Test Summary FireEye CM, FX, EX, and NX Series Appliances FireEye CM, FX, EX, and NX Series Appliances Series Security Target, version 1.0 Protection Profile for Network Devices (NDPP), version 1.1,

More information

3eTI Technologies International 3e-525/523 Series Wireless Network Access Points. Security Target

3eTI Technologies International 3e-525/523 Series Wireless Network Access Points. Security Target 3eTI Technologies International 3e-525/523 Series Wireless Network Access Points Security Target Version 1.0 Revision I October 8 th, 2015 Page 1 2015 3e Technologies International, Inc. All rights reserved.

More information

How To Test A Toe For Security

How To Test A Toe For Security Supporting Document Mandatory Technical Document Evaluation Activities for Network Device cpp September-2014 Version 0.1 CCDB- Foreword This is a supporting

More information

Protection Profile for Full Disk Encryption

Protection Profile for Full Disk Encryption Protection Profile for Full Disk Encryption Mitigating the Risk of a Lost or Stolen Hard Disk Information Assurance Directorate 01 December 2011 Version 1.0 Table of Contents 1 Introduction to the PP...

More information

Security Target for LANCOM Systems Operating System LCOS 8.70 CC with IPsec VPN

Security Target for LANCOM Systems Operating System LCOS 8.70 CC with IPsec VPN Security Target for LANCOM Systems Operating System LCOS 8.70 CC with IPsec VPN Version 1.15 Release LANCOM Systems GmbH 2013 LANCOM Systems GmbH LANCOM, LANCOM Systems and LCOS are registered trademarks.

More information

Samsung SDS Co., LTD Samsung SDS CellWe EMM (MDMPP11) Security Target

Samsung SDS Co., LTD Samsung SDS CellWe EMM (MDMPP11) Security Target Samsung SDS Co., LTD Samsung SDS CellWe EMM (MDMPP11) Security Target Version 0.6 2015/05/08 Prepared for: Samsung SDS 123, Olympic-ro 35-gil, Songpa-gu, Seoul, Korea 138-240 Prepared By: www.gossamersec.com

More information

Cisco Catalyst 2K/3K Wired Access Switches

Cisco Catalyst 2K/3K Wired Access Switches Common Criteria Security Target Version 1.0 5 December, 2014 EDCS - 1402478 Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA 2012 Cisco Systems, Inc. All rights

More information

Cisco AnyConnect Secure Mobility Desktop Client

Cisco AnyConnect Secure Mobility Desktop Client Cisco AnyConnect Secure Mobility Desktop Client Security Target Version 1.0 September 16, 2015 Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA 2015 Cisco

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Juniper Networks, Inc. JUNOS 12.1 X46 D20.6 for SRX-Series Platforms Certification Report 2015/90 3 July 2015 Version 1.0 Commonwealth of Australia

More information

Marimba Client and Server Management from BMC Software Release 6.0.3

Marimba Client and Server Management from BMC Software Release 6.0.3 Marimba Client and Server Management from BMC Software Release 6.0.3 Version 2.3.0 4 June, 2007 Prepared by: BMC Software, Inc. 2101 City West Blvd. Houston, Texas 77042 TABLE OF CONTENTS 1. Introduction...

More information

Security Target: Symantec Endpoint Protection Version 11.0

Security Target: Symantec Endpoint Protection Version 11.0 Security Target: Symantec Endpoint Protection Version 11.0 ST Version 1.6 June 2, 2008 Document Version 1.6 Symantec Corporation Page 1 of 68 Prepared For: Prepared By: Symantec Corporation 20330 Stevens

More information

Microsoft Windows Common Criteria Evaluation

Microsoft Windows Common Criteria Evaluation Microsoft Windows Common Criteria Evaluation Microsoft Windows 8 Microsoft Windows Server 2012 Full Disk Encryption Security Target Document Information Version Number 1.0 Updated On April 3, 2014 Microsoft

More information

Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1

Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1 Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller July 24, 2015 Version 1 1 Table of Contents 1 Introduction... 4 1.1 Conformance Claims...4 1.2 How to

More information

Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target

Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 0.7 Prepared for: Prepared by: Enterasys Networks, Inc. Corsec Security,

More information

Magnum Network Software DX

Magnum Network Software DX Magnum Network Software DX Software Release Notes Software Revision 3.0.1 RC5, Inc. www..com www..com/techsupport email: support@.com This document contains Confidential information or Trade Secrets, or

More information

AppGate Security Server, Version 8.0.4. Security Target. Document Version: 2.9 Date: 2008-04-10

AppGate Security Server, Version 8.0.4. Security Target. Document Version: 2.9 Date: 2008-04-10 AppGate Security Server, Version 8.0.4 Security Target Document Version: 2.9 Date: 2008-04-10 Contents 1 INTRODUCTION...6 1.1 ST Identification...6 1.2 ST Overview...6 1.3 CC Conformance Claim...6 1.4

More information

Protection Profile for Voice Over IP (VoIP) Applications

Protection Profile for Voice Over IP (VoIP) Applications Protection Profile for Voice Over IP (VoIP) Applications 21 October 2013 Version 1.2 Table of Contents 1 INTRODUCTION... 1 1.1 Overview of the TOE... 1 1.2 Usage of the TOE... 1 2 SECURITY PROBLEM DESCRIPTION...

More information

Executive Summary and Purpose

Executive Summary and Purpose ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on

More information

Protection Profile for Mobile Device Management

Protection Profile for Mobile Device Management Protection Profile for Mobile Device Management 7 March 2014 Version 1.1 1 Revision History Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 March 2014 Typographical changes and clarifications

More information

Protection Profile for Server Virtualization

Protection Profile for Server Virtualization Protection Profile for Server Virtualization 29 October 2014 Version 1.0 i 0 Preface 0.1 Objectives of Document This document presents the Common Criteria (CC) Protection Profile (PP) to express the fundamental

More information

Firewall Protection Profile

Firewall Protection Profile samhällsskydd och beredskap 1 (38) ROS-ISÄK Ronny Janse 010-2404426 ronny.janse@msb.se Firewall Protection Profile samhällsskydd och beredskap 2 (38) Innehållsförteckning 1. Introduction... 4 1.1 PP reference...

More information

Security Requirements for Mobile Operating Systems

Security Requirements for Mobile Operating Systems Security Requirements for Mobile Operating Systems Information Assurance Directorate 25 January 2013 Version 1.0 Table of Contents 1 INTRODUCTION... 1 1.1 First Generation Protection Profiles... 1 1.2

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0

Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0 Security Target NetIQ Access Manager 4.0 Document Version 1.13 August 7, 2014 Document Version 1.13 NetIQ Page 1 of 36 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite 810 Houston, TX

More information

GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.

GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0. GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented

More information

McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle

More information

McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

Protection Profile for Mobile Device Management

Protection Profile for Mobile Device Management 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes and clarifications to front-matter 2.0 31 December 2014

More information

Protection Profile for Software Full Disk Encryption

Protection Profile for Software Full Disk Encryption Protection Profile for Software Full Disk Encryption Mitigating the Risk of a Lost or Stolen Hard Disk Information Assurance Directorate 14 February 2013 Version 1.0 Table of Contents 1 Introduction to

More information

Mapping Between Collaborative Protection Profile for Network Devices, Version 1.0, 27-Feb-2015 and NIST SP 800-53 Revision 4

Mapping Between Collaborative Protection Profile for Network Devices, Version 1.0, 27-Feb-2015 and NIST SP 800-53 Revision 4 Mapping Between Collaborative Protection Profile for Network Devices, Version 1.0, 27-Feb-2015 and NIST SP 800-53 Revision 4 Introduction Several of the NIST SP 800-53/CNSS 1253 controls are either fully

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target

Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target Evaluation Assurance Level: EAL2 augmented with ALC_FLR.2 Document Version: 1 Prepared for: Prepared by: Citrix

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Mobile Billing System Security Target

Mobile Billing System Security Target Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing

More information

Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0

Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0 Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0 German Federal Office for Information Security PO Box 20 03 63 D-53133 Bonn Tel.:

More information

Cisco Adaptive Security Appliances (ASA) Firewall and Virtual Private Network (VPN) Platform Security Target

Cisco Adaptive Security Appliances (ASA) Firewall and Virtual Private Network (VPN) Platform Security Target Cisco Adaptive Security Appliances (ASA) Firewall and Virtual Private Network (VPN) Platform Security Target This document provides the basis for an evaluation of a specific Target of Evaluation (TOE).

More information

Security Target for Cisco Remote Access VPN

Security Target for Cisco Remote Access VPN Security Target for Cisco Remote Access VPN Reference: ST 16 May 2007 Version 1.17 CISCO Systems Inc. 170 West Tasman Drive San Jose CA 95124-1706 USA Copyright: 2007 Cisco Systems, Inc. Table of Contents

More information

CERTIFICATION REPORT No. CRP276. Cisco Catalyst 4500 Series switches (4503-E, 4506-E, 4507R+E, 4510R+E, 4500X and 4500X-F) running IOS-XE 3.5.

CERTIFICATION REPORT No. CRP276. Cisco Catalyst 4500 Series switches (4503-E, 4506-E, 4507R+E, 4510R+E, 4500X and 4500X-F) running IOS-XE 3.5. 0122 CERTIFICATION REPORT No. CRP276 Cisco Catalyst 4500 Series switches (4503-E, 4506-E, 4507R+E, 4510R+E, 4500X and 4500X-F) running IOS-XE 3.5.2E Issue 1.0 April 2014 Crown Copyright 2014 All Rights

More information

CyberArk Software, Ltd. Privileged Account Security Solution v9.1. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 1.

CyberArk Software, Ltd. Privileged Account Security Solution v9.1. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 1. CyberArk Software, Ltd. Privileged Account Security Solution v9.1 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 1.8 Prepared for: Prepared by: CyberArk Software, Ltd. 57 Wells

More information

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration

More information

Cisco Wireless Security Gateway R2

Cisco Wireless Security Gateway R2 Cisco Wireless Security Gateway R2 Product Overview The Cisco Wireless Security Gateway (WSG) is a highly scalable solution for tunneling femtocell, Unlicensed Mobile Access (UMA)/Generic Access Network

More information

Aggregation Services Router (ASR) 1000 Series Security Target

Aggregation Services Router (ASR) 1000 Series Security Target Aggregation Services Router (ASR) 1000 Series Security Target Revision 0.19 May 2011 1 Table of Contents April 2011 Table of Contents... 1 Table of Contents... 2 List of Tables... 4 1 SECURITY TARGET INTRODUCTION...

More information

EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.

EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0. EMC Corporation Data Domain Operating System Version 5.2.1.0 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.11 Prepared for: Prepared by: EMC Corporation 176 South Street Hopkinton,

More information

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1

More information

JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3

JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3 JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3 Juniper Networks January 10, 2007 Copyright Juniper Networks 2007. May be reproduced only in its original entirety [without revision].

More information

FIPS 140-2 SECURITY POLICY FOR

FIPS 140-2 SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SERVER August 31, 2011 FIPS 140-2 LEVEL-1 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SERVER 1. Introduction This document describes

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

Security Target. Security Target SQL Server 2008 Team. Author: Roger French Version: 1.04 Date: 2011-09-26

Security Target. Security Target SQL Server 2008 Team. Author: Roger French Version: 1.04 Date: 2011-09-26 SQL Server 2008 Team Author: Roger French Version: 1.04 Date: 2011-09-26 Abstract This document is the (ST) for the Common Criteria certification of the database engine of Microsoft SQL Server 2008 R2.

More information

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc. Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Protection Profile for Email Clients

Protection Profile for Email Clients Protection Profile for Email Clients 1 April 2014 Version 1.0 Page 1 of 69 1 Introduction... 4 1.1 Overview of the TOE... 4 1.2 Usage of the TOE... 4 2 SECURITY PROBLEM DESCRIPTION... 6 2.1 Threats...

More information

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0 COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.

More information

Check Point Endpoint Security Full Disk Encryption Security Target

Check Point Endpoint Security Full Disk Encryption Security Target Check Point Endpoint Security Full Disk Encryption Security Target ST Version 2.4 June 22, 2009 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared by: Metatron Ltd. 66 Yosef St., Modiin, Israel

More information

McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 Security Target

McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 Security Target v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 10 January 2012 Version 1.1 Prepared By: Primasec Ltd For McAfee Inc 2340 Energy Park Drive St. Paul, MN 55108 USA Contents 1 Introduction...

More information

U.S. Government Protection Profile for Database Management Systems

U.S. Government Protection Profile for Database Management Systems U.S. Government Protection Profile for Database Management Systems Information Assurance Directorate Version 1.3 December 24, 2010 Protection Profile Title: 1 U.S. Government Protection Profile for Database

More information

Tim Bovles WILEY. Wiley Publishing, Inc.

Tim Bovles WILEY. Wiley Publishing, Inc. Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5

More information

How To Install An At-S100 (Geo) On A Network Card (Geoswitch)

How To Install An At-S100 (Geo) On A Network Card (Geoswitch) AT-S100 Version 1.0.3 Patch 1 Management Software for the AT-9000/28 Managed Layer 2 GE ecoswitch and AT-9000/28SP Managed Layer 2 GE ecoswitch Software Release Notes Please read this document before you

More information

Security Target. McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5. Document Version 1.3. October 12, 2011

Security Target. McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5. Document Version 1.3. October 12, 2011 Security Target McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5 Document Version 1.3 October 12, 2011 Document Version 1.3 McAfee Page 1 of 69 Prepared For: Prepared By: McAfee, Inc. 2821

More information

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT Version 1.3 Crown Copyright 2015 All Rights Reserved 49358431 Page 1 of 12 About this document This document describes the features, testing and deployment

More information

EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0

EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0 EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012

More information

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode 13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4

More information

CCNA Security. Chapter Two Securing Network Devices. 2009 Cisco Learning Institute.

CCNA Security. Chapter Two Securing Network Devices. 2009 Cisco Learning Institute. CCNA Security Chapter Two Securing Network Devices 1 The Edge Router What is the edge router? - The last router between the internal network and an untrusted network such as the Internet - Functions as

More information

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport

More information

Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.

Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc. Secure File Transfer Appliance Security Policy Document Version 1.9 Accellion, Inc. November 11, 2010 Copyright Accellion, Inc. 2010. May be reproduced only in its original entirety [without revision].

More information

Cisco Unified Wireless Network and Wireless Intrusion Detection System: Security Target

Cisco Unified Wireless Network and Wireless Intrusion Detection System: Security Target Cisco Unified Wireless Network and Wireless Intrusion Detection System: Security Target This document provides the basis for an evaluation of a specific Target of Evaluation (TOE), the Cisco Aironet 1130,

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0 APNIC elearning: IPSec Basics Contact: training@apnic.net esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations

More information

Implementing Secure Shell

Implementing Secure Shell Secure Shell (SSH) is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures sessions using standard cryptographic mechanisms, and the application

More information

IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0

IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0 IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0 CipherTrust 4800 North Point Parkway Suite 400 Alpharetta, GA 30022 Phone: 678-969-9399

More information

CISCO IOS NETWORK SECURITY (IINS)

CISCO IOS NETWORK SECURITY (IINS) CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.

More information

Common Criteria for Information Technology Security Evaluation Protection Profile. General-Purpose Operating System Protection Profile

Common Criteria for Information Technology Security Evaluation Protection Profile. General-Purpose Operating System Protection Profile Common Criteria for Information Technology Security Evaluation Protection Profile General-Purpose Operating System Protection Profile 09 09 2013 Table of contents Table of Contents 1 INTRODUCTION... 7

More information

Top Layer Networks. Security Target V2.3

Top Layer Networks. Security Target V2.3 Top Layer Networks IDS Balancer TM Version 2.2 Appliance (IDSB3531-CCV1.0, IDSB3532-CCV1.0, IDSB4508-CCV1.0) Security Target V2.3 August 31, 2004 AppBalancing, AppSafe, DCFD, Flow Mirror, SecureWatch,

More information

Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012

Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012 Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa

More information