NIAP: View Technical Decision Details
NIAP/CCEVS
  NIAP  »»  Protection Profiles  »»  Technical Decisions  »»  View Details  
TD0656:  Missing EAs for VPN GW Optional Headend SFRs

Publication Date
2022.06.24

Protection Profiles
MOD_VPNGW_v1.2

Other References
MOD_VPNGW-SD_V1.2, FTA_SSL.3/VPN, FTA_TSE.1, FTA_VCM_EXT.1

Issue Description

The evaluation activities for the three implementation dependent optional requirements were unintentionally excluded from the supporting document for MOD_VPNGW_V1.2.

Resolution

MOD_VPNGW-SD_v1.2 is modified as follows:

 

The following EAs are added for optional requirement FTA_SSL.3/VPN:

TSS

The evaluator shall examine the TSS to verify that it describes the ability of the TSF to terminate an inactive VPN client session. 

Guidance

The evaluator shall examine the operational guidance to verify that it provides instructions to the administrator on how to configure the time limit for termination of an active VPN client session. 

Tests

The evaluator shall perform the following tests:

  • Test 1: The evaluator shall follow the steps provided in the operational guidance to set the inactivity timer for five minutes. The evaluator shall then connect a VPN client to the TOE, let it sit idle for four minutes and fifty seconds, and observe that the VPN client is still connected at this time by performing an action that would require VPN access. The evaluator shall then disconnect the client, reconnect it, wait five minutes and ten seconds, attempt the same action, and observe that it does not succeed. The evaluator shall then verify using audit log data that the VPN client session lasted for exactly five minutes.
  • Test 2: The evaluator shall configure the inactivity timer to ten minutes and repeat Test 1, adjusting the waiting periods and expected audit log data accordingly.

 

The following EAs are added for optional requirement FTA_TSE.1:

TSS

The evaluator shall examine the TSS to verify that it describes the methods by which the TSF can deny the establishment of an otherwise valid remote VPN client session (e.g., client credential is valid, not expired, not revoked, etc.), including day, time, and IP address at a minimum.

Guidance

The evaluator shall review the operational guidance to determine that it provides instructions for how to enable an access restriction that will deny VPN client session establishment for each attribute described in the TSS. 

Tests

The evaluator shall perform the following tests:

  • Test 1: The evaluator shall successfully connect a remote VPN client to the TOE and then disconnect it, noting the IP address from which the client connected. The evaluator shall follow the steps described in the operational guidance to prohibit that IP address from connecting, attempt to reconnect using the same VPN client, and observe that it is not successful.
  • Test 2: The evaluator shall successfully connect a remote VPN client to the TOE and then disconnect it. The evaluator shall follow the steps described in the operational guidance to prohibit the VPN client from connecting on a certain day (whether this is a day of the week or specific calendar date), attempt to reconnect using the same VPN client, and observe that it is not successful.
  • Test 3: The evaluator shall successfully connect a remote VPN client to the TOE and then disconnect it. The evaluator shall follow the steps described in the operational guidance to prohibit the VPN client during a range of times that includes the time period during which the test occurs, attempt to reconnect using the same VPN client, and observe that it is not successful.
  • Test 4: (conditional, the "other attributes" assignment has been selected and completed with one or more additional attributes) For any other attributes that are identified in FTA_TSE.1, the evaluator shall conduct a test similar to tests 1 through 3 to demonstrate the enforcement of each of these attributes. The evaluator shall demonstrate a successful remote client VPN connection, configure the TSF to deny that connection based on the attribute, and demonstrate that a subsequent connection attempt is unsuccessful.

 

The following EAs are added for optional requirement FTA_VCM_EXT.1:

TSS

The evaluator shall check the TSS to verify that it asserts the ability of the TSF to assign a private IP address to a connected VPN client. 

Guidance

There are no guidance EAs for this component. 

Tests

The evaluator shall connect a remote VPN client to the TOE and record its IP address as well as the internal IP address of the TOE. The evaluator shall verify that the two IP addresses belong to the same network. The evaluator shall disconnect the remote VPN client and verify that the IP address of its underlying platform is no longer part of the private network identified in the previous step.

Justification

See issue description

 
 
Site Map              Contact Us              Home