NIAP: Compliant Product
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - Allied Telesis x930 Series Switches v5.4.6-1

Certificate Date:  2018.05.01

Validation Report Number:  CCEVS-VR-VID10784-2018

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 1.0

CC Testing Lab:  UL Verification Services Inc. (Formerly InfoGard)


CC Certificate [PDF] Security Target [PDF] Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]


Product Description

The TOE is classified as a Network Device (a generic infrastructure device that can be connected to a network).  The Allied Telesis x930 Series Switches are stackable Gigabit layer 3 devices. The x930 Series Switches come in 28-port and 52-port versions with 10 and 40 Gigabit uplinks.

The TOE consist of the following hardware:

·         AT-x930-28GTX

·         AT-x930-28GPX

·         AT-x930-28GSTX

·         AT-x930-52GTX

·         AT-x930-52GPX

Running:

·         AlliedWare Plus version 5.4.6-1

The guidance documentation that is part of the TOE is listed in Section 9 of the Security Target, within Table 11 (also in the Security Target). The TOE also includes the evaluation evidence listed in Table 12 of the Security Target.


Evaluated Configuration


Security Evaluation Summary

The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes and procedures. Allied Telesis x930 Series Switches was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 4. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 4. The TOE, when installed and configured per the instructions provided in the preparative and administrative guidance, satisfies all of the security functional requirements stated in the Allied Telesis x930 Series Switches Security Target. The evaluation underwent CCEVS Validator review. The evaluation was completed in April 2018. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (CCEVS-VR-10784-2018, dated April, 26, 2018), prepared by CCEVS, and the Assurance Activities Report (AAR) 17-3347-R-0039 V1.2.


Environmental Strengths

Audit

The TOE will audit all events and information defined in Table 6 of the Security Target. The TOE will also include the identity of the user that caused the event (if applicable), date and time of the event, type of event, and the outcome of the event. The TOE protects storage of audit information from unauthorized access, deletion, or modification.  The TOE can transmit audit data to an external IT entity using the Syslog over TLS protocol.

Cryptographic Operations

The TOE uses cryptographic algorithms and protocols to protect Syslog server communication, RADIUS sever communications, remote administrator sessions, test the TOE itself, and verify the integrity of updates to the TOE.

The TSF zeroizes all plaintext secret and private cryptographic keys and CSPs once they are no longer required.

Identification and Authentication

The TOE supports passwords consisting of alphanumeric and special characters. The TSF also allows administrators to set a minimum password length and support passwords with 15 characters or more.

The TOE requires all administrative-users to authenticate. The TOE allows the following unauthenticated actions:

·         Viewing the warning banner

·         Responding to ICMP echo requests

·         Performing ARP

·         Performing routing services (.e.g. RIP, OSPF)

Security Management

The TOE can be administered via a local console port or remotely over SSH. Both methods of administration present the user with a CLI. Authorized administrators are assigned the Security Administrator role when they login.

Protection of the TSF

The TOE protects itself by:

·         Preventing the reading of plaintext passwords.

·         Preventing the reading of secret and private keys.

·         Providing reliable time stamps for itself.

·         Running a suite of self-tests during the initial start-up (upon power on) to demonstrate the correction operation of the TSF.

·         Verifying firmware updates to the TOE using a published hash prior to installing those updates.

TOE Access

For local console sessions and remote SSH sessions, the TSF terminates sessions after an administrator configured inactivity period. Before establishing an administrative user session, the TOE is capable of displaying a configurable advisory notice and consent warning message regarding unauthorized use of the TOE.

Trusted Path/Channels

The TOE uses TLS to provide a trusted communication channel with the Syslog server and RADIUS server.

The TOE permits remote administrators to connect using SSH.


Vendor Information

Logo
Allied Telesis
Alex Murray
+64 3 339 3000
securitycertification@alliedtelesis.co.nz

alliedtelesis.com/
Site Map              Contact Us              Home