NIAP: Compliant Product
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - Evertz MMA10G-IPX

Certificate Date:  2017.10.17

Validation Report Number:  CCEVS-VR-VID10817-2017

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 1.0

CC Testing Lab:  Acumen Security


CC Certificate [PDF] Security Target [PDF] Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]


Product Description

The Internet Protocol Crosspoint (IPX) switch is a 10 Gigabit (Gb) Internet Protocol (IP) switch optimized for video-over-IP traffic (compressed or uncompressed). The IPX builds on the capabilities of the existing Evertz line of video routing switches.

The IPX cards, associated Small Form-Factor Pluggable transceivers (SFP), their mounting frames and the frames’ controllers and power supplies make up an IPX installation.

The EMX frames are passive (except for the door-mounted fans, which are the only powered equipment permanently attached to the frame). The frames mount power supplies, frame controllers and IPX cards. The frame controllers serve as a pass-through proxy to distribute Ethernet-based control connections to the individual IPX cards within the EMX frame chassis.

The SFP ports are unencrypted. Sites requiring enclave-based data security will deploy physical security controls to isolate the video network enclave. Where an operational mission requires that video needs to cross a logical enclave boundary, Evertz stipulates a network architecture deploying third-party software or hardware encryption at the video transmitting and video receiving endpoints.


Evaluated Configuration


Security Evaluation Summary

The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Evertz IPX was evaluated are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 4.  The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 4.  Acumen Security determined that the evaluation assurance level (EAL) for the product is EAL 1.  The product, when delivered configured as identified in the MMA10G-IPX Series-CC (Common Criteria) User Manual, satisfies all of the security functional requirements stated in the Network Device Collaborative Protection Profile V2.7 Security Target. The project underwent CCEVS Validator review.  The evaluation was completed in October 2017.  Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.


Environmental Strengths

The NDcPP-compliant TOE is comprised of several security features. Each of the security features identified above consists of several security functionalities, as identified below.

1.      Security audit

2.      Cryptographic support

3.      Identification and authentication

4.      Secure Management

5.      Protection of the TSF

6.      TOE access

7.      Trusted path/channels

These features are described in more detail in the subsections below.

Security Audit

The TOE’s Audit security function supports audit record generation and review.   The TOE provides date and time information that is used in audit timestamps.   Very broadly, the Audit events generated by the TOE include:

·         Establishment of a Trusted Path or Channel Session

·         Failure to Establish a Trusted Path or Channel Session

·         Termination of a Trusted Path or Channel Session

·         Failure of Trusted Channel Functions

·         Identification and Authentication

·         Unsuccessful attempt to validate a certificate

·         Any update attempt

·         Result of the update attempt

·         Management of TSF data

·         Changes to Time

The TOE can store the generated audit data on itself and it can be configured to send syslog events to a syslog server, using a TLS protected collection method.  Logs are classified into various predefined categories.   The logging categories help describe the content of the messages that they contain.  Access to the logs is restricted to only Security Administrators, who has no access to edit them, only to copy or delete (clear) them.   Audit records are protected from unauthorized modifications and deletions.

The logs can be viewed by using the Syslog tab in the web browser. The log records the time, host name, facility, application and “message” (the log details). The previous audit records are overwritten when the allocated space for these records reaches the threshold on a FIFO basis.

Cryptographic Support

The TOE provides cryptography support for secure communications and protection of information. The cryptographic services provided by the TOE include: symmetric encryption and decryption using AES; asymmetric key generation; cryptographic key establishment using RSA-based key establishment schemes and DH key establishment; digital signature using RSA; cryptographic hashing using SHA-256; random bit generation using DRBG and keyed-hash message authentication using HMAC-SHA (SHA-1 and SHA-256). The TOE implements the secure protocols TLS/HTTPS on the server side and TLS on the client side.  The algorithm certificate references are listed in the table below

 

Algorithm

Description

Mode Supported

CAVP Cert. #

AES

Used for symmetric encryption/decryption

FCS_TLSC_EXT.1

FCS_TLSS_EXT.2

FCS_HTTPS_EXT.1

FCS_COP.1(1)

CBC (128 and 256 bits)


4652
4459

SHS (SHA-256)

Cryptographic hashing services

FCS_TLSC_EXT.1

FCS_TLSS_EXT.2

FCS_HTTPS_EXT.1

FCS_COP.1(1)

FCS_COP.1(3)

Byte Oriented


3811
3672

HMAC (HMAC-SHA-1, HMAC-SHA-256)

Keyed hashing services and software integrity test

FCS_TLSC_EXT.1

FCS_TLSS_EXT.2

FCS_HTTPS_EXT.1

FCS_COP.1(1)

FCS_COP.1(4)

Byte Oriented


3080
2959

DRBG

Deterministic random bit generation services in accordance with ISO/IEC 18031:2011

FCS_TLSC_EXT.1

FCS_TLSS_EXT.2

FCS_HTTPS_EXT.1

FCS_RBG_EXT.1

CTR_DRBG (AES 256)


1570
1446

RSA

Signature Verification and key transport

FCS_TLSC_EXT.1

FCS_TLSS_EXT.2

FCS_HTTPS_EXT.1

FCS_CKM.1

FCS_CKM.2

FCS_COP.1(2)

FIPS PUB 186-4 Key Generation (2048-bit key)


2538
2440

CAVP Certificate References 

Identification and Authentication

All Administrators wanting to use TOE services are identified and authenticated prior to being allowed access to any of the services other than the display of the warning banner.  (“Regular” IPX users do not access IPX directly; they control IP video switching through the IPX using a switch control system, such as Evertz’ Magnum. The switching of those IP video transport stream is outside the scope of the TOE.) Once an Administrator attempts to access the management functionality of the TOE, the TOE prompts the Administrator for a user name and password for password-based authentication. The identification and authentication credentials are confirmed against a local user database. Only after the Administrator presents the correct identification and authentication credentials will access to the TOE functionality be granted.  The TOE uses X.509v3 certificates as defined by RFC 5280 to support authentication for TLS/HTTPS connections.

The TOE provides the capability to set password minimum length rules. This is to ensure the use of strong passwords in attempts to protect against brute force attacks. The TOE also accepts passwords composed of a variety of characters to support complex password composition.  During authentication, no indication is given of the characters composing the password.

Security Management

The TOE provides secure administrative services for management of general TOE configuration and the security functionality provided by the TOE. All TOE administration occurs either through a secure session or a local console connection. The TOE provides the ability to perform the following actions:

·         Administer the TOE locally and remotely

·         Configure the access banner

·         Configure the cryptographic services

·         Update the TOE and verify the updates using digital signature capability prior to installing those updates

·         Specify the time limits of session inactivity

All of these management functions are restricted to an Administrator, which covers all administrator roles. Administrators are individuals who manage specific type of administrative tasks. In IPX only the only admin role exists, since there is no provision for “regular” users to access IPX directly (as described above), and the portion of IPX they access and control are outside the scope of the TOE.

Primary management is done using the Webeasy web-based interface using HTTPS. This provides a network administration console from which one can manage various identity services. These services include authentication, authorization and reporting. All of these services can be managed from the web browser, which uses a menu-driven navigation system.

There is also a very simple serial-based connection (RS-232) that provides a simple menu interface. This is used to configure the IP interface (IP address, etc.).  It is password-protected, and is typically only used once, for initial set-up.

Protection of the TSF

The TOE will terminate inactive sessions after an Administrator-configurable time period. Once a session has been terminated the TOE requires the user to re-authenticate to establish a new session. The TOE provides protection of TSF data (authentication data and cryptographic keys). In addition, the TOE internally maintains the date and time. This date and time is used as the time stamp that is applied to TOE generated audit records. This time is set via an external NTP server. The TOE also ensures firmware updates are from a reliable source. Finally, the TOE performs testing to verify correct operation.

In order for updates to be installed on the TOE, an administrator initiates the process from the web interface. IPX automatically uses the digital signature mechanism to confirm the integrity of the product before installing the update.

TOE Access

Aside from the automatic Administrators session termination due to inactivity describes above, the TOE also allows Administrators to terminate their own interactive session. Once a session has been terminated the TOE requires the user to re-authenticate to establish a new session.

The TOE will display an Administrator-specified banner on the web browser management interface prior to allowing any administrative access to the TOE.

Trusted Paths/Channels

The TOE allows the establishment of a trusted path between a video control system (such as Evertz’ Magnum) and the IPX.   The TOE also establishes a secure connection for sending syslog data to a syslog server using TLS and other external authentication stores using TLS-protected communications.


Vendor Information

Logo
Evertz Microsystems Ltd.
Bruce Mathews
1-877-995-3700
brucemathews@evertz.com

http://www.evertz.com/
Site Map              Contact Us              Home