NIAP: Compliant Product
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - Cisco Aggregation Services Router 9000

Certificate Date:  2018.04.17

Validation Report Number:  CCEVS-VR-VID10844-2018

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 2.0 + Errata 20180314
  Extended Package for MACsec Ethernet Encryption Version 1.2

CC Testing Lab:  Acumen Security


CC Certificate [PDF] Security Target [PDF] Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]


Product Description

The Cisco ASR 9k is a scalable carrier-class distributed forwarding router, which is designed for redundancy, high security and availability, packaging, power, and other requirements needed by service providers. The ASR9k is designed to provide continuous system operation, scalability, security, and high performance.

The ASR9k router runs IOS-XR that is a distributed microkernel based network operating system. The microkernel is based on QNX Neutrino which is a real-time operating system (RTOS). IOS-XR is able to process data as it comes into the router without buffering delays. The microkernel is responsible for specific functions such as memory management, interrupt handling, scheduling, task switching, synchronization, and inter-process communication. The microkernel's functions do not include other system services such as device drivers, file system, and network stacks; those services are implemented as independent processes outside the kernel, and they can be restarted like any other application.


Evaluated Configuration


Security Evaluation Summary

The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Cisco Aggregation Services Router 9000 Series was evaluated are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 5.  The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 4.  Acumen Security determined that the evaluation assurance level (EAL) for the product is EAL 1.  The product, when delivered configured as identified in the AGD, satisfies all of the security functional requirements stated in the Security Target. The project underwent CCEVS Validator review.  The evaluation was completed in April 2018.  Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.


Environmental Strengths

Security Audit

The Cisco Aggregation Services Router 9000 provides extensive auditing capabilities. The TOE can audit events related to cryptographic functionality, identification and authentication, and administrative actions.  The Cisco Aggregation Services Router 9000 generates an audit record for each auditable event.  Each security relevant audit event has the date, timestamp, event description, and subject identity.  The administrator configures auditable events, performs back-up operations, and manages audit data storage.  The TOE provides the administrator with a circular audit trail or a configurable audit trail threshold to track the storage capacity of the audit trail.  Audit logs are backed up over an encrypted channel to an external audit server.

Cryptographic Support

The TOE provides cryptography in support of other Cisco ASR 9k security functionality.  This cryptography has been validated for conformance to the requirements of FIPS 140-2 Level 2. The entropy source provides 256 bits of entropy used to seed the RNG.  After cryptographic keys are used, they are zeroized.  Cisco FIPS Object Module (Software Version: 6.0) cert #2505.  The FOM 6.0 module resides in the IOS-XR software. The TOE authenticates and encrypts packets between itself and a MACsec peer.  The MACsec Key Agreement (MKA) Protocol provides the required session keys and manages the required encryption keys to protect data exchanged by the peers.

Identification and authentication

The TOE provides authentication services for administrative users wishing to connect to the TOEs secure CLI administrator interface.  The TOE requires Authorized Administrators to authenticate prior to being granted access to any of the management functionality.  The TOE can be configured to require a minimum password length of 15 characters as well as mandatory password complexity rules. 

After a configurable number of incorrect login attempts, ASR9k will lockout the account until a configured amount of time for lockout expires. 

The TOE provides administrator authentication against a local user database.  Password-based authentication can be performed on the serial console or SSH interfaces.  The SSHv2 interface also supports authentication using SSH keys.  The TOE optionally supports use of a RADIUS or TACACS+ AAA server (part of the IT Environment) for authentication of administrative users attempting to connect to the TOE’s CLI.

Security Management

The TOE provides secure administrative services for management of general TOE configuration and the security functionality provided by the TOE.  All TOE administration occurs either through a secure SSHv2 session or via a local console connection.  The TOE provides the ability to securely manage all TOE administrative users; all identification and authentication; all audit functionality of the TOE; all TOE cryptographic functionality; the timestamps maintained by the TOE; updates to the TOE; and TOE configuration file storage and retrieval.  The TOE supports two separate administrator roles: non-privileged administrator and privileged administrator.  Only the privileged administrator can perform the above security relevant management functions.

When an administrative session is initially established, the TOE displays an administrator- configurable warning banner.  This is used to provide any information deemed necessary by the administrator.  After a set amount of time of inactivity, the administrator will be locked out of the administrator interface.

Protection of the TSF

The TOE protects against interference and tampering by untrusted subjects by implementing identification, authentication, and access controls to limit configuration to Authorized Administrators.  The TOE prevents reading of cryptographic keys and passwords. 

Additionally, Cisco IOS-XR is not a general-purpose operating system and access to Cisco IOS-XR memory space is restricted to only Cisco IOS-XR functions.

Use of separate VLANs is used to ensure routing protocol communications between the TOE and neighbor routers including routing table updates and neighbor router authentication will be logically isolated from traffic on other VLANs.

The TOE is also able to detect replay of information received via secure channels (MACsec).  The detection applied to network packets that terminate at the TOE, such as trusted communications between the TOE and an IT entity (e.g., MACsec peer).  If replay is detected, the packets are discarded.

The TOE internally maintains the date and time.  This date and time is used as the timestamp that is applied to audit records generated by the TOE.  Administrators can update the TOE’s clock manually, or can configure the TOE to use NTP to synchronize the TOE’s clock with an external time source.  Finally, the TOE performs testing to verify correct operation of the router itself and that of the cryptographic module.

The TOE is able to verify any software updates prior to the software updates being installed on the TOE to avoid the installation of Authorized Administrator software.

TOE Access

The TOE can terminate inactive sessions after an Authorized Administrator configurable time-period.  Once a session has been terminated the TOE requires the user to re-authenticate to establish a new session. 

The TOE can also display an Authorized Administrator specified banner on the CLI management interface prior to allowing any administrative access to the TOE.

Trusted path/Channels

The TOE establishes a trusted path between the appliance and the CLI using SSHv2 with the syslog server using MACsec.  MACsec can also be used to secure channel at Layer 2.


Vendor Information

Logo
Cisco Systems, Inc.
Marek Radomski
4103094862
certteam@cisco.com

www.cisco.com
Site Map              Contact Us              Home