NIAP: Compliant Product
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - Cisco Network Convergence System 5500 Series (NCS5500)

Certificate Date:  2019.04.05

Validation Report Number:  CCEVS-VR-VID10948-2019

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 2.0 + Errata 20180314
  Extended Package for MACsec Ethernet Encryption Version 1.2

CC Testing Lab:  Acumen Security


CC Certificate [PDF] Security Target [PDF] Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]


Product Description

The Cisco Network Convergence System 5500 Series TOE (referred to as Cisco NCS5500 or NCS5500) IOS-XR version 6.3, equipped with the MACsec supporting hardware NC55-36X100G-S MACsec line card is a purpose-built, routing platform that’s primarily used for WAN aggregation.


Evaluated Configuration


Security Evaluation Summary

The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Cisco Network Convergence System 5500 Series (NCS5500) is evaluated are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 5.  The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 5. Acumen Security determined that the evaluation is a collaborative Protection Profile for Network Devices (NDcPP) + Errata 20180314, Version 2.0e and Network Device collaborative Protection Profile (NDcPP) Extended Package MACsec Ethernet Encryption (MACSECEP) 1.2 20160510. The product, when delivered configured as identified in the Operational User Guidance and Preparative Procedures, satisfies all the security functional requirements stated in the Security Target. The project underwent CCEVS Validator review.  The evaluation was completed in April 2019.  Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.


Environmental Strengths

The logical boundary of the TOE includes those security functions implemented exclusively by the TOE.

Cryptographic Support

The TOE provides cryptography in support of other NCS5500 security functionality.  NCS5500 uses the CiscoSSL FIPS Object Module (FOM) v6.0 crypto library, which resides in the IOS-XR 6.3 software, as its cryptographic module. NCS5500 models use the ACT-2 hardware chip for entropy.  Entropy data is provided to the TOE for cryptographic function from ACT-2 via /dev/urandom. The entropy source provides 256 bits of entropy used to seed the RNG. The TOE implements the secure protocol - SSH. The TOE provides cryptography in support of remote administrative management via SSHv2 and secures the session between the NCS5500 and remote syslog server using MACsec. The TOE authenticates and encrypts packets between itself and a MACsec peer.  The MACsec Key Agreement (MKA) Protocol provides the required session keys and manages the required encryption keys to protect data exchanged by the peers.

 

Identification and Authentication

The TOE provides authentication services for administrative users wishing to connect to the TOEs secure CLI administrator interface.  The TOE requires Authorized Administrators to authenticate prior to being granted access to any of the management functionality.  The TOE can be configured to require a minimum password length of 15 characters as well as mandatory password complexity rules. 

After an administratively configurable number of incorrect login attempts, NCS5500 will lockout the account until a configured amount of time for lockout expires. 

The TOE provides administrator authentication against a local user database.  Password-based authentication can be performed on the serial console or SSH interfaces.  The SSHv2 interface also supports authentication using SSH keys.

 

Security Management

The TOE provides secure administrative services for management of general TOE configuration and the security functionality provided by the TOE.  All TOE administration occurs either through a secure SSHv2 session or via a local console connection.  The TOE provides the ability to securely manage all TOE administrative users; all identification and authentication; all audit functionality of the TOE; all TOE cryptographic functionality; the timestamps maintained by the TOE; updates to the TOE; and TOE configuration file storage and retrieval.  The TOE supports two separate administrator roles: non-privileged administrator and privileged administrator.  Only the privileged administrator can perform the above security relevant management functions.

When an administrative session is initially established, the TOE displays an administrator- configurable warning banner.  This is used to provide any information deemed necessary by the administrator.  After a set amount of time of inactivity, the administrator will be locked out of the administrator interface. 

 

Protection of the TSF

The TOE protects against interference and tampering by untrusted subjects by implementing identification, authentication, and access controls to limit configuration to Authorized Administrators.  The TOE prevents reading of cryptographic keys and passwords. 

Additionally, Cisco IOS-XR is not a general-purpose operating system and access to Cisco IOS-XR memory space is restricted to only Cisco IOS-XR functions.

Use of separate VLANs is used to ensure routing protocol communications between the TOE and neighbor routers including routing table updates and neighbor router authentication will be logically isolated from traffic on other VLANs.

The TOE is also able to detect replay of information received via secure channels (MACsec).  The detection applied to network packets that terminate at the TOE, such as trusted communications between the TOE and an IT entity (e.g., MACsec peer).  If replay is detected, the packets are discarded.

The TOE internally maintains the date and time.  This date and time is used as the timestamp that is applied to audit records generated by the TOE.  Administrators can update the TOE’s clock manually.  Finally, the TOE performs testing to verify correct operation of the router itself and that of the cryptographic module.

The TOE can verify any software updates prior to the software updates being installed on the TOE to avoid the installation of Authorized Administrator software.

 

TOE Access

The TOE can terminate inactive sessions after an Authorized Administrator configurable time-period.  Once a session has been terminated the TOE requires the user to re-authenticate to establish a new session. 

The TOE can also display an Authorized Administrator specified banner on the CLI management interface prior to allowing any administrative access to the TOE.

 

Trusted Path/Channels

The TOE establishes a trusted path between the appliance and the CLI using SSHv2 with the syslog server using MACsec by securing the channel at Layer 2.


Vendor Information

Logo
Cisco Systems, Inc.
Cert Team
410-309-4862
certteam@cisco.com

www.cisco.com
Site Map              Contact Us              Home