Compliant Product - Junos OS 18.3R1-S2 for MX80, MX104, MX240, MX480, and MX960 with MICMACSEC-20G
Certificate Date: 2019.12.16CC Certificate Security Target Validation Report
Validation Report Number: CCEVS-VR-VID10999-2019
Product Type: Network Device
Conformance Claim: Protection Profile Compliant
PP Identifier: collaborative Protection Profile for Network Devices Version 2.1
Extended Package for MACsec Ethernet Encryption Version 1.2
CC Testing Lab: Acumen Security
The Target of Evaluation (TOE) is Juniper Networks, Inc. Junos OS 18.3R1-S2 executing on MX-Series 3D Universal Edge Routers with MACsec Line Cards. The supported chassis are:
The supported next generation Routing Engines employed by the MX-Series Router are:
· RE-MX80 for MX80
· RE-MX104 for MX104
· RE-S-X6-64G and RE-S-X6-128G for MX240, MX480 and MX960
The following line cards are supported for deployment in the TOE:
· MPC MX-MPC1E-3D
· MPC MX-MPC1E-3D-Q
· MPC MX-MPC2E-3D
· MPC MX-MPC2E-3D-Q
· MPC MPC2E-3D-NG-Q
· MPC MX-MPC3E-3D
· MPC MPC3E-3D-NG
· MPC MPC3E-3D-NG-Q
· MPC MPC2E-3D-NG
The following MIC was tested as part of the evaluated configuration:
· MIC-MACSEC-20G inserted into the MPC MPC2E-3D-NG line card in the MX-240 series router
NOTE: For the MX240, MX480 and MX960 devices, the MIC-MACSEC-20G must be inserted into the line cards as listed above. For the MX80 and MX104 the MIC-MACSEC-20G must be inserted directly into the chassis. The MIC-MACSEC-20G implements all MACSEC functionality. The line cards listed above do not have any cryptographic functionality.
Each of the MX-Series appliances is a secure network device that protects itself largely by offering only a minimal logical interface to the network and attached nodes. All MX-Series platforms are powered by the Junos OS software, Junos OS 18.3R1-S2, which is a special purpose OS that provides no general purpose computing capability. Junos OS provides both management and control functions as well as all IP routing.
The MX-Series appliances primarily support the definition of, and enforce, information flow policies among network nodes. All information flow from one network node to another passes through an instance of the TOE. Information flow is controlled on the basis of network node addresses and protocol. In support of the information flow security functions, the TOE ensures that security-relevant activity is audited, and provides the security tools to manage all of the security functions.
Security Evaluation Summary
The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Junos OS 18.3R1-S2 for MX80, MX104, MX240, MX480, and MX960 with MIC-MACSEC-20G is evaluated as described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 5. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 5. Acumen Security determined that the evaluation is a collaborative Protection Profile for Network Devices (NDcPP) Version 2.1 and Network Device collaborative Protection Profile (NDcPP) Extended Package MACsec Ethernet Encryption (MACSECEP) Version 1.2. The product, when delivered configured as identified in the Operational User Guidance and Preparative Procedures, satisfies all of the security functional requirements stated in the Security Target. The project underwent CCEVS Validator review. The evaluation was completed in December 2019. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.
The logical boundary of the TOE includes those security functions implemented exclusively by the TOE.
Juniper Networks, Inc.