Compliant Product - Nokia 7x50 SR OS 20.10.R4 for 7750 SR-1, 7750 SR-1s, 7750 SR- 2s, 7750 SR-7s, 7750 SR-14s, 7950 XRS-20, 7950 XRS-16c, 7450 ESS, and 7750 SR-1e
Certificate Date:
2021.10.21
CC Certificate
Security Target
*
Validation Report
Validation Report Number: CCEVS-VR-VID11183-2021 Product Type: Network Device Conformance Claim: Protection Profile Compliant PP Identifier: collaborative Protection Profile for Network Devices Version 2.2e CC Testing Lab: Acumen Security Maintenance Release: Assurance Activity Administrative Guide
*
This is the Security Target (ST) associated with the latest Maintenance Release.
To view previous STs for this TOE, click here.
Product Description
The TOE portfolio delivers high-performance, scaling and flexibility to support a full array of IP and MPLS services and functions for service provider, web scale and enterprise networks. The 7750 SR family includes a wide range of physical platforms that share a mutual architecture and feature set. This allows Nokia customers to select the platform that best addresses their unique business goals and fulfills their scale, density, space, power, and value-added service requirements without compromising on quality or features. The 7750 series are chassis-based routers. The TOE supports a full array of network functions and services, achieving scale and efficiency without compromising versatility. It provides highly available service delivery mechanisms that maximize network stability and minimize service interruptions. Every Nokia 7750 series routing appliance is a whole routing system that provides a variety of high-speed interfaces (only Ethernet is within scope of this evaluation) for various scale of networks and various network applications. The TOE utilizes a common Nokia SR OS firmware, features, and technology for compatibility across all platforms. Nokia SR OS firmware is mainly responsible for all the functionalities and services provided by the routers. The routers can be accessed either via a local console or via a network connection that is protected using the SSH protocol. Each time a user accesses the routers, either via local console terminal connection or from the network remotely using SSH, the user must successfully authenticate with the correct credentials.
Evaluated Configuration
The TOE is comprised of the following models: Table 2 –TOE Physical Boundary Components
Figure 1 depicts the TOE boundary: Figure 1 – TOE Boundary Diagram In the evaluated configuration, the TOE consists of one of the platforms identified above. The TOE supports secure connectivity with another IT environment device as stated in Table 3: Table 3 – IT Environment Components
The TOE boundary is the hardware appliance, which is comprised of hardware and software components. It is deployed in an environment that contains the various IT components as depicted in Figure 1 above. The TOE guidance documentation is included on this website.
Security Evaluation Summary
The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the NOKIA 7X50 SR OS 20.10.R4 FOR 7750 SR-1, 7750 SR-1S, 7750 SR- 2S, 7750 SR-7S, 7750 SR-14S, 7950 XRS-20, 7950 XRS-16C, 7450 ESS, AND 7750 SR-1E were evaluated are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 5. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 5. Acumen Security determined that the evaluation assurance level (EAL) for the product is EAL 1. The product, when delivered configured as identified in the Nokia 7x50 SR OS 20.10.R1 Guidance Document, satisfies all of the security functional requirements stated in the NOKIA 7X50 SR OS 20.10.R4 FOR 7750 SR-1, 7750 SR-1S, 7750 SR- 2S, 7750 SR-7S, 7750 SR-14S, 7950 XRS-20, 7950 XRS-16C, 7450 ESS, AND 7750 SR-1E Security Target. The project underwent CCEVS Validator review. The evaluation was completed in October 2021. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.
Environmental Strengths
The TOE implements the following security functional requirements: • Security Audit • Cryptographic Support • Identification and Authentication • Security Management • Protection of the TSF • TOE Access • Trusted Path/Channels
Each of these security functionalities are listed in more detail in the sections below. The TOE generates audit events for all start-up and shut-down functions and all auditable events as specified in Table 15 of the Security Target. Audit events are also generated for management actions specified in FAU_GEN.1. The TOE is capable of storing audit events locally and exporting them to an external audit server using HTTP PUT requests over TLS v1.2 protocol. Each audit record contains the date and time of event, type of event, subject identity, and the relevant data of the event. The audit server supports the following severity levels: indeterminate (info), major, and minor. The TOE provides cryptographic support for the services described in Table 3 below.The related CAVP validation details are provided in Table 4. The operating system is SR OS 20.10.R4. The TOE leverages OpenSSL v1.1.1g for its cryptographic functionality. Table 3 – TOE Cryptography Implementation
Table 4 – CAVP Algorithm Testing References
Identification and Authentication All users must be authenticated to the TOE prior to carrying out any management actions. The TOE supports password-based authentication and public key-based authentication. Based on the assigned role, a user is granted a set of privileges to access the system. The TOE supports local and remote management of its security functions including:
Prior to establishing an administration session with the TOE, a banner is displayed to the user. The banner messaging is customizable. The TOE will terminate an interactive session after configurable number of minutes of session inactivity. A user can terminate their local CLI session and remote CLI session by entering the appropriate command at the prompt. The TOE protects all passwords, pre-shared keys, symmetric keys, and private keys from unauthorized disclosure. Pre-shared keys, symmetric keys, and private keys are stored in encrypted format. Passwords are stored as a non-reversible hash value as per standard Linux approach. The TOE executes self-tests during initial start-up to ensure correct operation and enforcement of its security functions. An administrator can install software updates to the TOE. The TOE internally maintains the date and time. The TOE supports HTTPS PUT requests over TLS v1.2 for secure communication to the audit server. The TOE supports TLS v1.2 for secure communication to LDAP server. The TOE supports local CLI and uses SSH v2 for secure remote administration. Vendor InformationNokia Corporation Hooman Bidgoli 8665823688 N/A hooman.bidgoli@nokia.com www.nokia.com |