NIAP: Compliant Product
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - A10 Networks Thunder Series Appliances TH-4435, TH-5840-11, TH-7445, TH-7650-11, TH-7655 with ACOS 5.2.1-P3

Certificate Date:  2023.01.27

Validation Report Number:  CCEVS-VR-VID11316-2023

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 2.2e

CC Testing Lab:  Advanced Data Security


CC Certificate [PDF] Security Target [PDF] Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]


Product Description

The Target of Evaluation (TOE) is A10 Networks, Inc. Thunder-series of network appliances executing A10’s Advanced Core Operating System (ACOS) 5.2.1-P3. A10 Thunder-series appliances are devices to provide organizations with networking services and capabilities including:

·       Application Delivery Control (ADC),

·       Carrier-Grade Networking (CGN),

·       Convergent Firewall (CFW), and

·       SSL Insight (SSLi)

 

The TOE models included in the evaluation are A10 Networks Thunder TH-4435, TH-5840-11, TH-7445, TH-7650-11, and TH-7655 models, all running ACOS version 5.2.1-P3.


Evaluated Configuration


Security Evaluation Summary

The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme for the collaborative Protection Profile for Network Devices. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 release 5. The product, when delivered configured as identified in the guidance document, satisfies all of the security functional requirements stated in the A10 Networks Thunder Series Appliances TH-4435, TH-5840-11, TH-7445, TH-7650-11, TH-7655 with ACOS 5.2.1-P3 Security Target. The evaluation was completed in January 2023. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report.


Environmental Strengths

The figure below depicts the logical scope of the TOE:

 

The TOE supports the following functionality:

·       Security Audit

·       Cryptographic Support

·       Identification and Authentication

·       Security Management

·       Protection of the TSF

·       TOE Access

·       Trusted Path/Channels


Vendor Information


A10 Networks, Inc.
Joseph R. Maixner
1-408-398-1466
1-408-325-8666
jmaixner@a10networks.com

https://www.a10networks.com/
Site Map              Contact Us              Home