NIAP: Compliant Product
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - Nokia 7705 SAR Series with SAR OS 21.10R5

Certificate Date:  2023.09.29

Validation Report Number:  CCEVS-VR-VID11353-2023

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 2.2e

CC Testing Lab:  Acumen Security


CC Certificate [PDF] Security Target [PDF] Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide: NOKIA 7705 SERVICE AGGREGATION ROUTER | RELEASE 21.10R5 Common Criteria Admin Guide [PDF]

Administrative Guide: 7705 SERVICE AGGREGATION ROUTER | RELEASE 21.10.R1 Basic System Configuration Guide [PDF]

Administrative Guide: 7705 SERVICE AGGREGATION ROUTER | RELEASE 21.10.R1 Interface Configuration Guide [PDF]

Administrative Guide: 7705 SERVICE AGGREGATION ROUTER | RELEASE 21.10.R1 Log Events Guide [PDF]

Administrative Guide: 7705 SERVICE AGGREGATION ROUTER | RELEASE 21.10.R1 Router Configuration Guide [PDF]

Administrative Guide: 7705 SERVICE AGGREGATION ROUTER | RELEASE 21.10.R1 Services Guide [PDF]

Administrative Guide: 7705 SERVICE AGGREGATION ROUTER | RELEASE 21.10.R1 System Management Guide [PDF]


Product Description

The Nokia 7705 SAR Series with SAR OS 21.10R5, the Target of Evaluation (TOE), is a network device that is composed of hardware and software and offers a scalable solution to the end users. It satisfies all of the criterion to meet the collaborative Protection Profile for Network Devices, Version 2.2e [NDcPP v2.2e]. The TOE is a physical, non-distributed network device implementing networking functions essential for service adaptation, aggregation and routing over Ethernet and Internet Protocol routing infrastructure. The primary scenario of deployment is for mobile backhaul, fixed to mobile convergence, mission-critical applications, and enterprise applications.

 

The TOE supports secure connectivity with another IT environment device as stated in Table 1.

 

Table 1 – Required Environmental Components

Components

Required (Y/N)

Usage

Local Management Station

Yes

A management station connected to the TOE from the console used for administering the TOE locally.

Remote Management Station

Yes

A management station connected to the TOE over a network connection, used for administering the TOE remotely over SSH.

SSH Client

Yes

The Remote Management Station must run an SSH client which the remote administrator may use for establishing a secure connection between the Remote Management Station and the TOE.

CA/CRL Server

Yes

A server with a certification authority and certificate revocation list used by the TOE for validating the X.509 certificates used for IKE and IPsec connection establishment.

AAA Server

Yes

A server implementing RADIUS and TACACS+ which the TOE may be configured to use for external authentication of users.

Syslog Server

Yes

A Server to which the TOE may be configured to forward audit log files.

Update Server

Yes

A Server hosting the TOE Software Upgrades. The Administrator may connect to the server and download upgrades for the TOE Software.


Evaluated Configuration


Security Evaluation Summary

The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Nokia 7705 SAR Series with SAR OS 21.10R5 was evaluated are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 5.  The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 5.  The product, when delivered configured as identified in multiple admin guides listed below, satisfies all of the security functional requirements stated in the Nokia 7705 SAR Series with SAR OS 21.10R5 Security Target.

 

Admin Guide Title

Version

Date

NOKIA 7705 SERVICE AGGREGATION ROUTER | RELEASE 21.10R5 Common Criteria Admin Guide

1.0

May 15, 2023

NOKIA 7705 SERVICE AGGREGATION ROUTER | RELEASE 21.10R1 Basic System Configuration Guide

01

October 2021

NOKIA 7705 SERVICE AGGREGATION ROUTER | RELEASE 21.10R1 Interface Configuration Guide

01

October 2021

NOKIA 7705 SERVICE AGGREGATION ROUTER | RELEASE 21.10R1 Log Events Guide

01

October 2021

NOKIA 7705 SERVICE AGGREGATION ROUTER | RELEASE 21.10R1 Router Configuration Guide

01

October 2021

NOKIA 7705 SERVICE AGGREGATION ROUTER | RELEASE 21.10R1 Services Guide

01

October 2021

NOKIA 7705 SERVICE AGGREGATION ROUTER | RELEASE 21.10R1 System Management Guide

01

October 2021

 _________________________________________________________________________________________________

The project underwent CCEVS Validator review.  The evaluation was completed in September 2023.  Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.


Environmental Strengths

The TOE implements the following security functional requirements:

·       Security Audit

·       Cryptographic Support

·       Identification and Authentication

·       Security Management

·       TOE Access

·       Protection of the TSF

·       Trusted Path/Channels

Each of these security functionalities are listed in more detail in the sections below.

Security Audit

The TOE generates audit events for all start-up and shut-down functions and all auditable events as specified in Table 15. Audit events are also generated for management actions specified in FAU_GEN.1. The TOE is capable of storing audit events locally and exporting them to an external audit server over IPsec protocol. Each audit record contains the date and time of event, type of event, subject identity, and the relevant data of the event. The audit server supports the following severity levels: indeterminate (info), major, and minor.

Cryptographic Support

The TOE provides cryptography in support of SSH and IPSEC trusted communications. The following table identifies the cryptographic services per cryptographic library.

 

SFR

Algorithm in ST

Implementation name

CAVP Alg.

CAVP Cert #

FCS_CKM.1

RSA schemes using cryptographic key sizes of 2048-bit or greater that meet the following: FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.3

Nokia 7705 SAR OS Cryptographic library

RSA KeyGen (FIPS186-4)

C2023

 

Nokia 7705 SAR OS Cryptographic library

C2024

FFC Schemes using ‘safe-prime’ groups that meet the following: “NIST Special Publication 800-56A Revision 3, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography” and [RFC 3526]

Nokia 7705 SAR OS Cryptographic library

Safe Primes Key Generation

Safe Primes Key Verification

A3133

Nokia 7705 SAR OS Cryptographic library

Safe Primes Key Generation

Safe Primes Key Verification

A3134

FCS_CKM.2

RSA-based key establishment schemes that meet the following: RSAES-PKCS1-v1_5 as specified in Section 7.2 of RFC 3447, “Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1”

Nokia 7705 SAR OS Cryptographic library

None

CCTL tested as per the PP/SD Evaluation Activities

FFC Schemes using “safe-prime” groups that meet the following: ‘NIST Special Publication 800- 56A Revision 3, “Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography” and [RFC 3526]

Nokia 7705 SAR OS Cryptographic library

KAS-FFC-SSC Sp800-56Ar3

A3133

Nokia 7705 SAR OS Cryptographic library

KAS-FFC-SSC Sp800-56Ar3

A3134

FCS_COP.1/ DataEncryption

AES used in [CBC, CTR] mode and cryptographic key sizes [128 bits, 192 bits, 256 bits]

Nokia 7705 SAR OS Cryptographic library

AES-CBC

AES-CTR

C2023

Nokia 7705 SAR OS Cryptographic library

C2024

FCS_COP.1/ SigGen

For RSA schemes: FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 5.5, using PKCS #1 v2.1 Signature Schemes RSASSA-PSS and/or RSASSA-PKCS1v1_5; ISO/IEC 9796-2, Digital signature scheme 2 or Digital Signature scheme 3

Nokia 7705 SAR OS Cryptographic library

RSA SigGen (FIPS186-4)

RSA SigVer (FIPS186-4)

C2023

Nokia 7705 SAR OS Cryptographic library

C2024

FCS_COP.1/ Hash

[SHA-1, SHA-256, SHA-384, SHA-512] and message digest sizes [160, 256, 384, 512] bits

Nokia 7705 SAR OS Cryptographic library

SHS

C2023

Nokia 7705 SAR OS Cryptographic library

C2024

FCS_COP.1/ KeyedHash

[HMAC-SHA-1, HMAC-SHA- 256, HMAC-SHA-384, HMAC-SHA-512] and cryptographic key sizes [160-bits, 256-bits, 384-bits, 512-bits] and message digest sizes [160, 256, 384, 512] bits

Nokia 7705 SAR OS Cryptographic library

HMAC-SHA-1

HMAC-SHA-256

HMAC-SHA-384

HMAC-SHA-512

C2023

Nokia 7705 SAR OS Cryptographic library

C2024

FCS_RBG_EXT.1

CTR_DRBG (AES)

Nokia 7705 SAR OS Cryptographic library

Counter DRBG

C2023

Nokia 7705 SAR OS Cryptographic library

C2024

 

Identification and Authentication

The TOE supports Role Based Access Control. All users must be authenticated to the TOE prior to carrying out any management actions. The TOE supports password-based authentication and public key-based authentication. Based on the assigned role, a user is granted a set of privileges to access the system.

Security Management

The TOE supports local and remote management of its security functions including:

  • Local console CLI administration 
  • Remote CLI administration via SSHv2 
  • Timed user lockout after multiple failed authentication attempts
  • Password configurations
  • Role Based Access Control
  • Configurable banners to be displayed at login
  • Timeouts to terminate administrative sessions after a set period of inactivity
  • Protection of secret keys and passwords

TOE Access

Prior to establishing an administration session with the TOE, a banner is displayed to the user. The banner messaging is customizable. The TOE will terminate an interactive session after configurable number of minutes of session inactivity. A user can terminate their local CLI session and remote CLI session by entering the appropriate command at the prompt.

Protection of the TSF

The TOE protects all passwords, pre-shared keys, symmetric keys, and private keys from unauthorized disclosure. Pre-shared keys, symmetric keys, and private keys are stored in encrypted format. Passwords are stored as a non-reversible hash value as per standard Linux approach. The TOE executes self-tests during initial start-up to ensure correct operation and enforcement of its security functions. An administrator can install software updates to the TOE. The TOE internally maintains the date and time.

Trusted Path/Channels

The TOE supports IPsec for secure communication to the audit server and with the authentication server. The termination points of the IPsec are the TOE and another IPsec implementation. The TOE supports local CLI and uses SSH v2 for secure remote administration.


Vendor Information


Nokia Corporation
Hooman Bidgoli
866-582-3688
N/A
hooman.bidgoli@nokia.com

https://www.nokia.com/
Site Map              Contact Us              Home