{"product_id":10020,"v_id":10020,"product_name":"DataPower XS40 XML Security Gateway and X150 Appliance Version 3.6","certification_status":"Not Certified","certification_date":"2008-12-30T00:12:00Z","tech_type":"Firewall","vendor_id":{"name":"DataPower Technology, Inc. a wholly owned subsidiary of IBM Corporation","website":"http://www.datapower.com/"},"vendor_poc":"Bruce Burdumy, Director, Product Management","vendor_phone":"914-766-1655","vendor_email":"Bburdumy@us.ibm.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p>The TOE is the IBM DataPower XS40 XML Security Gateway and the XI50 Integration Appliance, version 3.6 (XS40 and XI50), developed by DataPower Technology, Inc. of Cambridge, MA. DataPower is a wholly-owned subsidiary of IBM.&nbsp; The XS40 and XI50 are network devices that provide Application-Level Firewall functionality.&nbsp; They are hardware enforcement points for Application-Level Firewall policies.&nbsp; The TOE boundary is the hardware appliance and includes the OS and router application software loaded on the appliance.&nbsp; The XS40 and XI50 are separate products, but from the TOE viewpoint are identical when configured in the evaluated configuration.</p>\r\n<p>The TOE is a special-purpose device that serves as an HTTP-based proxy for one or more backend enterprise services. As such, an important function of the TOE is transformation of an incoming URL into a URL appropriate for the desired backend service and/or transformation of one or more HTTP message header fields. The TOE also provides the typical firewall services of blocking messages from undesired subject addresses, and throttling messages.</p>\r\n<p>The TOE allows administrators to set firewall policies based on</p>\r\n<ul>\r\n<li>Presumed address of the source subject</li>\r\n<li>Presumed address of the destination subject</li>\r\n<li>Transport layer protocol</li>\r\n<li>Interface on which traffic arrives and departs</li>\r\n<li>Service (expressed as a URL)</li>\r\n</ul>\r\n<p>The TOE also allows administrators to set firewall policies based on HTTP header values (with HTTP considered as an application protocol; TCP is the transport protocol).</p>\r\n<p>The TOE does not allow any information flow through it except under administrative directive. The default policy is \"no traffic flow\".</p>\r\n<p>The TOE will not accept any malformed (i.e. deviating from specification) messages. All layers in the communications protocol stack are validated for correctness. Management must be performed locally using a management interface that is included in the Target of Evaluation (TOE).</p>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The evaluation demonstrated that the OE meets the security requirements contained in the Security Target.  The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 2.3. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 2.3.  Science Application International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the TOE is EAL 4 augmented with ALC_FLR.1.  The TOE, configured as specified in the secure deployment guide, satisfies all of the security functional requirements stated in the Security Target.  Several validators on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC.  The evaluation was completed in November 2008.  Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report for IBM DataPower XS40 XML Security Gateway and the XI50 Integration Appliance, version 3.6 (XS40 and XI50) prepared by CCEVS.</p>","environmental_strengths":"<p>The is a specialized configuration of an application firewall as defined in the U.S. Department of Defense Application-level Firewall Protection Profile for Basic Robustness Environments.  It limits traffic to correctly formed HTTP over TCP/IP and filters traffic according to administrator defined policies.</p>","features":[]}