{"product_id":10301,"v_id":10301,"product_name":"Juniper Networks Security Appliances (Netscreen  Models ISG 1000, ISG 2000, NS5200, and NS5400 with Firmware Version 6.2.0r3a; Secure Services Gateway Models SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M, and SSG550M with Firmware Version 6.2.0r3).","certification_status":"Not Certified","certification_date":"2010-03-26T00:03:00Z","tech_type":"Firewall, Virtual Private Network","vendor_id":{"name":"HPE Juniper Networking","website":"https://www.juniper.net"},"vendor_poc":"Tim Huntley","vendor_phone":"408-936-2817","vendor_email":"thuntley@juniper.net","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p class=\"Body\">The Target of Evaluation (TOE) is Juniper Networks Security Appliances, a line of integrated security network devices combining firewall, virtual private networking (VPN), and traffic management functions. The TOE consists of one or more of the following security appliances running the specified ScreenOS firmware version:</p>\r\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\r\n<tbody>\r\n<tr>\r\n<td width=\"319\">\r\n<p><strong>Product</strong></p>\r\n</td>\r\n<td width=\"168\">\r\n<p><strong>Part Numbers</strong></p>\r\n</td>\r\n<td width=\"120\">\r\n<p><strong>Firmware Version</strong></p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"319\">\r\n<p>Juniper Networks NetScreen ISG 1000<strong></strong></p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<p>NS-ISG-1000,</p>\r\n<p>NS-ISG-1000-DC,</p>\r\n<p>NS-ISG-1000B,</p>\r\n<p>NS-ISG-1000B-DC</p>\r\n</td>\r\n<td width=\"120\">\r\n<p>6.2.0r3a</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"319\">\r\n<p>Juniper Networks NetScreen ISG 2000</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<p>NS-ISG-2000,</p>\r\n<p>NS-ISG-2000-DC,</p>\r\n<p>NS-ISG-2000B,</p>\r\n<p>NS-ISG-2000B-DC</p>\r\n</td>\r\n<td width=\"120\">\r\n<p>6.2.0r3a</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"319\">\r\n<p>Juniper Networks NetScreen 5200</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<p>NS-5200,</p>\r\n<p>NS-5200-DC</p>\r\n</td>\r\n<td width=\"120\">\r\n<p>6.2.0r3a</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"319\">\r\n<p>Juniper Networks NetScreen 5400</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<p>NS-5400,</p>\r\n<p>NS-5400-DC</p>\r\n</td>\r\n<td width=\"120\">\r\n<p>6.2.0r3a</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"319\">\r\n<p>Juniper Networks SSG5 Secure Services Gateway</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<p>SSG-5-SB,</p>\r\n<p>SSG-5-SH</p>\r\n</td>\r\n<td width=\"120\">\r\n<p>6.2.0r3</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"319\">\r\n<p>Juniper Networks SSG20 Secure Services Gateway</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<p>SSG-20-SB,</p>\r\n<p>SSG-20-SH</p>\r\n</td>\r\n<td width=\"120\">\r\n<p>6.2.0r3</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"319\">\r\n<p>Juniper Networks SSG140 Secure Services Gateway</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<p>SSG-140-SB, SSG-140-SH</p>\r\n</td>\r\n<td width=\"120\">\r\n<p>6.2.0r3</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"319\">\r\n<p>Juniper Networks SSG320M Secure Services Gateway</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<p>SSG-320M-SH,</p>\r\n<p>SSG-320M-SH-N-TAA,</p>\r\n<p>SSG-320M-SH-DC-N-TAA</p>\r\n</td>\r\n<td width=\"120\">\r\n<p>6.2.0r3</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"319\">\r\n<p>Juniper Networks SSG350M Secure Services Gateway</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<p>SSG-350M-SH,</p>\r\n<p>SSG-350M-SH-N-TAA,</p>\r\n<p>SSG-350M-SH-DC-N-TAA</p>\r\n</td>\r\n<td width=\"120\">\r\n<p>6.2.0r3</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"319\">\r\n<p>Juniper Networks SSG520M Secure Services Gateway</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<p>SSG-520M-SH,</p>\r\n<p>SSG-520M-SH-N-TAA,</p>\r\n<p>SSG-520M-SH-DC-N-TAA</p>\r\n</td>\r\n<td width=\"120\">\r\n<p>6.2.0r3</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"319\">\r\n<p>Juniper Networks SSG550M Secure Services Gateway</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<p>SSG-550M-SH,</p>\r\n<p>SSG-550M-SH-N-TAA,</p>\r\n<p>SSG-550M-SH-DC-N-TAA</p>\r\n</td>\r\n<td width=\"120\">\r\n<p>6.2.0r3</p>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<p class=\"Body\">The TOE is administered via a command line interface (CLI). During normal operation, the CLI is accessed remotely over a Secure Shell (SSH) connection. For initial configuration, a device that can emulate a VT-100 terminal is connected directly to the appliance as a local console. Once initial configuration is completed and the TOE is in FIPS mode, the local console remains connected to the TOE only to monitor alarms generated by the TOE. It is not to be used for entering commands. This is described clearly in the administrative guidance documentation provided as part of the TOE.</p>\r\n<div style=\"border: 1px dotted; padding: .25em 1em; margin-top: 1em; background: #eee;\">\r\n<p>VID10301 &ndash; Met the functional requirements of the following PP&rsquo;s:</p>\r\n<ol style=\"list-style-type: lower-alpha;\">\r\n<li>U.S. Government Virtual Private Network (VPN) Boundary Gateway Protection Profile for Medium Robustness Environments, version 1.2, January 30, 2009</li>\r\n<li>U.S. Government Protection Profile for Traffic Filter Firewall for Medium Robustness Environments, version 1.1, July 25, 2007</li>\r\n</ol></div>","evaluation_configuration":null,"security_evaluation_summary":"<p>&nbsp;</p>\r\n<p class=\"Body\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process. The criteria against which the Juniper Networks Security Appliances TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2. The evaluation methodology used by the Evaluation Team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1, Revision 2. Science Applications International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the product is the EAL4 assurance requirements package, augmented with ADV_FSP.5, ADV_INT.3, ADV_TDS.4, ALC_FLR.2 and ATE_DPT.3. The product satisfies all of the security functional requirements stated in the Juniper Networks Security Appliances Security Target, when configured as specified in the Juniper Networks ScreenOS 6.2 Evaluated Configuration for Common Criteria, EAL4.</p>\r\n<p class=\"Body\">A validation team on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC. The evaluation was completed in March 2010. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID10301-2010), prepared by CCEVS.</p>","environmental_strengths":"<p class=\"Body\">Juniper Networks Security Appliances provide a moderate to high level of independently assured security in a conventional TOE and are suitable for generalized environments with a low to medium level of risk to the applicable assets.</p>\r\n<p class=\"Body\">Juniper Networks Security Appliances support the following security functions:</p>\r\n<ul>\r\n<li><strong>Security Audit</strong><strong></strong></li>\r\n</ul>\r\n<p class=\"Body\">Audit data is stored in memory and is separated into three types of logs: events; traffic logs; and self logs. Events are system-level notifications and alarms which are generated by the system to indicate events such as configuration changes, network attacks detected, or administrators logging in or out of the device. Traffic logs are directly driven by policies that allow traffic to go through the device. Self logs store information on traffic that is dropped and traffic that is sent to the device. Logs are protected and a searching/sorting mechanism of these logs is offered to administrators.</p>\r\n<p class=\"Body\">The TOE monitors events and can apply rules to those monitored events to identify potential security violations. If the TOE detects a potential security violation, it displays an alarm at the local console, at remote administrator sessions that currently exist, and at remote administrator sessions that are initiated before the alarm has been acknowledged. Alarms can be configured to be audible.</p>\r\n<ul>\r\n<li><strong>Cryptographic Support</strong><strong></strong></li>\r\n</ul>\r\n<p class=\"Body\">Each of the appliances comprising the TOE has completed FIPS 140-2 SL 2 validation, with SL 3 for the following security requirements: Cryptographic Module Specification; Cryptographic Module Ports and Interfaces; Roles, Services, and Authentication; Cryptographic Key Management; and Design Assurance.</p>\r\n<ul>\r\n<li><strong>User Data Protection</strong><strong></strong></li>\r\n</ul>\r\n<p class=\"Body\">The TOE enforces information flow control policies based on the concept of zones. Security policies are applied to the flow of information from network nodes in one zone to network nodes in other zones. These policies control interzone and intrazone information flows.</p>\r\n<p class=\"Body\">A zone is a logical abstraction on which the TOE provides services that are typically configurable by the administrator. A zone can be a segment of network space to which security measures are applied (a security zone), a logical segment to which a VPN tunnel interface is bound (a tunnel zone), or either a physical or logical entity that performs a specific function (a function zone).</p>\r\n<ul>\r\n<li><strong>Identification and Authentication</strong><strong></strong></li>\r\n</ul>\r\n<p class=\"Body\">The TOE provides an authentication mechanism for administrative users through an internal authentication database. Administrative login is supported at the local console for initial configuration, and remotely via an SSH protected communication channel. FIPS 140-2 SL 3 operator authentication requirements preclude the use of external authentication servers. Thus, to operate the TOE in a FIPS certified manner, only local administrator authentication is permitted in the evaluated configuration.</p>\r\n<p class=\"Body\">A known administrator user id and its corresponding authentication data must be entered correctly in order for the administrator to successfully logon and thereafter gain access to administrative functions. For local authentication, all administrator user name and password pairs are managed in a database internal to the TOE. Excessive failed login attempts while initiating a remote administration session can cause the session being created to be closed.</p>\r\n<ul>\r\n<li><strong>Security Management</strong><strong></strong></li>\r\n</ul>\r\n<p class=\"Body\">After initial configuration, administrators manage the TOE remotely using a CLI communicating over the SSH protocol. The TOE also implements a web interface, but this is not part of the evaluated configuration.</p>\r\n<p class=\"Body\">To execute the CLI, the administrator can establish a trusted SSH connection to the TOE and utilize the CLI offered through the SSH connection. Regardless of the interface, the authorized administrator must be successfully identified and authenticated before they are permitted to perform any security management functions on the TOE.</p>\r\n<p class=\"Body\">The TOE supports three distinct administrative roles: Audit Administrator; Cryptographic Administrator; and Security Administrator. In addition to these administrative roles, an administrator may be given a read-write or read-only attribute that affects that administrator&rsquo;s ability to change the device&rsquo;s configuration data.</p>\r\n<ul>\r\n<li><strong>Protection of the TSF</strong><strong></strong></li>\r\n</ul>\r\n<p class=\"Body\">The TOE is a hardware and firmware device that protects itself largely by offering only a minimal logical interface to the network and attached nodes. ScreenOS is a special purpose OS that provides no general purpose programming capability. All network traffic from one network zone to another or between two networks within the same network zone passes through the TOE; however, no protocol services are provided for user communication with the TOE itself. The TOE also preserves its configuration for trusted recovery in the event that the configuration has been modified and not saved or if the TOE has been ungracefully shutdown.</p>\r\n<p class=\"Body\">The TOE provides a recovery and self testing mechanism. The recovery mechanism allows administrators to return the TOE to a secure state, while the self test mechanism allows administrators to verify the integrity of the TOE and its cryptographic functions.&nbsp;</p>\r\n<ul>\r\n<li><strong>Resource Utilization</strong><strong></strong></li>\r\n</ul>\r\n<p class=\"Body\">The TOE provides features to protect itself from Denial of Service attacks. These features limit TCP connections and offer administrators the ability to limit the number of resources a particular address or set of addresses can use over a specified time period.</p>\r\n<ul>\r\n<li><strong>TOE Access</strong><strong></strong></li>\r\n</ul>\r\n<p class=\"Body\">The TOE provides the ability to restrict the establishment of an administrative session based on a schedule or based upon the originating source IP address (or subnet). The TOE also provides inactivity timeouts and logon banners that can be configured by administrators.</p>\r\n<ul>\r\n<li><strong>Trusted Path/Channels</strong><strong></strong></li>\r\n</ul>\r\n<p class=\"Body\">Remote administration of the TOE can be accomplished using SSH to protect the communication of a remote administrator and the TOE. SSH provides for the protection of remote administration activity from both disclosure and modification. An IPSEC tunnel is used to provide encryption and integrity for trusted channels to external servers (e.g., an NTP server).</p>","features":[]}