{"product_id":10313,"v_id":10313,"product_name":"Cisco ASA 5505, 5510, 5520, 5540, and 5550 (Release 7.2(4)), Cisco VPN Client Release 5.0.03.0560","certification_status":"Not Certified","certification_date":"2009-04-13T00:04:00Z","tech_type":"Virtual Private Network","vendor_id":{"name":"Cisco Systems, Inc.","website":"https://www.cisco.com"},"vendor_poc":null,"vendor_phone":"+1 410 309 4862","vendor_email":"certteam@cisco.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"mso-bidi-font-size: 12.0pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">The Adaptive Security Appliance (ASA) evaluation included the ASA-5505, ASA-5510, ASA-5520, ASA-5540 and ASA-5550 models.<span style=\"mso-spacerun: yes;\">&nbsp; </span>There are no security relevant differences among the models. The ASA 5500 Series provides a complete remote-access VPN solution that supports numerous connectivity options, including Cisco VPN Client for IP Security (IPSec), WebVPN, and network-aware site-to-site VPN connectivity.</span></span></span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"mso-bidi-font-size: 12.0pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">The evaluation addressed two types of physical configurations:</span></span></span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"mso-bidi-font-size: 12.0pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">Remote access configurations &ndash; consisting of one ASA component which establishes and controls VPN connections and allows the flow of IP traffic between external and internal network interfaces, and a VPN Client Component executing on a physically secure, properly configured windows-based platforms.</span></span></span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"mso-bidi-font-size: 12.0pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">LAN-to-LAN (Also referred to as Site-to-Site) configurations &ndash; consisting of a VPN tunnel between two ASA instances connecting networks in different geographic locations.</span></span></span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">ASA offers both IPSec and SSL-based VPN services on a single platform.<span style=\"mso-spacerun: yes;\">&nbsp; </span>For IPSec VPN, users (on the outside) can access virtually any application as if they were actually attached to the inside network.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The IPSec service requires the Cisco VPN client executing on a physically secure and properly configured windows-based PC to establish an IPSec VPN connection.<span style=\"mso-spacerun: yes;\">&nbsp; </span>ASA will authenticate the VPN client using pre-shared keys or digital certificates (RSA).<span style=\"mso-spacerun: yes;\">&nbsp; </span>If successful authentication is achieved, a secure channel is established by using triple DES and AES ciphers to provide confidentiality and MD5 and SHA-1 algorithms for integrity and authenticity protection.<span style=\"mso-spacerun: yes;\">&nbsp;&nbsp; </span></span></span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">ASA provides one connectivity option for SSL-based VPN services: WebVPN.<span style=\"mso-spacerun: yes;\">&nbsp; </span>WebVPN requires an SSL-capable web browser to establish an SSL-based VPN connection.<span style=\"mso-spacerun: yes;\">&nbsp; </span>WebVPN will only allow the web browser to access web resources and web-enabled applications behind ASA until after the user has been authenticated.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Authentication is achieved by digital certificates, username/password, or validating an authentication cookie.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The WebVPN implements the SSLv3 and TLS protocols with strengths up to 168 bit for Triple DES, and 128, 192, and 256 bit for AES.<span style=\"mso-spacerun: yes;\">&nbsp; </span>In general, the SSL protocol takes the application message (e.g., HTML) to be transmitted, fragments the data into manageable blocks, compresses the data, applies a message authentication code (MAC), encrypts, adds a header, and transmits the resulting unit as a TCP segment.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Received data is decrypted, verified, decompressed, and reassembled and then delivered to the appropriate application.</span></span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">An access control policy can be applied to VPN traffic, so individuals and groups of users have access to the applications, network services, and resources to which they are entitled.<span style=\"mso-spacerun: yes;\">&nbsp; </span>ASA provides an authorized administrator the capability to define a single policy that incorporates both security and connectivity for remote users.</span></span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">The vendor only ran its entire suite of security tests on the 5510 platform.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Additionally, the vendor randomly sampled tests on the 5505, 5520, and 5550 platforms. <span style=\"mso-spacerun: yes;\">&nbsp;</span>This was acceptable because the binary code and consequently the security features among the platforms are equivalent.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The only difference between the models is the number of processor, memory, and/or network cards.</span></span></p>","evaluation_configuration":null,"security_evaluation_summary":"<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Cisco ASA TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 2.3.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 2.3.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Science Applications International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the product is EAL 4 augmented with ALC_FLR.1.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The product, when delivered configured as identified in <em style=\"mso-bidi-font-style: normal;\">Cisco Adaptive Security Appliances (ASA) 5505, 5510, 5520, 5540 and 5550 Common Criteria EAL4+ Administrator Guide For Virtual Private Networks (VPN)s, Version 8.0, November 12, 2008 </em>document, satisfies all of the security functional requirements stated in the Cisco Adaptive Security Appliances (ASA) 5505, 5510, 5520, 5540 and 5550 Virtual Private Network (VPN) Platform Security Target (Version 1.0). The project underwent one Validation Oversight Panel (VOR) panel review.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation was completed in March 2009.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report, (report number CCEVS-VR-10313-2009, dated April 2009) prepared by CCEVS.</span></span></p>","environmental_strengths":"<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">The logical boundaries of ASA are realized in the security functions that it implements. These security functions are realized at the ASA interfaces that service client and via the administrator commands. Each of these security functions is summarized below. </span></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small; font-family: Times;\">&nbsp;</span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\"><strong style=\"mso-bidi-font-weight: normal;\">Security Management </strong>&ndash;<strong style=\"mso-bidi-font-weight: normal;\"> </strong>ASA&rsquo;s security management functions provides security capabilities that guarantees all administrators are required to identify and authenticate to it before any administrative or monitoring actions can be performed. ASA only allows administration to occur from the console port or from a network console via SSH. ASA&rsquo;s Management Security Capability provides administrator support functionality that enables a human user to manage and configure the product<span style=\"mso-bidi-font-weight: bold;\">.</span></span></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><strong style=\"mso-bidi-font-weight: normal;\"><span style=\"font-size: x-small; font-family: Times;\">&nbsp;</span></strong></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\"><strong style=\"mso-bidi-font-weight: normal;\">Security Audit</strong> &ndash; ASA&rsquo;s security function supports audit record generation and review.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The administrator can read audit records locally. ASA provides date and time information that is used in audit timestamps.</span></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small; font-family: Times;\">&nbsp;</span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\"><strong style=\"mso-bidi-font-weight: normal;\">IPSec VPN</strong> - ASA implements the IETF IPSec protocols (RFCs 2401-2410) to provide confidentiality, authenticity, and integrity for packets flows transmitted from and received by ASA.</span></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small; font-family: Times;\">&nbsp;</span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\"><strong style=\"mso-bidi-font-weight: normal;\">SSL VPN</strong> - ASA implements the SSLv3 and TLS protocol to provide SSL-based VPN connectivity</span></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><strong style=\"mso-bidi-font-weight: normal;\"><span style=\"font-size: x-small; font-family: Times;\">&nbsp;</span></strong></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\"><strong style=\"mso-bidi-font-weight: normal;\">Identification &amp; Authentication</strong> &ndash; ASA&rsquo;s Identification and Authentication security function provides I&amp;A support of all client hosts (VPN Client Components and SSL-capable web browser) requesting a VPN session along with providing I&amp;A support to make sure all administrator are properly identified and authenticated. </span></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"mso-bidi-font-weight: bold;\"><span style=\"font-size: x-small; font-family: Times;\">&nbsp;</span></span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\"><strong>TOE Protection </strong><span style=\"mso-bidi-font-weight: bold;\">- ASA provides for non-bypassability and domain separation of functions within the its scope of control. To enable itself to be &ldquo;self defending&rdquo; the inbound filtering functions of the ASA are included.<span style=\"mso-spacerun: yes;\">&nbsp; </span>This allows (for example) IP packets that are not IPSec or SSL to be ignored by ASA, which is particularly important as ASA will typically operate with one interface facing a public network.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The ASA controls actions carried out by a user by controlling a user&rsquo;s VPN session and the actions carried out during that session. By maintaining and controlling a VPN session a user has with it, ASA ensures that no security functions are bypassed and that there is a separate domain for itself to prevent tampering and interference.<span style=\"mso-spacerun: yes;\">&nbsp; </span></span></span></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\"><strong>Clock</strong><strong style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-spacerun: yes;\">&nbsp;&nbsp; </span>- </strong>ASA uses an internal clock to provide a source of date and time information used to produced a reliable time stamp for audit record generation.</span></span></p>","features":[]}