{"product_id":10345,"v_id":10345,"product_name":"HP TippingPoint Intrusion Prevention Systems (S6100N, S5100N, S2500N, S1400N, S660N running TippingPoint OS v3.2.1; S330, S110, S10 running TippingPoint OS v3.1.4)","certification_status":"Not Certified","certification_date":"2011-08-31T00:08:00Z","tech_type":"Wireless Monitoring","vendor_id":{"name":"TippingPoint/Hewlett-Packard Corporation","website":"http://www.hp.com"},"vendor_poc":"Dinesh Vakharia","vendor_phone":"512-432-2628","vendor_email":"dinesh.j.vakharia@hp.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p class=\"Body\">The Target of Evaluation (TOE) is HP TippingPoint Intrusion Prevention System (IPS) devices, comprising:</p>\r\n<ul>\r\n<li>The model appliances S6100N, S5100N, S2500N, S1400N, and S660N running TippingPoint Operating System v3.2.1, and </li>\r\n<li>The model appliances the S330, S110 and S10 running TippingPoint Operating System version 3.1.4.</li>\r\n</ul>\r\n<p class=\"Body\">The TOE is a hardware-based intrusion prevention platform comprising the HP TippingPoint Intrusion Prevention System (IPS) devices, including the models S6100N, S5100N, S2500N, S1400N, and S660N running TippingPoint Operating System v3.2.1, and the models S330, S110 and S10 model appliances running TippingPoint Operating System version 3.1.4.&nbsp; The IPS devices consist of network processor technology and HP Networking&rsquo;s own set of custom Field Programmable Gate Arrays (FPGAs) and are hardware and software appliances that contains all the functions needed for intrusion prevention, including Internet Protocol (IP) defragmentation, TCP flow reassembly, statistical analysis, traffic shaping, flow blocking, flow state tracking and application-layer parsing of network protocols.</p>","evaluation_configuration":null,"security_evaluation_summary":"<p class=\"Body\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process. The criteria against which the HP TippingPoint Intrusion Prevention Systems TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2. The evaluation methodology used by the Evaluation Team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1, Revision 2. Science Applications International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the product is the EAL3 assurance requirements package, augmented with ALC_FLR.2 (Flaw reporting procedures). The product satisfies all of the security functional requirements stated in the HP TippingPoint Intrusion Prevention Systems Security Target, when configured as specified in the evaluated guidance documentation.</p>\r\n<p>A validation team on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC. The evaluation was completed in August 2011. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID10345-2011), prepared by CCEVS.</p>","environmental_strengths":"<p class=\"Body\">The HP TippingPoint Intrusion Prevention Systems TOE provides a moderate level of assurance in a conventional TOE and is suitable for a relatively benign environment with good physical access security and competent administrators.</p>\r\n<p class=\"Body\">HP TippingPoint Intrusion Prevention Systems supports the following security functions:</p>\r\n<p class=\"Body\"><strong>Security Audit</strong></p>\r\n<p class=\"Body\">The TOE is able to generate auditable events for the basic level of audit. It provides Superuser administrative users with the ability to review audit records stored in the audit trail and prevents other administrative user roles from reviewing the audit data. Superuser administrative users are able to select auditable events to be audited, based on event type. The audit records are stored in the underlying file system, where they are protected from unauthorized modification and deletion. When the space available for audit storage is exhausted, the oldest 50% of audit records are deleted and an audit record to this effect is generated..</p>\r\n<p class=\"Body\"><strong>Identification and Authentication</strong></p>\r\n<p>The TOE identifies and authenticates all administrative users<a href=\"#_ftn1\">[1]</a> of the TOE before granting them access to the TOE. The TOE associates a user identity, authentication data (password), and authorizations (or security role) with each user. The TOE enforces minimum requirements for the construction of user passwords and provides a mechanism to lock or disable a user account after a configured number of consecutive failed attempts to logon.</p>\r\n<p class=\"Body\"><strong>Intrusion Detection and Prevention</strong></p>\r\n<p>The TOE collects network traffic and subjects it to statistical and signature-based analysis, depending on configured IPS filters. If the analysis of collected network traffic indicates a potential intrusion attempt, an action set associated with the detecting filter is triggered. The action set determines if the traffic is permitted or blocked. If traffic is permitted, an alert will be written to the System data log (specifically, the Alert log). If traffic is blocked, writing an alert to the System data log (specifically, the Block log) is configurable&mdash;in the evaluated configuration, action sets that block traffic must also be configured to generate an alert. In addition to writing to the System data, the TOE can generate alerts in the form of a notification to a syslog server, email address, or SNMP server. The TOE provides capabilities for the administrative users to review the System data logs. The TOE protects the System data logs from modification and deletion. When the space available for System data storage is exhausted, the oldest 50% of System data is deleted and an audit record to this effect is generated.</p>\r\n<p><strong>Traffic Management</strong></p>\r\n<p>The TOE can be configured to operate as a firewall, blocking or permitting network traffic based on protocol or IP address and port. Network traffic that is permitted based on traffic management filtering is still subject to IPS filtering, unless the traffic management filter is configured to allow traffic through the device without IPS filtering. On the S6100N, S5100N, and S2500N models, inspection bypass rules can be configured that permit matching network traffic to pass through the TOE without being subject to either traffic management or IPS filters.</p>\r\n<p><strong>Security Management</strong></p>\r\n<p class=\"Body\">The TOE defines three security management roles: Superuser; Administrator; and Operator. The TOE provides the security management functions to enable the administrative users to manage user accounts, audit data and audit configurations, security configuration data, traffic management filters, and System data collection, analysis, and reaction. The Superuser role has full access to all management functions and data. The Administrator role is restricted to managing IPS and traffic management filters and reviewing configuration and System data. The Operator role is restricted to reviewing configuration and System data.</p>\r\n<p class=\"Body\"><strong>Protection of the TSF</strong></p>\r\n<p class=\"Body\">The TOE includes its own time source for providing reliable time stamps that are used in audit records and stored System data.</p>\r\n<p class=\"Body\"><strong>Trusted Path/Channels</strong></p>\r\n<p class=\"Body\">The TOE provides a trusted path for remote administrative users of the TOE to communicate with the TOE. The trusted path is implemented over the network management port using HTTPS for access to the LSM and SSHv2 for access to the CLI. Remote users initiate the trusted path by establishing an HTTPS connection (using a supported web browser) or SSH session (using an SSH client). The trusted path is used for initial authentication and all subsequent administrative actions. The use of HTTPS or SSHv2 ensures all communication over the trusted path is protected from disclosure and undetected modification.</p>\r\n<p class=\"Body\">The TOE supports a FIPS mode of operation and, when configured in FIPS mode, will allow only FIPS 140-2 approved cryptographic algorithms to be used. All models of the TOE have completed FIPS 140-2 validation (Certificate #1545). Note the TOE is not required to operate in FIPS mode to be in the evaluated configuration&mdash;the choice to do so or not is left up to the customer.</p>\r\n<p class=\"Body\"><strong>Trusted Path/Channels</strong></p>\r\n<p class=\"Body\">The TOE provides a trusted path for remote administrative users of the TOE to communicate with the TOE. The trusted path is implemented over the network management port using HTTPS for access to the LSM and SSHv2 for access to the CLI. Remote users initiate the trusted path by establishing an HTTPS connection (using a supported web browser) or SSH session (using an SSH client). The trusted path is used for initial authentication and all subsequent administrative actions. The use of HTTPS or SSHv2 ensures all communication over the trusted path is protected from disclosure and undetected modification.</p>\r\n<p class=\"Body\">The TOE supports a FIPS mode of operation and, when configured in FIPS mode, will allow only FIPS 140-2 approved cryptographic algorithms to be used. All models of the TOE have completed FIPS 140-2 validation (Certificate #1545). Note the TOE is not required to operate in FIPS mode to be in the evaluated configuration&mdash;the choice to do so or not is left up to the customer.</p>\r\n<hr size=\"1\" />\r\n<p><a href=\"#_ftnref1\">[1]</a> That is, those users who access the TOE for administrative purposes via the network management port or console port. Since the TOE is invisible to users on the networks being monitored by the TOE, there is no concept of such users being able or required to identify or authenticate themselves to the TOE.</p>","features":[]}