{"product_id":10348,"v_id":10348,"product_name":"Aruba Mobility Controller and Access Point Series, Version 3.4.2.3","certification_status":"Not Certified","certification_date":"2011-06-27T00:06:00Z","tech_type":"Wireless LAN","vendor_id":{"name":"Aruba, a Hewlett Packard Enterprise Company","website":"www.arubanetworks.com"},"vendor_poc":"Jon Green","vendor_phone":"408-315-3887","vendor_email":"jgreen@arubanetworks.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p class=\"Body\">The Target of Evaluation (TOE) is a Wireless Local Area Network (WLAN) access system comprising Aruba Mobility Controllers, ArubaOS software, and Access Points. The TOE consists of one or more of the following products running the specified ArubaOS firmware version and the specified mandatory licenses installed:<a href=\"#_ftn1\">[1]</a></p>\r\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\r\n<thead> \r\n<tr>\r\n<td width=\"139\" valign=\"top\">\r\n<p class=\"Body\"><strong>Product</strong></p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<p class=\"Body\"><strong>Part    Number(s)</strong></p>\r\n</td>\r\n<td width=\"182\" valign=\"top\">\r\n<p class=\"Body\"><strong>Required    Software Licenses</strong></p>\r\n</td>\r\n<td width=\"149\" valign=\"top\">\r\n<p class=\"Body\"><strong>Firmware    Version</strong></p>\r\n</td>\r\n</tr>\r\n</thead> \r\n<tbody>\r\n<tr>\r\n<td width=\"139\" valign=\"top\">\r\n<p class=\"Body\">Aruba 6000 Mobility Controller (FIPS)</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<ul>\r\n<li>6000-400-F1</li>\r\n<li>6000-400-USF1</li>\r\n<li>6000-400-ILF1</li>\r\n<li>Policy Enforcement Firewall</li>\r\n<li>Wireless Intrusion Prevention</li>\r\n<li>VPN Server</li>\r\n</ul>\r\n</td>\r\n<td width=\"182\" valign=\"top\">&nbsp;</td>\r\n<td width=\"149\" valign=\"top\">\r\n<p class=\"Body\">3.4.2.3-FIPS operated   in FIPS mode</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"139\" valign=\"top\">\r\n<p class=\"Body\">Aruba 3200 Mobility Controller (FIPS)</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<ul>\r\n<li>3200-F1</li>\r\n<li>3200-USF1</li>\r\n<li>3200-ILF1</li>\r\n<li>Policy Enforcement Firewall</li>\r\n<li>Wireless Intrusion Prevention</li>\r\n<li>VPN Server</li>\r\n</ul>\r\n</td>\r\n<td width=\"182\" valign=\"top\">&nbsp;</td>\r\n<td width=\"149\" valign=\"top\">\r\n<p class=\"Body\">3.4.2.3-FIPS operated in FIPS mode</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"139\" valign=\"top\">\r\n<p class=\"Body\">Aruba 3400 Mobility Controller (FIPS)</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<ul>\r\n<li>3400-F1</li>\r\n<li>3400-USF1</li>\r\n<li>3400-ILF1</li>\r\n<li>Policy Enforcement Firewall</li>\r\n<li>Wireless Intrusion Prevention</li>\r\n<li>VPN Server</li>\r\n</ul>\r\n</td>\r\n<td width=\"182\" valign=\"top\">&nbsp;</td>\r\n<td width=\"149\" valign=\"top\">\r\n<p class=\"Body\">3.4.2.3-FIPS operated   in FIPS mode</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"139\" valign=\"top\">\r\n<p class=\"Body\">Aruba 3600 Mobility Controller (FIPS)</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<ul>\r\n<li>3600-F1</li>\r\n<li>3600-USF1</li>\r\n<li>3600-ILF1</li>\r\n<li>Policy Enforcement Firewall</li>\r\n<li>Wireless Intrusion Prevention</li>\r\n<li>VPN Server</li>\r\n</ul>\r\n</td>\r\n<td width=\"182\" valign=\"top\">&nbsp;</td>\r\n<td width=\"149\" valign=\"top\">\r\n<p class=\"Body\">3.4.2.3-FIPS operated in FIPS mode</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"139\" valign=\"top\">\r\n<p class=\"Body\">Aruba 800 Mobility Controller (FIPS)</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<ul>\r\n<li>800-F1</li>\r\n<li>800-USF1</li>\r\n<li>800-ILF1</li>\r\n<li>Policy Enforcement Firewall</li>\r\n<li>Wireless Intrusion Prevention</li>\r\n<li>VPN Server</li>\r\n</ul>\r\n</td>\r\n<td width=\"182\" valign=\"top\">&nbsp;</td>\r\n<td width=\"149\" valign=\"top\">\r\n<p class=\"Body\">3.4.2.3-FIPS operated   in FIPS mode</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"139\" valign=\"top\">\r\n<p class=\"Body\">Aruba 200 Mobility Controller (FIPS)</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<ul>\r\n<li>200-F1</li>\r\n<li>200-USF1</li>\r\n<li>200-ILF1</li>\r\n<li>Policy Enforcement Firewall</li>\r\n<li>Wireless Intrusion Prevention</li>\r\n<li>VPN Server</li>\r\n</ul>\r\n</td>\r\n<td width=\"182\" valign=\"top\">&nbsp;</td>\r\n<td width=\"149\" valign=\"top\">\r\n<p class=\"Body\">3.4.2.3-FIPS operated in FIPS mode</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"139\" valign=\"top\">\r\n<p class=\"Body\">AP-60 Access Point</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<ul>\r\n<li>AP-60-F1</li>\r\n</ul>\r\n</td>\r\n<td width=\"182\" valign=\"top\">\r\n<p class=\"Body\">N/A</p>\r\n</td>\r\n<td width=\"149\" valign=\"top\">\r\n<p class=\"Body\">3.4.2.3-FIPS operated   in FIPS mode</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"139\" valign=\"top\">\r\n<p class=\"Body\">AP-61 Access Point</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<ul>\r\n<li>AP-61-F1</li>\r\n</ul>\r\n</td>\r\n<td width=\"182\" valign=\"top\">\r\n<p class=\"Body\">N/A</p>\r\n</td>\r\n<td width=\"149\" valign=\"top\">\r\n<p class=\"Body\">3.4.2.3-FIPS operated in FIPS mode</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"139\" valign=\"top\">\r\n<p class=\"Body\">AP-65 Access Point</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<ul>\r\n<li>AP-65-F1</li>\r\n</ul>\r\n</td>\r\n<td width=\"182\" valign=\"top\">\r\n<p class=\"Body\">N/A</p>\r\n</td>\r\n<td width=\"149\" valign=\"top\">\r\n<p class=\"Body\">3.4.2.3-FIPS operated   in FIPS mode</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"139\" valign=\"top\">\r\n<p class=\"Body\">AP-70 Access Point</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<ul>\r\n<li>AP-70-F1</li>\r\n</ul>\r\n</td>\r\n<td width=\"182\" valign=\"top\">\r\n<p class=\"Body\">N/A</p>\r\n</td>\r\n<td width=\"149\" valign=\"top\">\r\n<p class=\"Body\">3.4.2.3-FIPS operated in FIPS mode</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"139\" valign=\"top\">\r\n<p class=\"Body\">AP-85 Access Point</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<ul>\r\n<li>AP-85TX-F1</li>\r\n<li>AP-85FX-F1</li>\r\n<li>AP-85FX-EU-F1</li>\r\n<li>AP-85LX-F1</li>\r\n<li>AP-85LX-EU-F1</li>\r\n</ul>\r\n</td>\r\n<td width=\"182\" valign=\"top\">\r\n<p class=\"Body\">N/A</p>\r\n</td>\r\n<td width=\"149\" valign=\"top\">\r\n<p class=\"Body\">3.4.2.3-FIPS operated   in FIPS mode</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"139\" valign=\"top\">\r\n<p class=\"Body\">AP-124 Access Point</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<ul>\r\n<li>AP-124-F1</li>\r\n</ul>\r\n</td>\r\n<td width=\"182\" valign=\"top\">\r\n<p class=\"Body\">N/A</p>\r\n</td>\r\n<td width=\"149\" valign=\"top\">\r\n<p class=\"Body\">3.4.2.3-FIPS operated in FIPS mode</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td width=\"139\" valign=\"top\">\r\n<p class=\"Body\">AP-125 Access Point</p>\r\n</td>\r\n<td width=\"168\" valign=\"top\">\r\n<ul>\r\n<li>AP-125-F1</li>\r\n</ul>\r\n</td>\r\n<td width=\"182\" valign=\"top\">\r\n<p class=\"Body\">N/A</p>\r\n</td>\r\n<td width=\"149\" valign=\"top\">\r\n<p class=\"Body\">3.4.2.3-FIPS operated   in FIPS mode</p>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<p class=\"Body\">The Aruba Mobility Controllers are wireless switch appliances that provide a wide range of wireless and wired network mobility, security, centralized management, auditing, authentication, and remote access.&nbsp; The Aruba Access Point appliances service wireless clients (part of the operational environment) and can monitor radio frequency spectrums to detect intrusions, denial of service attacks, and other vulnerabilities. The ArubaOS is a suite of mobility applications that runs on all Aruba controllers and APs and allows administrators to configure and manage the wireless and mobile user environment.</p>\r\n<p>&nbsp;</p>\r\n<hr size=\"1\" />\r\n<p><a href=\"#_ftnref1\">[1]</a> The xSec license module is also part of the evaluated configuration, but is not mandatory.</p>","evaluation_configuration":"<p class=\"Body\">The TOE is shipped with guidance documentation for installing and configuring it in its evaluated configuration. These documents are:</p>\r\n<ul>\r\n<li><em>Aruba OS User Guide</em> &nbsp;&ndash; For guidance on software configuration of the TOE</li>\r\n<li><em>Hardware installation Guides</em> &ndash; For guidance on physical installation of the TOE</li>\r\n<li><em>FIPS Insert card</em> &ndash; FIPS specific information</li>\r\n<li><em>CC Addendum Document</em>.</li>\r\n</ul>\r\n<p class=\"Body\">The CC Addendum Document contains information specific for configuring the TOE in its evaluated configuration. This includes configuration items such as:</p>\r\n<p class=\"Body\">o&nbsp;&nbsp;&nbsp; The TOE must be running in FIPS mode and only uses FIPS 140-2 approved cryptographic algorithms</p>\r\n<p class=\"Body\">o&nbsp;&nbsp;&nbsp; Telnet access to the TOE is automatically disabled and cannot be enabled or configured</p>\r\n<p class=\"Body\">o&nbsp;&nbsp;&nbsp; The passwords for management users are case-sensitive</p>\r\n<p class=\"Body\">o&nbsp;&nbsp;&nbsp; The TOE permits only WPA2 algorithms using AES for wireless security. Open, TKIP and WPA-based algorithms are not permitted</p>\r\n<p class=\"Body\">o&nbsp;&nbsp;&nbsp; The evaluated configuration requires the TOE to be configured to use SNMPv3 only. SNMPv1 and SNMPv2 are not in the evaluated configuration and should not be configured.</p>","security_evaluation_summary":"<p class=\"Body\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process. The criteria against which the Aruba Mobility Controller and Access Point Series TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2. The evaluation methodology used by the Evaluation Team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1, Revision 2. Science Applications International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the product is the EAL4 assurance requirements package, augmented with ALC_FLR.2 (Flaw reporting procedures). The product satisfies all of the security functional requirements stated in the Aruba Mobility Controller and Access Point Series Security Target, when configured as specified in the evaluated guidance documentation.</p>\r\n<p>A validation team on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC. The evaluation was completed in May 2011. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID10348-2011), prepared by CCEVS.</p>","environmental_strengths":"<p class=\"Body\">Aruba Mobility Controller and Access Point Series provides a moderate level of independently assured security in a conventional TOE and is suitable for a relatively benign environment with good physical access security and competent administrators.</p>\r\n<p class=\"Body\">Aruba Mobility Controller and Access Point Series supports the following security functions:</p>\r\n<p class=\"Body\"><strong>Security Audit</strong></p>\r\n<p class=\"Body\">The TOE is capable of auditing security relevant events such as logins, administrator actions, use of trusted channel and path, cryptographic operations, resource limitation exceeded, etc. Each audit event includes the date and time of the event, the type of event, the subject identity (if applicable), and the outcome of the event. The administrator can include and exclude events to be audited based on specific criteria. The TOE can detect security event/violation based on signature and perform the appropriate action such as alerting the administrator or denying access.</p>\r\n<p class=\"Body\"><strong>Cryptographic Support</strong></p>\r\n<p class=\"Body\">The TOE has been certified as a FIPS 140-2 cryptographic module (FIPS 140-2 certified Certificates #:1297, #1116, #1109, #1077, and #1075) at Security Level 2. When in FIPS mode, the cryptographic module only employs FIPS-approved RNG, key generation, establishment, zeroization, encryption, digital signature, and hashing algorithms.&nbsp;</p>\r\n<p class=\"Body\"><strong>User Data Protection</strong></p>\r\n<p class=\"Body\">The TOE provides both policies and access control lists (ACLs) to control information flow. Firewall policies identify specific characteristics about a data packet and specify the action to take based on that identification. ACLs provide a method of restricting certain types of traffic on a physical port based on IP address, port, protocol, etc. Administrators can apply firewall policies to user roles and give differential treatment to different users on the same network, or to physical ports and apply the same policy to all traffic through the port. The TOE can also group wireless clients into separate virtual LANs (VLANs). The TOE protects the data between itself and the wireless clients using AES or TDES. The TOE ensures any previous information content is made unavailable upon the allocation of a memory buffer to a network packet.</p>\r\n<p class=\"Body\"><strong>Identification and Authentication</strong></p>\r\n<p>The TOE can maintain administrator and user attributes, including credentials such as username and password for administrators and session key and role for remote authenticated users (username and password can be stored in the TOE&rsquo;s internal database or in an authentication server in the operational environment). The TOE requires identification and authentication (either locally or remotely through external authentication server, internally, or both) of administrators managing the TOE. The TOE provides various mechanisms for identifying and authenticating wireless clients, including captive portal and 802.1X. After an administrator-specified number of failed authentication attempts, the user account is locked out. In addition, the password mechanism can be configured to have a minimum length of six characters.</p>\r\n<p class=\"Body\"><strong>Security Management</strong></p>\r\n<p class=\"Body\">The TOE provides the capability to manage auditing, cryptographic operations, intrusion protection functions, password minimum length enforcement, user accounts, policies &amp; ACLs rules, advisory banner, and timeout (inactivity threshold) value. The management functions are restricted to an administrator role. The role must have the appropriate access privileges or access will be denied. The wireless user role has no access to the management interfaces. The information flow policy blocks packets by default and only administrators can change the default values. The FIPS-validated TOE ensures that only secure values are accepted for security attributes.</p>\r\n<p class=\"Body\"><strong>Protection of the TSF</strong></p>\r\n<p class=\"Body\">The TOE provides integrity protection for all communication between its components. This prevents unauthorized modification of TSF data during transmission. The TOE also provides self-tests to ensure the correct operation of the cryptographic functions and TSF hardware. There is an option for the administrator to verify the integrity of stored TSF executable code. The communication between the TOE and another trusted IT product (e.g., NTP, syslog, RADIUS) is protected through a trusted channel. The communication between the TOE and remote administrators is protected through a trusted path.</p>\r\n<p class=\"Body\"><strong>Resource Utilization </strong></p>\r\n<p class=\"Body\">The TOE can enforce maximum usage quotas on the number of concurrent sessions available to each named group of users.</p>\r\n<p class=\"Body\"><strong>TOE Access</strong></p>\r\n<p class=\"Body\">The TOE allows administrators to configure a period of inactivity for a user&rsquo;s session. Once that time period has been reached while the session has no activity, the session is terminated. A warning banner is displayed at the management interfaces (Web GUI and CLI) to advise users on appropriate use and penalty for misuse of the system.&nbsp;</p>\r\n<p class=\"Body\"><strong>Trusted Path/Channels</strong></p>\r\n<p class=\"Body\">The TOE provides an encrypted channel between itself and third-party trusted IT entities in the operating environment. The TOE also provides a protected communication path between itself and wireless users.</p>","features":[]}