{"product_id":10376,"v_id":10376,"product_name":"Brocade Director Models: DCX, DCX-4S, DCX 8510-4, DCX 8510-8; Switch Appliance Models: 300, 5100, 5300, 6510, 7800, 8000, BES; Embedded Blades: 5410, 5424, 5450, 5460, 5470, 5480; Director Blade Models: FC10-6, FC8-16, FC8-32, FC8-48, FC8-64, FC16-32, FC16-48, CP8, CR8, CR4S-8, CR16-4, CR16-8, FCOE10-24, FS8-18, FX8-24","certification_status":"Not Certified","certification_date":"2012-09-28T00:00:00Z","tech_type":"Miscellaneous","vendor_id":{"name":"Brocade Communications Systems LLC A Broadcom Inc. Company","website":"www.broadcom.com"},"vendor_poc":"Chris Marks","vendor_phone":"408-333-0480","vendor_email":"marksc@brocade.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p>The Target of Evaluation (TOE) is the Brocade Directors and Switches. The following models were evaluated running the FabricOS version 7.0.0b1 software:</p>\r\n<ul>\r\n<li>Director Blade Models: FC10-6, FC8-16, FC8-32, FC8-48, FC8-64, FC16-32, FC16-48, CP8, CR8, CR4S-8, CR16-4, CR16-8, FCOE10-24, FS8-18, FX8-24</li>\r\n<li>Director Models: DCX, DCX-4S, DCX 8510-4, DCX 8510-8</li>\r\n<li>Switch Appliance Models: 300, 5100, 5300, 6510, 7800, 8000, BES</li>\r\n<li>Embedded Blades: 5410, 5424, 5450, 5460, 5470, 5480</li>\r\n<li>Software: FabricOS version 7.0.0b1</li>\r\n</ul>\r\n<p class=\"Body\">Note that models FS8-18 and BES switch appliance support the user data encryption function.</p>\r\n<p class=\"Body\">All appliance models comprising the TOE provide the same security functionality. They differ only in the number and speed of their network connections and their processing capacity (in terms of memory and processor speeds).</p>\r\n<p class=\"Body\">The Target of Evaluation (TOE) is the Brocade Directors and Switches hardware appliances running FabricOS version 7.0.0b1. Brocade Directors and Switches are hardware appliances that implement what is called a &ldquo;Storage Area Network&rdquo; or &ldquo;SAN&rdquo;. SANs provide physical connections between machines in the environment containing a type of network card called a Host Bus Adapter (HBA) that are located in the environment and storage devices such as disk storage systems and tape libraries that are also located in the environment. The network connection between the storage devices in the environment, the TOE, and HBAs in the environment use high-speed network hardware. SANs are optimized to transfer large blocks of data between HBAs and storage devices.&nbsp; SANs can be used to replace or supplement server-attached storage solutions, for example. HBAs communicate with the TOE using Fibre Channel (FC) or FC over IP (FCIP) protocols. Storage devices in turn are physically connected to the TOE using FC/FCIP interfaces. When more than one instance of the TOE is interconnected (i.e. installed and configured to work together), they are referred to collectively as a &ldquo;SAN fabric&rdquo;. A zone is a specified group of fabric-connected devices (called zone members) that have access to one another.</p>","evaluation_configuration":"","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Brocade Directors and Switches TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 2.&nbsp; The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 2.&nbsp; Science Applications International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the product is EAL 4 augmented with ALC_FLR.2.&nbsp; The product, when delivered configured as identified in the <em>Brocade Fabric OS v7.0.0b1 Release Notes v1.0 &nbsp;</em>document, satisfies all of the security functional requirements stated in the <em>Brocade Directors and Switches </em>Security Target (Version 2.8). The project underwent one Validation Oversight Panel (VOR) panel review.&nbsp; The evaluation was completed in March 2012.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report, (report number CCEVS-VR-10376-2012, dated March 2012) prepared by CCEVS.</p>","environmental_strengths":"<p>The logical boundaries of Brocade Directors and Switches TOE are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p>&nbsp;</p>\r\n<p><strong>Security audit</strong> &ndash; The TOE generates audit events for numerous activities including policy enforcement, system management and authentication. A syslog server in the environment is relied on to store audit records generated by the TOE.&nbsp; The TOE generates a complete audit record including the IP address of the TOE, the event details, and the time the event occurred.&nbsp; The time stamp is provided by the TOE appliance hardware. When the syslog server writes the audit record to the audit trail, it applies its own time stamp, placing the entire TOE-generated syslog protocol message MSG contents into an encapsulating syslog record.</p>\r\n<p class=\"Body\"><strong>User data protection</strong> &ndash; Host bus adapters can only access storage devices that are members of the same zone. The TOE enforces an access control policy called the SAN Fabric SFP to accomplish this.&nbsp; The SAN Fabric SFP is implemented using hardware-enforced zoning (also called &ldquo;hard zoning&rdquo; or simply &ldquo;zoning&rdquo;) that prevents a host bus adapter from accessing a device the host bus adapter is not authorized to access.&nbsp; A zone is a region within the fabric where a specified group of fabric-connected devices (called zone members) have access to one another.&nbsp; Zone members do not have access to any devices outside the zone and devices outside the zone do not have access to devices inside the zone.</p>\r\n<p>Some models of the TOE support encryption of user data for specified storage devices.&nbsp; A storage device configured to host encrypted data receives only encrypted data from the TOE and the TOE decrypts data received from the storage device.&nbsp; The encryption of the data exchanged between the TOE and an encrypted storage device is called &ldquo;user data encryption&rdquo;.&nbsp; A CryptoTarget container is a configuration of &ldquo;virtual devices&rdquo; that is created for each storage device&nbsp; hosted on the TOE.&nbsp; A LUN is simply a number assigned to an addressable logical unit within a storage device.&nbsp; A CryptoTarget container identifies individual LUNs within a storage device as either encrypted or cleartext.</p>\r\n<p><strong>Identification and authentication</strong> &ndash; The TOE authenticates administrative users. In order for an administrative user to access the TOE, a user account including a user name and password must be created for the user, and an administrative role must be assigned. Either the TOE performs the validation of the login credentials or the information is passed to a RADIUS or LDAP Server to perform the validation and the TOE enforces the decision.&nbsp; The administrator can configure the order in which the external authentication provider and the local credentials are checked.</p>\r\n<p><strong>&nbsp;</strong></p>\r\n<p class=\"Body\"><strong>Security management</strong> &ndash; The TOE provides both serial terminal- and Ethernet network-based management interfaces. Each of the three types of interfaces provides equivalent management functionality. The TOE provides administrative interfaces to configure hard zoning, as well as to set and reset administrator passwords. By default, host bus adapters do not have access to storage devices.</p>\r\n<p class=\"Body\"><strong>Protection of the</strong> <strong>TSF</strong> &ndash; Protection of the TSF is provided primarily by virtue of the fact that the TOE is a hardware appliance that is physically protected in the environment. On most models, the TOE does not encrypt data written to or read from storage devices by host bus adapters.&nbsp; Encryption of this data is called &ldquo;user data encryption&rdquo; and is available only on a subset of the models of the TOE being evaluated (see 6.1.2.1 for more details).&nbsp; The TOE relies instead on the environment to physically protect the network between the HBA and the TOE, and between the TOE and the storage device. Separate appliance ports are relied on to physically separate connected HBAs. The appliance&rsquo;s physical location between HBAs and storage devices is relied on to ensure TOE interfaces cannot be bypassed. The TOE encrypts commands sent from terminal applications by administrators using SSH or HTTPS. Further, TOE requires administrators to login after a SSH or HTTPS connection has been established.&nbsp; The TOE provides a reliable time stamp for audit records.</p>\r\n<p class=\"Body\"><strong>TOE Access</strong> &ndash; The TOE provides an IP Filter policy that is a set of rules applied to the IP management interfaces.&nbsp; These rules provide the ability to control how and to whom the TOE exposes the management services hosted on a switch.&nbsp; They cannot affect the management traffic that is initiated from a switch.</p>\r\n<p class=\"Body\">The TOE limits the number of concurrent login sessions for users, such that the number of simultaneous login sessions for each role is limited.</p>\r\n<p class=\"Body\"><strong>Trusted Path</strong> - The TOE enforces a trusted path between the TOE administrators and the TOE using SSH and HTTPS connections for Ethernet connections from the Administrator terminal to the TOE. The TOE encrypts commands sent from terminal applications by administrators using SSH for the command line interface and HTTPS for the Advanced Web Tools GUI interface.</p>","features":[]}