{"product_id":10408,"v_id":10408,"product_name":"F5 Networks BIG-IP Local Traffic Manager Release 10.2.2 Build 763.3 Hotfix 2 with the Advanced Client Authentication and Protocol Security Modules running on Model 11050, 8900, or 6900 redundant pair hardware platform","certification_status":"Not Certified","certification_date":"2013-04-21T00:04:00Z","tech_type":"Router","vendor_id":{"name":"F5 Networks, Inc.","website":"http://www.f5.com"},"vendor_poc":"Dan Gilbert","vendor_phone":"206-272-6497","vendor_email":"D.Gilbert@F5.com","assigned_lab":{"cctl_name":"UL Verification Services"},"product_description":"<p>The BIG-IP device is a port-based, multilayer switch with multiple ports and a host system for advanced processing. &nbsp;The system reduces the need for routers and IP routing by managing traffic at the data-link layer (Layer 2). &nbsp;The multilayer capability of the BIG-IP system provides the ability for the system to process traffic at OSI layers 2 and above. &nbsp;The BIG-IP system performs basic Layer 4 load balancing and is fully capable of managing traffic at Layer 7. &nbsp;The system performs IP routing at Layer 3 when needed, and manages TCP and application traffic at Layers 4 and 7. &nbsp;The BIG-IP (TOE) also includes the Advanced Client Authentication and Protocol Security Modules which are included in appliance software and are enabled through licensing for the CC Evaluated configuration.</p>\r\n<p>The BIG-IP device provides the ability to monitor the devices for which it manages traffic and to provide audit trails relating to the use of network resources. &nbsp;BIG-IP information flow control rules ensure that critical connections using IP protocols reach the correct destination server. &nbsp;The BIG-IP appliance supports HTTP, SMTP, and FTP routing and analysis and can be configured to perform analysis on all other Ethernet/IP based protocols using the iRules scripting feature. Using packet filtering and profile based routing provided by the Protocol Security Module (PSM), the TOE protects backend servers from unsolicited traffic and potentially malicious traffic flows. &nbsp;The PSM also performs security related checks and validations for HTTP, SMTP, and FTP traffic.</p>\r\n<p>The BIG-IP device provides SSL offloading, server and client authentication, protocol sanitization, and customized traffic handling through the use of iRules&trade; scripts. BIG-IP also provides DoS mitigating features that manage TCP connections using maximum thresholds, throttling of traffic based on memory usage, and use of SYN cookies to guard against resource exhaustion attacks.</p>\r\n<p>Note: The cryptography used in this product has not been FIPS certified nor has it been analyzed or tested to conform to cryptographic standards during this evaluation. &nbsp;All cryptography has only been asserted as tested by the vendor.</p>","evaluation_configuration":"<p>Hardware:</p>\r\n<p>Model: 6900<br /> SKU: F5-BIG-LTM-6900-8G-R<br /> PN: 200-0300-01</p>\r\n<p>Model: 8900<br /> SKU: F5-BIG-LTM-8900-R<br /> PN: 200-0308-01</p>\r\n<p>Model: 11050<br /> SKU: F5-BIG-LTM-11050-R<br /> PN: 200-0299-00</p>\r\n<p>Software:</p>\r\n<ol>\r\n<li>BIG-IP&reg; Local      Traffic Manager Release 10.2.2 Build 763.3 with Hotfix-BIGIP-10.2.2-911.0-HF2. </li>\r\n</ol>\r\n<p>Licenses:</p>\r\n<ol>\r\n<li>Protocol      Security Module (PSM) (F5-ADD-BIG-PSM) </li>\r\n<li>Advanced      Client Authentication (ACA) module (F5-ADD-BIG-ACA)</li>\r\n<li>BIG-IP ADD-ON: Appliance Mode License      (restricts the CLI to tmsh only; no bash access and no ability to login as      root) (F5-ADD-BIG-MODE)</li>\r\n</ol>\r\n<p><strong><em>Security Relevant</em></strong><strong><em> Exclusions</em></strong></p>\r\n<p>This section identifies any security relevant items that are specifically excluded from the TOE. Administrators of BIG-IP Common Criteria configurations must not include or use these modules and features, and must disregard all mention of use or configuration in the guidance documents.</p>\r\n<ol>\r\n<li>Application templates. Configurations are restricted to manual approaches (procedurally enforced)</li>\r\n<li>The following modules, as they are separately licensed and not included in the CC Evaluated Configuration:<ol>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; i.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; BIG-IP Global Traffic Manager.</li>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ii.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; BIG-IP Link Controller.</li>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; iii.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; BIG-IP Application Security Manager.</li>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; iv.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; BIG-IP WebAccelerator System.</li>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; v.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; BIG-IP WAN Optimization Module.</li>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; vi.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; BIG-IP Access Policy Manager.</li>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; vii.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; BIG-IP Message Security Module.</li>\r\n</ol></li>\r\n<li>Application Security Policy Editor role. This role is not included in a BIG-IP configuration except as part of the Application Security Module.</li>\r\n<li>Always-On Management (AOM). SSH access to AOM is disabled unless configured, and the Common Criteria evaluated configuration does not configure SSH for AOM.&nbsp; Serial console access to AOM is procedurally excluded from the Common Criteria Evaluated Configuration. </li>\r\n<li>bash shell. This is disabled by Appliance mode.</li>\r\n<li>Bigpipe Utility Command Line Interface (CLI) and Bigpipe Shell (bpsh). These are deprecated in this release and procedurally excluded. Note that: <ol>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; i.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Users must not be created with the capability to access the bigpipe shell, either through the GUI or tmsh.</li>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ii.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The bigpipe shell must not be accessed through the tmsh &ldquo;run /util bigpipe shell&ldquo; command.</li>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; iii.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The bigpipe utility commands must not be accessed through the &ldquo;run /util bigpipe &rdquo; command.</li>\r\n</ol></li>\r\n<li>SNMP for Remote Management of BIG-IP. This is disabled via configuration script; therefore references to SNMP in the environment do not apply. However, email notification of alerts relies on modifying the alertd configuration file, which uses the snmptrap statement format to define the alert. References to snmptrap in that context do apply.</li>\r\n<li>FIPS hardware, including hardware-based SSL offloading.</li>\r\n<li>iSessions (relates to data center to data center deployment models). This requires the BIG-IP&reg; WAN Optimization Module, which is not included in TOE.</li>\r\n<li>Editing the configuration files specified in the TMOS Management Guide. The GUI or tmsh must be used for all system configurations.</li>\r\n<li>IMI and VTY shells.</li>\r\n<li>Configuration of the TOE via the appliance LCD display. This is disabled except during initial configuration.</li>\r\n<li>Serial port.</li>\r\n<li>Kerberos server. This is not enabled unless configured, and the Common Criteria evaluated configuration does not configure Kerberos. Note that the default Kerberos profile says that it is enabled, but without fully configuring the profile and attaching it to a virtual server, Kerberos itself is not configured and not usable. Thus, by default, Kerberos itself is not enabled.</li>\r\n<li>iControl interface. This is procedurally excluded since all of the function it provides is also provided with the GUI and tmsh interfaces.</li>\r\n<li>Use of CRLs and CRLDPs. As CRLs can quickly become outdated, their use and that of CRLDPs is excluded from the TOE. Therefore, an OCSP server is required in the Operational Environment for certificate revocation checks.</li>\r\n<li>The following profiles (based on the list in the Configuration Guide for BIG-IP Local Traffic Manager, Chapter 5 (Understanding Profiles), section &ldquo;Profile Types&rdquo;):<ol>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; i.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Services profiles: RTSP, Diameter, and iSession.</li>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ii.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Persistence profiles: Microsoft Remote Desktop.</li>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; iii.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Protocol profiles: SCTP.</li>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; iv.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SSL profiles: (No SSL profiles are excluded)</li>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; v.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Authentication profiles: Kerberos Delegation.</li>\r\n<li>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; vi.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Other profiles: NTLM and Stream.</li>\r\n</ol></li>\r\n<li>Protocol sanitization for protocols other than HTTP, FTP, and SMTP.</li>\r\n<li>Ciphers other than those specified in Appendix A of the Security Target. Note that the CCMODE script described in Section 3.9 changes the cryptographic defaults as they are described in guidance documents and supersedes those documents. The CCMODE script enforces the algorithm restrictions and the symmetric key length restrictions; however, the administrator must procedurally enforce the RSA key lengths in X.509 certificates used to authenticate to the TOE.</li>\r\n<li>Cryptographic-related protocols other than SSHv2, SSLv3, and TLSv1.0.</li>\r\n<li>Any features requiring root access to configure. This is because access to root is disabled via Appliance Mode. This includes, for example, remote encrypted logging since Appliance Mode precludes the ability to configure the SSH tunnel required for that function.</li>\r\n<li>The gencert utility. This is excluded since it is only accessible through excluded shells. Key and certificate generation should be accomplished through the GUI instead. </li>\r\n<li>CORBA, which is not used in BIGIP.</li>\r\n<li>TACACS+. This is excluded as a remote authentication server.</li>\r\n<li>Network boot.</li>\r\n<li>Software updates to the Common Criteria evaluated configuration.</li>\r\n<li>Batch mode tmsh transactions.</li>\r\n</ol>\r\n<p><strong><em>Non-Security Relevant Exclusions</em></strong></p>\r\n<p>This section identifies aspects of the TOE that were not evaluated as part of the Common Criteria Evaluation. With the exception of those items listed as &ldquo;separately licensed and not included with the TOE&rdquo;, items in this category include those features which may provide significant functional capability within the TOE and may be used by customers but are not security relevant.</p>\r\n<p>Those items listed as &ldquo;separately licensed and not included with the TOE&rdquo; may have security-relevant aspects and should not be used with a Common Criteria evaluated configuration without careful review.</p>\r\n<ol>\r\n<li>WebAccelerator&trade; Module      (WAM) - separately licensed and not included with the TOE.</li>\r\n<li>Link Controller (LC) -      separately licensed and not included with the TOE.</li>\r\n<li>Global Traffic Manager      (GTM) - separately licensed and not included with the TOE.</li>\r\n<li>Application Policy Module      (APM) - separately licensed and not included with the TOE.</li>\r\n<li>Enterprise Manager &ndash;      separately licensed and not included with the TOE. </li>\r\n<li>F5 Management Pack &ndash;      separately licensed and not included with the TOE.</li>\r\n<li>Advanced Routing &ndash;      separately licensed and not included with the TOE.</li>\r\n<li>Optimization of network and      application traffic; load balancing.</li>\r\n<li>HTTP compression.</li>\r\n<li>Caching.</li>\r\n<li>Aggregation of client      requests.</li>\r\n<li>Routing around slower or      degraded routes.</li>\r\n<li>Selective data compression.</li>\r\n<li>Windows NT LAN Manager      authentication protocol (NTLM). The BIG-IP passes this protocol through,      but does not itself perform NTLM authentication.</li>\r\n<li>Network resource      monitoring.</li>\r\n<li>Trunk (link aggregation).</li>\r\n<li>Spanning Tree Protocols</li>\r\n<li>Network Tunnels</li>\r\n<li>Bigtop utility &ndash; this      utility provides statistical monitoring only.</li>\r\n<li>SNAT &ndash; &ldquo;Source NAT&rdquo;. BIG-IP      implements SNAT as mapping a source client IP address to a translation      address defined on the BIG-IP system.</li>\r\n<li>Booting from different      volumes. The BIG-IP may be configured with multiple volumes but only      booting from the slot containing the Common Criteria-evaluated      configuration is recommended.</li>\r\n</ol>\r\n<p><strong><em>Environment Dependencies</em></strong></p>\r\n<p>The BIG-IP requires an NTP server and an OCSP server in the operational environment.&nbsp; F5 recommends the use of a mail server, syslog server, and an authentication server (LDAP or RADIUS) in the operational environment.&nbsp; If a syslog server is used, the environment must provide physical protections for the management network, because the TOE does not encrypt audit logs.</p>\r\n<p>The operational environment must also provide the backend HTTP, FTP, and/or SMTP servers. BIG-IP creates virtual servers that support these protocols and forward data to the backend content servers, but BIG-IP does not host content itself.</p>\r\n<p>The operational environment must provide physical protection for the TOE and the TOE administrators must be appropriately trained and trustworthy.</p>","security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. &nbsp;The evaluation demonstrated that BIG-IP Local Traffic Manager appliance meets the security requirements contained in the Security Target. &nbsp;The criteria against which BIG-IP was assessed are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 3 and National and International Interpretations effective 18 June 2010. &nbsp;The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 3. InfoGard Laboratories determined that the F5 Networks BIG-IP appliance provides the security assurance required by Evaluation Assurance Level 2 (EAL2) and ALC_FLR.2.</p>\r\n<p>The TOE, configured as specified in the installation guide, satisfies all of the security functional requirements stated in the Security Target. &nbsp;Validators on behalf of the CCEVS Validation Body monitored the evaluation carried out by InfoGard. The evaluation was completed in March of 2013.</p>","environmental_strengths":"<p>The BIG-IP Local Traffic Manager is a commercial network appliance designed to protect backend content servers while providing resource optimizing features. &nbsp;The BIG-IP provides the ability to sanitize HTTP, FTP, and SNMP protocols and detect and block a number of known attack types. The BIG-IP also provides the ability to encrypt client and server communications. Note: The cryptography used in this product has not been FIPS certified nor has it been analyzed or tested to conform to cryptographic standards during this evaluation. &nbsp;All cryptography has only been asserted as tested by the vendor.</p>\r\n<p>The BIG-IP requires administrative users to be authenticated, enforces password complexity rules (only for locally-defined non-administrators), and locks out accounts if it appears a brute force attack is being performed.</p>\r\n<p>The BIG-IP audits both user and administrator actions for detailed review or statistical analysis of usage patterns.</p>","features":[]}