{"product_id":10473,"v_id":10473,"product_name":"Motorola AP-7131N Wireless Access Point","certification_status":"Not Certified","certification_date":"2014-03-27T00:03:00Z","tech_type":"Wireless LAN","vendor_id":{"name":"Motorola Mobility LLC","website":"www.motorola.com"},"vendor_poc":"Udayan Borkar","vendor_phone":"408-528-2361","vendor_email":"udayan.borkar@motorolasolutions.com","assigned_lab":{"cctl_name":"UL Verification Services"},"product_description":"<p>The TOE, the Motorola AP-7131N Access Point, is a device that manages inbound and outbound traffic on a 802.11a/b/g/n wireless network; it is used to provide secure Wireless Local Area Network (WLAN) connectivity to a set of wireless client devices. The module protects data exchanged with wireless client devices using IEEE 802.11i wireless security protocol. The TOE has one (1) physical LAN port supporting two (2) unique LAN interfaces, one (1) physical WAN port, one (1) serial port, six (6) LEDs, one (1) reset button and six (6) antennas.</p>\r\n<p>The TOE supports two deployment options, a standalone deployment and a Mesh deployment. In the standalone deployment, all AP-7131Ns are connected directly to the LAN and/or WAN wired networks. Wireless users connect to the AP via the 802.11a/b/g/n wireless communication link.</p>\r\n<p>In a Mesh deployment, only one AP-7131N must be connected directly to the LAN and/or WAN wired network; this AP is configured as a base bridge. Another AP-7131, configured as a client bridge, can connect to the wired network through the base bridge via 802.11a/b/g/n wireless communication link. An AP-7131N can be configured as both base bridge and client bridge, allowing the AP to act as a repeater; the Mesh configuration supports as many as three repeaters connected in series. All client and base bridges are capable to serve as fully functional APs, connecting to wireless users via 802.11a/b/g/n. Each client bridge must authenticate itself to the corresponding base bridge using Pre-Shared Keys (PSK).</p>\r\n<p class=\"Body\">The following Security Functions are supported by the TOE:</p>\r\n<ul>\r\n<li>Security Audit - The TOE has the ability to selectively generate audit records from potentially security relevant events and transmit these records to the audit server in the environment.</li>\r\n<li>Cryptographic Support - The TOE provides cryptographic mechanisms to protect TSF code and data, including mechanisms to encrypt, decrypt, hash, digitally sign data, and perform cryptographic key agreement. The evaluated configuration uses NIST CAVP validated cryptographic algorithms.</li>\r\n<li>User Data Protection - The TOE protects user data, i.e., only that data exchanged with wireless client devices, using the IEEE 801.11i standard wireless security protocol, mediates the flow of information passing to and from the WAN port, and ensures that resources used to pass network packets through the TOE do not contain any residual information.</li>\r\n<li>Identification and Authentication - The TOE requires the system administrators be authenticated before access to the TOE is granted.</li>\r\n<li>Security Management - The management of the security relevant parameters of the TOE is performed by the authorized administrator, with capabilities to manage network performance, identify and resolve problems, and gather information from network components.</li>\r\n<li>TOE Access - The TOE displays an advisory/warning message before establishing a user session.</li>\r\n<li>Trusted Path/Channel &ndash; The TOE provides both trusted paths for authorized administrators and trusted channels for system functions.</li>\r\n<li>Intrusion Detection - The TOE provides rogue AP detection, i.e., any unauthorized active AP operating within the radio coverage of an authorized AP.</li>\r\n<li>Protection of the TSF - The TOE provides the capability to run a set of self-tests on power-on and on demand to verify the correct operation of the TOE&rsquo;s underlying hardware, TOE software and cryptographic modules.</li>\r\n</ul>","evaluation_configuration":"<p>The evaluation covers two models of the AP-7131N, the AP-7131N-66040-FGR Rev. D and the AP-7131N-66040-FWW Rev. F; both are shipped with identical software, version 4.0.4.0-045GRN.&nbsp; The two models are identical except that the radio frequency bands of the FGR are preconfigured for use in the USA only; the radio frequency bands of the FWW are configurable for all supported countries except the USA. The differences between the two models are limited to the frequency bands supported and the menu used to select the country of use; all security functions are identical. The software detects the model on startup.</p>\r\n<p>The TOE supports the following LAN, WAN, and WLAN interfaces:</p>\r\n<ul>\r\n<li>LAN port - The physical interface provided to connect a physical wire to the AP LAN. The access point has one LAN (GE1/POE) port with a single MAC address.</li>\r\n<li>WAN port - The physical interface provided to connect a physical wire to the AP WAN. The access point has one WAN (GE2) port with a single MAC address.</li>\r\n<li>WLAN port - There is not a physical connector associated with the WLAN port; this represents the physical radio antenna(s) for the WLAN.</li>\r\n</ul>\r\n<p><span style=\"text-decoration: underline;\">Environment Dependencies</span></p>\r\n<p>The AP-7131N requires the following support from the IT environment:</p>\r\n<ul>\r\n<li>Wireless clients connected via 802.11a/b/g/n</li>\r\n<li>Local administration connected via RS-232 \r\n<ul>\r\n<li>Access to management functions via Command Line Interface (CLI) </li>\r\n</ul>\r\n</li>\r\n<li>Remote administration connected by LAN or WAN port \r\n<ul>\r\n<li>Supports  \r\n<ul>\r\n<li>SSHv2 access to management functions via Command Line Interface (CLI)</li>\r\n<li>HTTPS access to Java based Web UI management functions via web browser supporting TLSv1.0</li>\r\n<li>SNMPv3 access to limited management functions</li>\r\n</ul>\r\n</li>\r\n</ul>\r\n</li>\r\n<li>Servers \r\n<ul>\r\n<li>SFTP server connected via SSHv2</li>\r\n<li>NTP&nbsp; Server connected via IPsec tunnel</li>\r\n<li>Audit (Syslog) Server tunnel connected via IPsec tunnel</li>\r\n<li>RADIUS (AAA) Server connected via IPsec tunnel</li>\r\n<li>LDAP Server connected via IPsec tunnel</li>\r\n<li>SNMP Server (Manager) using SNMPv3</li>\r\n</ul>\r\n</li>\r\n</ul>","security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme.&nbsp; The evaluation demonstrated that Motorola Solutions AP-7131N device meets the security requirements contained in the Security Target.&nbsp; The criteria against which the AP-7131N was assessed are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 3 and National and International Interpretations effective 2 November 2012.&nbsp; The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 3. InfoGard Laboratories determined that the AP-7131N access point provides the security assurance required by Evaluation Assurance Level 2 (EAL2) and ALC_FLR.2.</p>\r\n<p>The TOE, configured as specified in the installation guide, satisfies all of the security functional requirements stated in the Security Target.&nbsp; Validators on behalf of the CCEVS Validation Body monitored the evaluation carried out by InfoGard Laboratories, Inc. The evaluation was completed in March of 2014.</p>","environmental_strengths":"<p>The Motorola Solutions AP-7131N is a commercial wireless LAN (WLAN) access point. It utilizes National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program (CAVP) validated cryptographic algorithms to provide secure management and secure wireless networking functions.</p>\r\n<p>The AP-7131N requires remote administrative users to be authenticated over a trusted path prior to performing any administrative functions. The AP locks out a remote interface type (i.e. HTTPS or SSH) if that interface type receives 3 consecutive failed login attempts.</p>\r\n<p>The AP-7131N utilizes trusted channels to protect communications with trusted IT entities (i.e. authentication server, NTP server, Syslog server, SFTP server, SNMPv3 Manager).</p>\r\n<p>The AP-7131N audits both wireless user and administrator actions to an external syslog server to aid in detecting suspicious behavior.</p>","features":[]}