{"product_id":10490,"v_id":10490,"product_name":"Cisco Catalyst 6500 Series Switches running IOS 15.0(1)SY1","certification_status":"Not Certified","certification_date":"2012-07-27T00:07:00Z","tech_type":"Network Switch","vendor_id":{"name":"Cisco Systems, Inc.","website":"https://www.cisco.com"},"vendor_poc":"Cert Team","vendor_phone":"+1 410-309-4862","vendor_email":"certteam@cisco.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p>The Target of Evaluation (TOE) is Cisco Catalyst 6500 Series running IOS 15.0(1)SY1.&nbsp; The following models were evaluated:</p>\r\n<p>&nbsp;</p>\r\n<ul>\r\n<li>One or      two Supervisor 2T Cards (VS-S2T-10G or VS-S2T-10G-XL) per chassis (Two Sup      cards in one chassis provide Supervisor failover within the chassis.)</li>\r\n<li>Each      Sup2T running IOS 15.0(1)SY1 (FIPS validated)</li>\r\n<li>Sup2T      cards installed into one or more 6506-E, 6509-E, or 6513-E Switch Chassis      (Two chassis can be configured together to support HA with VSS.)</li>\r\n<li>With      one or more WS-X6908-10G or WS-X6908-10G-2TXL Line Cards</li>\r\n</ul>\r\n<p>&nbsp;</p>\r\n<p>The TOE is a switching and routing platform used to construct IP networks by interconnecting multiple smaller networks or network segments.&nbsp; As a Layer2 switch, it performs analysis of incoming frames, makes forwarding decisions based on information contained in the frames, and forwards the frames toward the destination.&nbsp; As a Layer3 switch/router, it supports routing of traffic based on tables identifying available routes, conditions, distance, and costs to determine the best route for a given packet. Routing protocols used by the TOE include BGPv4, EIGRP, EIGRPv6 for IPv6, RIPv2, and OSPFv2.&nbsp; BGPv4, EIGRP, and EIGRPv6 supports routing updates with IPv6 or IPv4, while RIPv2 and OSPFv2 routing protocol support routing updates for IPv4 only.</p>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which Cisco Catalyst 6500 Series TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 3.&nbsp; The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 3.&nbsp; Science Applications International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the product is EAL 2 augmented with ALC_FLR.2 and ALC_DVS.1.&nbsp; The product, when delivered configured as identified in <em>Cisco Catalyst 6500 Series Common Criteria Operational User Guidance and Preparative Procedures </em>document, satisfies all of the security functional requirements stated in the Cisco Catalyst 6500 Series Security Target (Version 1.0). The project underwent one Validation Oversight Panel (VOR) panel review.&nbsp; The evaluation was completed in August 2012.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report, (report number CCEVS-VR-10490-2012, dated August 2012) prepared by CCEVS.</p>","environmental_strengths":"<p>The logical boundaries of Cisco Catalyst 6500 Series TOE are realized in the security functions that it implements. These security functions are realized at the network interfaces that service clients and via the administrator commands. Each of these security functions is summarized below.</p>\r\n<p><strong>Security audit - </strong>The TOE generates audit messages that identify specific TOE operations. For each event, the TOE records the date and time of each event, the type of event, the subject identity, and the outcome of the event. Auditable events include: modifications to the group of users that are part of the authorized administrator roles (assigned the appropriate privilege level), all use of the user identification mechanism; any use of the authentication mechanism; any change in the configuration of the TOE; any matching of packets to access control entries in ACLs when traversing the TOE; and any failure of a packet to match an access control list (ACL) rule allowing traversal of the TOE.&nbsp; The TOE will write audit records to the local logging buffer by default and can be configured to send audit data via syslog to a remote audit server, or display to the local console.&nbsp; The TOE does not have an interface to modify audit records, though there is an interface available for the authorized administrator to delete audit data stored locally on the TOE.</p>\r\n<p><strong>Cryptographic support - </strong>The TOE provides cryptography support for secure communications and protection of information when operated in FIPS mode.&nbsp; The crypto module is FIPS 140-2 SL2 validated (certificate number 1717).&nbsp; The cryptographic services provided by the TOE include: symmetric encryption and decryption using AES; digital signature using RSA; cryptographic hashing using SHA1; and keyed-hash message authentication using HMAC-SHA1. The TOE also implements SSHv2 for secure remote administration.&nbsp; In the evaluated configuration, the TOE must be operated in FIPS mode of operation per the FIPS Security Policy (certificate 1717).</p>\r\n<p><strong>Traffic Filtering and Switching (VLAN Processing and ACLs) - </strong>VLANs control whether Ethernet frames are passed through the switch interfaces based on the VLAN tag information in the frame header.&nbsp; IP ACLs or ICMP ACLs control whether routed IP packets are forwarded or blocked at Layer 3 TOE interfaces (interfaces that have been configured with IP addresses). VACLs (using access mapping) control whether non-routed frames (by inspection of MAC addresses in the frame header) and packets (by inspection of IP addresses in the packet header) are forwarded or blocked at Layer 2 ports assigned to VLANs. The TOE examines each frame and packet to determine whether to forward or drop it, on the basis of criteria specified within the VLANs access lists and access maps applied to the interfaces through which the traffic would enter and leave the TOE. For those interfaces configured with Layer-3 addressing the ACLs can be configured to filter IP traffic using: the source address of the traffic; the destination address of the traffic; and the upper-layer protocol identifier. Layer-2 interfaces can be made part of Private VLANs (PVLANs), to allow traffic to pass in a pre-defined manner among a primary, and secondary (&lsquo;isolated&rsquo; or &lsquo;community&rsquo;) VLANs within the same PVLAN.</p>\r\n<p>VACL access mapping is used to match IP ACLs or MAC ACLs to the action to be taken by the TOE as the traffic crosses the interface, causing the packet to be forwarded or dropped. The traffic is matched only against access lists of the same protocol type; IP packets can be matched against IP access lists, and any Ethernet frame can be matched against MAC access lists.&nbsp; Both IP and MAC addresses can be specified within the VLAN access map. Use of Access Control Lists (ACLs) also allows restriction of remote administration connectivity to specific interfaces of the TOE so that sessions will only be accepted from approved management station addresses identified as specified by the administrator.</p>\r\n<p>The TOE supports routing protocols including BGPv4, EIGRP, EIGRPv6 for IPv6, RIPv2, and OSPFv2 to maintain routing tables, or routing tables can configured and maintained manually.&nbsp; Since routing tables are used to determine which egress ACL is applied, the authority to modify the routing tables is restricted to authenticated administrators, and authenticated neighbor routers.&nbsp; The only aspects of routing protocols that are security relevant in this TOE is the TOE&rsquo;s ability to authenticate neighbor routers using shared passwords.&nbsp; Other security features and configuration options of routing protocols are beyond the scope of this Security Target and described in administrative guidance.</p>\r\n<p>The TOE supports VACLs (VLAN ACLs), which can filter traffic traversing VLANs on the TOE based on IP addressing and MAC addressing.</p>\r\n<p>The TOE also ensures that packets transmitted from the TOE do not contain residual information from previous packets.&nbsp; Packets that are not the required length use zeros for padding so that residual data from previous traffic is never transmitted from the TOE.</p>\r\n<p><strong>Identification and authentication - </strong>The TOE performs authentication, using Cisco IOS platform authentication mechanisms, to authenticate access to user EXEC and privileged EXEC command modes.&nbsp; All users wanting to use TOE services are identified and authenticated prior to being allowed access to any of the services. Once a user attempts to access the management functionality of the TOE (via EXEC mode), the TOE prompts the user for a user name and password. Only after the administrative user presents the correct identification and authentication credentials will access to the TOE functionality be granted.</p>\r\n<p>The TOE supports use of a remote AAA server (RADIUS and TACACS+) as the enforcement point for identifying and authenticating users, including login and password dialog, challenge and response, and messaging support. Encryption of the packet body is provided through the use of RADIUS (note RADIUS only encrypts the password within the packet body, while TACACS+ encrypts the entire packet body except the header).</p>\r\n<p>The TOE can be configured to display an advisory banner when administrators log in and also to terminate administrator sessions after a configured period of inactivity.</p>\r\n<p>The TOE also supports authentication of other routers using router authentication supported by BGPv4, EIGRP, EIGRPv6 for IPv6, RIPv2, and OSPFv2.&nbsp; Each of these protocols supports authentication by transmission of MD5-hashed password strings, which each neighbor router uses to authenticate others.&nbsp; It is noted that per the FIPS Security Policy, that MD5 is not a validated algorithm during FIPS mode of operation.&nbsp; For additional security, it is recommended router protocol traffic also be isolated to separate VLANs.</p>\r\n<p class=\"Body\"><strong>Security management - </strong>The TOE provides secure administrative services for management of general TOE configuration and the security functionality provided by the TOE. All TOE administration occurs through either a secure session via SSHv2, a terminal server directly connected to the Catalysis Switch (RJ45), or a local console connection (serial port). The TOE provides the ability to perform the following actions:</p>\r\n<ul>\r\n<li>allows authorized administrators to add new administrators, </li>\r\n<li>start-up and shutdown the device, </li>\r\n<li>create, modify, or delete configuration items,</li>\r\n<li>create, modify, or delete information flow policies,</li>\r\n<li>create, modify, or delete routing tables,</li>\r\n<li>modify and set session inactivity thresholds, </li>\r\n<li>modify and set the time and date, </li>\r\n<li>and create, delete, empty, and review the audit trail&nbsp; </li>\r\n</ul>\r\n<p class=\"Body\">All of these management functions are restricted to the authorized administrator of the TOE. The TOE switch platform maintains administrative privilege level and non-administrative access. Non-administrative access is granted to authenticated neighbor routers for the ability to receive updated routing tables per the information flow rules.&nbsp; There is no other access or functions associated with non-administrative access. The administrative privilege levels include:</p>\r\n<ul>\r\n<li>Administrators are assigned to privilege levels 0 and 1.&nbsp; Privilege levels 0 and 1 are defined by default and are customizable.&nbsp; These levels have a very limited scope and access to CLI commands that include basic functions such as login, show running system information, turn on/off privileged commands, logout.</li>\r\n<li>Semi-privileged administrators equate to any privilege level that has a subset of the privileges assigned to level 15; levels 2-14.&nbsp; These levels are undefined by default and are customizable.&nbsp; The custom level privileges are explained in the example below.</li>\r\n<li>Privileged administrators are equivalent to full administrative access to the CLI, which is the default access for IOS privilege level 15</li>\r\n</ul>\r\n<p><strong>Protection of the TSF - </strong>The TOE protects against interference and tampering by untrusted subjects by implementing identification, authentication and access controls to limit configuration to authorized administrators. Additionally Cisco IOS is not a general-purpose operating system and access to Cisco IOS memory space is restricted to only Cisco IOS functions.</p>\r\n<p>The TOE provides secure transmission when TSF data is transmitted between separate parts of the TOE (encrypted sessions for remote administration (via SSHv2)).&nbsp; Separate VLANs can be used to ensure routing protocol communications between the TOE and neighbor routers including routing table updates and neighbor router authentication will be logically isolated from traffic on other VLANs.</p>\r\n<p>The TOE is also able to detect replay of information and/or operations for encrypted communication paths (e.g. SSH).&nbsp; The detection applied to network packets that terminate at the TOE, such as trusted communications between the administrators and the TOE, or between an IT entity (e.g., authentication server) and the TOE.&nbsp; If replay is detected, the packets are discarded.&nbsp;</p>\r\n<p>In addition, the TOE internally maintains the date and time. This date and time is used as the time stamp that is applied to TOE generated audit records.&nbsp; Alternatively, an NTP server can be used to synchronize the date-timestamp.&nbsp; Finally, the TOE performs testing to verify correct operation of the switch itself and that of the cryptographic module.</p>\r\n<p><strong>TOE access - </strong>The TOE can terminate inactive sessions after an authorized administrator configurable time-period.&nbsp; Once a session has been terminated the TOE requires the user to re-authenticate to establish a new session.&nbsp;&nbsp; The TOE can also display a Security Administrator specified banner on the CLI management interface prior to allowing any administrative access to the TOE.</p>","features":[]}