{"product_id":10518,"v_id":10518,"product_name":"Cisco Aggregation Services Router (ASR) 1000 Series","certification_status":"Not Certified","certification_date":"2013-12-19T00:12:00Z","tech_type":"Network Device","vendor_id":{"name":"Cisco Systems, Inc.","website":"https://www.cisco.com"},"vendor_poc":null,"vendor_phone":null,"vendor_email":"certteam@cisco.com","assigned_lab":{"cctl_name":"Booz Allen Hamilton Common Criteria Testing Laboratory"},"product_description":"<p>The Security Target (ST) defines the Information Technology (IT) security requirements for the Cisco Aggregation Services Router (ASR) 1000 Series. A Cisco ASR 1000 Series product has two or more network interfaces and is connected to at least one internal and one external network. The Cisco ASR 1000 Series product&rsquo;s configuration determines how packets are handled to and from its network interfaces. The router configuration will determine how traffic flows received on an interface will be handled. Typically, packet flows are passed through the internetworking device and forwarded to their configured destination.</p>","evaluation_configuration":"<p>The TOE is a hardware and software solution that is made up of the following router models: ASR 1001, ASR 1002, ASR 1002X, ASR 1004, ASR 1006, and ASR 1013. The software is pre-installed and is comprised of the Cisco IOS-XE software image Release 3.7.2t(S). The TOE was evaluated on the following platforms:</p>\r\n<p>&nbsp;</p>\r\n<table style=\"width: 614px;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\" align=\"left\">\r\n<tbody>\r\n<tr>\r\n<td valign=\"top\">\r\n<p><strong>Hardware   Model</strong></p>\r\n</td>\r\n<td valign=\"top\">\r\n<p><strong>ASR 1001</strong></p>\r\n</td>\r\n<td valign=\"top\">\r\n<p><strong>ASR 1002-X</strong></p>\r\n</td>\r\n<td valign=\"top\">\r\n<p><strong>ASR 1002</strong></p>\r\n</td>\r\n<td width=\"85\" valign=\"top\">\r\n<p><strong>ASR 1004</strong></p>\r\n</td>\r\n<td width=\"95\" valign=\"top\">\r\n<p><strong>ASR 1006</strong></p>\r\n</td>\r\n<td width=\"96\" valign=\"top\">\r\n<p><strong>ASR 1013</strong></p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\">\r\n<p><strong>Supported </strong>&nbsp;<strong>Embedded Services Processors</strong></p>\r\n</td>\r\n<td valign=\"top\">\r\n<p>Integrated ESP</p>\r\n</td>\r\n<td valign=\"top\">\r\n<p>Integrated ESP</p>\r\n</td>\r\n<td valign=\"top\">\r\n<p>ESP5</p>\r\n<p>ESP10</p>\r\n</td>\r\n<td width=\"85\" valign=\"top\">\r\n<p>ESP10</p>\r\n<p>ESP20</p>\r\n</td>\r\n<td width=\"95\" valign=\"top\">\r\n<p>Dual ESP10</p>\r\n<p>Dual ESP20</p>\r\n<p>Dual ESP40</p>\r\n<p>Dual ESP100</p>\r\n</td>\r\n<td width=\"96\" valign=\"top\">\r\n<p>Dual ESP40</p>\r\n<p>Dual ESP100</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\">\r\n<p><strong>Supported </strong>&nbsp;<strong>Route Processors</strong></p>\r\n</td>\r\n<td valign=\"top\">\r\n<p>Integrated RP1</p>\r\n</td>\r\n<td valign=\"top\">\r\n<p>Integrated RP1</p>\r\n</td>\r\n<td valign=\"top\">\r\n<p>Integrated RP1</p>\r\n</td>\r\n<td width=\"85\" valign=\"top\">\r\n<p>RP1</p>\r\n<p>RP2</p>\r\n</td>\r\n<td width=\"95\" valign=\"top\">\r\n<p>Dual RP1</p>\r\n<p>Dual RP2</p>\r\n</td>\r\n<td width=\"96\" valign=\"top\">\r\n<p>Dual RP2</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\">\r\n<p><strong>Shared Port Adaptors &nbsp;Slots</strong></p>\r\n</td>\r\n<td valign=\"top\">\r\n<p>1   SPA slot</p>\r\n</td>\r\n<td valign=\"top\">\r\n<p>1   SPA slot</p>\r\n</td>\r\n<td valign=\"top\">\r\n<p>3   SPA slots</p>\r\n</td>\r\n<td width=\"85\" valign=\"top\">\r\n<p>8   SPA slots</p>\r\n</td>\r\n<td width=\"95\" valign=\"top\">\r\n<p>12   SPA slots</p>\r\n</td>\r\n<td width=\"96\" valign=\"top\">\r\n<p>24   SPA slots</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\">\r\n<p><strong>Supported </strong>&nbsp;<strong>Shared Port Adaptors</strong></p>\r\n</td>\r\n<td colspan=\"6\" width=\"540\" valign=\"top\">\r\n<p>Cisco 1-Port Clear Channel OC3 ATM Shared Port   Adapter (SPA-1XOC3-ATM-V2)</p>\r\n<p>Cisco 3-Port Clear Channel OC3 ATM Shared Port   Adapter (SPA-3XOC3-ATM-V2)</p>\r\n<p>Cisco 1-Port OC12 STM Shared Port Adapter   (SPA-1XOC12-ATM-V2)</p>\r\n<p>Cisco 2-Port T3/E3 Circuit Emulation and ATM SPA   (SPA-2CHT3-CE-ATM)</p>\r\n<p>Cisco 8-Port Channelized T1/E1 Shared Port Adapter   (SPA-8XCHT1/E1)</p>\r\n<p>Cisco 4-Port Channelized T3 (DS0) Shared Port Adapter   (SPA-4XCT3/DS0)</p>\r\n<p>Cisco 2-Port Channelized T3 (DS0) Shared Port Adapter   (SPA-2XCT3/DS0)</p>\r\n<p>Cisco 1-port Channelized STM-1/OC-3c to DS0 Shared   Port Adapter (SPA-1XCHSTM1/OC3)</p>\r\n<p>Cisco 2-Port Clear Channel T3/E3 Shared Port Adapter   (SPA-2XT3/E3)</p>\r\n<p>Cisco 4-Port Clear Channel T3/E3 Shared Port Adapter   (SPA-4XT3/E3)</p>\r\n<p>Cisco 4-Port Serial Interface Shared Port Adapter   (SPA-4XT-Serial)</p>\r\n<p>1-port Channelized OC12 to DS0 SPA (SPA-1XCHOC12/DS0)</p>\r\n<p>Cisco 4-Port 10BASE-T/100BASE Fast Ethernet Shared   Port Adapter (SPA-4X1FE-TX-V2)</p>\r\n<p>Cisco 8-Port 10BASE-T/100BASE Fast Ethernet Shared   Port Adapter (SPA-8X1FE-TX-V2)</p>\r\n<p>Cisco 2-Port Gigabit Ethernet Shared Port Adapter   (SPA-2X1GE-V2)</p>\r\n<p>Cisco 5-Port Gigabit Ethernet Shared Port Adapter   (SPA-5X1GE-V2)</p>\r\n<p>Cisco 8-Port Gigabit Ethernet Shared Port Adapter   (SPA-8X1GE-V2)</p>\r\n<p>Cisco 10-Port Gigabit Ethernet Shared Port Adapter   (SPA-10X1GE-V2)</p>\r\n<p>Cisco 1-Port 10 Gigabit Ethernet Shared Port Adapter   (SPA-1X10GE-L-V2)</p>\r\n<p>Cisco 1-port 10GE LAN/WAN-PHY Shared Port Adapter   (SPA-1X10GE-WL-V2)</p>\r\n<p>Cisco Synchronous Ethernet SPA (SPA-2X1GE-SYNCE)</p>\r\n<p>Cisco 2-Port OC3c/STM-1c POS Shared Port Adapter   (SPA-2XOC3-POS)</p>\r\n<p>Cisco 4-Port OC3c/STM-1c POS Shared Port Adapter   (SPA-4XOC3-POS)</p>\r\n<p>Cisco 8-port OC3/STM4 POS Shared Port Adapter   (SPA-8XOC3-POS)</p>\r\n<p>Cisco 1-Port OC12c/STM-4c POS Shared Port Adapter   (SPA-1XOC12-POS)</p>\r\n<p>Cisco 2-port OC12/STM4 POS Shared Port Adapter   (SPA-2XOC12-POS)</p>\r\n<p>Cisco 4-port OC12/STM4 POS Shared Port Adapter   (SPA-4XOC12-POS)</p>\r\n<p>Cisco 8-port OC12/STM4 POS SPA Shared Port Adapter   (SPA-8XOC12-POS)</p>\r\n<p>Cisco 1-port OC48/STM16 POS/RPR Shared Port Adapter   (SPA-1XOC48-POS/RPR)</p>\r\n<p>Cisco 2-port OC48/STM16 POS/RPR Shared Port Adapter   (SPA-2XOC48POS/RPR)</p>\r\n<p>Cisco 4-port OC48/STM16 POS/RPR Shared Port Adapter   (SPA-4XOC48POS/RPR)</p>\r\n<p>Cisco 1-Port OC-192c/STM-64c POS/RPR Shared Port   Adapter with XFP Optics (SPA-OC192POS-XFP)</p>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<p><strong>&nbsp;</strong></p>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes and procedures. Cisco Aggregation Services Router (ASR) 1000 Series was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 4. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 4. Booz Allen Hamilton determined that the evaluation assurance level (EAL) for the product is EAL 1.&nbsp; The product, when delivered configured as identified in the <em>Cisco Aggregation Services Router (ASR) 1000 Series Common Criteria Operational User Guidance And Preparative Procedures version .13</em> document, satisfies all of the security functional requirements stated in the <em>Cisco Aggregation Services Router (ASR) 1000 Series Security Target, Version .15</em>. The evaluation underwent CCEVS Validator review.&nbsp; The evaluation was completed in December 2013.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report, (report number CCEVS-VR-VID10518-2013, dated December 19, 2013) prepared by CCEVS.</p>","environmental_strengths":"<p><strong><em>Security Audit</em></strong></p>\r\n<p>The TOE can audit events related to cryptographic functionality, identification and authentication, and administrative actions. The administrator configures auditable events, performs back-up operations and manages audit data storage. The TOE provides the administrator with a circular audit trail or a configurable audit trail threshold to track the storage capacity of the audit trail. Audit logs are backed up over an encrypted IPSec channel to an external audit server.</p>\r\n<p><strong><em>Cryptographic Support</em></strong></p>\r\n<p>The TOE provides cryptography in support of secure trusted path and channel connections with other IT entities via IPSec. This cryptography has been validated for conformance to the requirements of FIPS 140-2 Level 2.</p>\r\n<p><strong><em>User Data Protection</em></strong></p>\r\n<p>The TOE ensures that all information flows from the TOE do not contain residual information from previous traffic. Packets are padded with zeros. Residual data is never transmitted from the TOE. <strong><em></em></strong></p>\r\n<p><strong><em>Identification and Authentication</em></strong></p>\r\n<p>The TOE performs two types of authentication: device-level authentication of remote IT device peers and user authentication for the Authorized Administrator of the TOE. Device-level authentication allows the TOE to establish a secure channel with a trusted peer. The TOE provides authentication services for administrative users wishing to connect to the TOEs secure CLI administrative interface. Password-based authentication can be performed on the serial console or remote interfaces. The TOE provides administrator authentication against a local user database or optionally supports the use of a RADIUS or TACACS+ AAA servers for authentication.</p>\r\n<p><strong><em>Security Management</em></strong></p>\r\n<p>The TOE provides the ability to securely manage all TOE administrative users; all identification and authentication; all audit functionality of the TOE; all TOE cryptographic functionality; the timestamps maintained by the TOE; updates to the TOE; and TOE configuration file storage and retrieval. The TOE supports two separate administrative roles: non-privileged Administrator and privileged Administrator. Only the privileged administrator can perform all of the above security relevant management functions. The privileged Administrator is also considered to be the Authorized Administrator.</p>\r\n<p><strong><em>Protection of the TSF</em></strong></p>\r\n<p>The TOE protects against interference and tampering by untrusted subjects by implementing identification, authentication, and access controls to limit configuration to Authorized Administrators. The TOE prevents reading of cryptographic keys and passwords. The TOE is able to verify any software updates prior to the software updates being installed on the TOE to avoid the installation of malicious software. The TOE internally maintains the date and time. Administrators can update the TOE&rsquo;s clock manually, or can configure the TOE to use NTP to synchronize the TOE&rsquo;s clock with an external time source. Finally, the TOE performs testing to verify correct operation of the router itself and that of the cryptographic module.</p>\r\n<p><strong><em>TOE Access</em></strong></p>\r\n<p>The TOE can terminate or lock inactive sessions after an Authorized Administrator configurable time-period. Once a session has been terminated the TOE requires the user to re-authenticate to establish a new session. Sessions can also be terminated if an Authorized Administrator enters the &ldquo;exit&rdquo; command. The TOE can also display a Security Administrator specified banner on the CLI management interface prior to allowing any administrative access to the TOE.</p>\r\n<p><strong><em>Trusted Path/Channels</em></strong></p>\r\n<p>Trusted path and channel connections to/from the TOE are protected using the standards defined within the Cryptographic Support section. The TOE establishes a trusted path or channel between itself and the remote management station, peer IT devices, syslog servers, RADIUS Servers, and TACACS+ Servers.</p>","features":[]}