{"product_id":10554,"v_id":10554,"product_name":"Hewlett Packard Enterprise Wireless LAN Access Controllers and Access Points with Comware Version 5.2.109","certification_status":"Certified","certification_date":"2014-12-15T00:00:00Z","tech_type":"Wireless LAN","vendor_id":{"name":"Hewlett Packard Enterprise Company","website":"www.hp.com"},"vendor_poc":"Bob Pittman, Federal Certification Program Manager, HP Networking","vendor_phone":"+1-508-467-0284","vendor_email":"bob.pittman@hp.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p class=\"Default\">The HP Wireless LAN appliances consist of hardware and software components. While the physical form factor of each distinct series in the TOE is substantially different, the underlying hardware shares a similar architecture. The software utilized is a common code base of a modular nature with only the modules applicable for the specific hardware installed. The TOE appliances include dedicated Access Controllers, Access Points, and switch appliances with Access Controller modules &ndash; all of which service wireless clients ensuring the wireless communication is secure and connecting those clients to wired networks.</p>","evaluation_configuration":"<p class=\"Default\">The WLAN products in the evaluated configuration comprise the following:</p>\r\n<ul>\r\n<li>Access Controllers     \r\n<ul>\r\n<li>HP 10500/7500 20G Unified Wired-WLAN Module (JG639A)</li>\r\n<li>HP 830 8-Port PoE+ Unified Wired-WLAN Switch (JGJG641A)</li>\r\n<li>HP 830 24-Port PoE+ Unified Wired-WLAN Switch (JG640A)</li>\r\n<li>HP 850 Unified Wired-WLAN Appliance (JG722A)</li>\r\n<li>HP 870 Unified Wired-WLAN Appliance (JG723A)</li>\r\n</ul>\r\n</li>\r\n<li>Access Points     \r\n<ul>\r\n<li>HP MSM430 Dual Radio 802.11n Access Point&mdash;Models AM (J9650A), WW (J9651A), JP (J9652A), IL (J9653A), TAA (J9654A)</li>\r\n<li>HP MSM460 Dual Radio 802.11n Access Point&mdash;Models AM (J9590A), WW (J9591A), JP (J9589A), IL (J9618A), TAA (J9655A)</li>\r\n<li>HP MSM466 Dual Radio 802.11n Access Point&mdash;Models AM (JJ9621A), WW (J9622A), JP (J9620A), IL (J9619A), TAA (J9656A)</li>\r\n<li>HP MSM466-R Dual Radio Outdoor 802.11n Access Point&mdash;Models AM (J9715A), WW (J9716A), JP (J9717A), IL (J9718A)</li>\r\n<li>HP 560 Wireless Dual Radio 802.11n Access Point&mdash;Models AM (J9845A), WW (J9846A), JP (J9847A), IL (J9848A).</li>\r\n</ul>\r\n</li>\r\n</ul>\r\n<p><strong>Note: </strong>The Access Point (AP) model designations in the preceding list identify different regulatory domain variants. The model designation is determined by the setting of a bit during the manufacturing process&mdash;it is not customer configurable. This bit identifies which regulatory domain the AP should operate in and restricts the available frequency of operation for the AP radios. The designations are defined as follows:</p>\r\n<ul>\r\n<li>AM&mdash;Americas</li>\r\n<li>WW&mdash;World Wide</li>\r\n<li>JP&mdash;Japan</li>\r\n<li>IL&mdash;Israel</li>\r\n<li>TAA&mdash;US Trade Agreements Act.    \r\n<ul>\r\n</ul>\r\n</li>\r\n</ul>\r\n<p class=\"Body\">There are two types of Access Controller in the TOE: switch module, which operates within a switch chassis; and unified appliances, which integrate switch and access controller into a single appliance.</p>\r\n<p class=\"Body\">The APs in the TOE are IEEE 802.11a/b/g/n wireless devices that provide wireless coverage in both managed mode (i.e., managed through an Access Controller) and autonomous mode (i.e., without a controller). Only managed mode is supported in the evaluated configuration.</p>","security_evaluation_summary":"<p class=\"Default\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the HP WLAN Access Controllers and Access Points were evaluated are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 3.&nbsp;The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 4.&nbsp;The product, when delivered and configured as identified in the <em>Preparative Procedures for CC WLASPP Evaluated Wireless LAN Controllers and Access Points </em>document, satisfies all of the security functional requirements stated in the&nbsp;<em>Hewlett-Packard Company Wireless LAN Access Controllers and Access Points Security Target, Version 1.0, 31 October 2014.</em> The project underwent CCEVS Validator review.&nbsp; The evaluation was completed in November 2014.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.</p>","environmental_strengths":"<p><strong><em>Security Audit</em></strong><strong></strong></p>\r\n<p>The TOE is able to generate logs of security relevant events. The TOE can be configured to be selective in the audit records logged and can store the logs locally so they can be accessed by an administrator. The TOE also has the ability to transmit generated audit records to an audit server in its operational environment.</p>\r\n<p>Locally stored audit records can be reviewed by an administrator. The ability to view externally stored audit records is provided by the operational environment. All TOE audit records include a time stamp that comes from either the TOE&rsquo;s internal clock or from an optional NTP server.</p>\r\n<p><strong><em>Cryptographic Support</em></strong><strong></strong></p>\r\n<p>The TOE includes NIST-validated cryptographic mechanisms that provide key management, random bit generation, encryption/decryption, digital signature; cryptographic hashing, and keyed hash message authentication capabilities in support of higher level cryptographic protocols, including SSH and HTTPS.</p>\r\n<p>Furthermore, the underlying cryptographic support is used to ensure that wireless communications can be secured (e.g., using WPA2).</p>\r\n<p>The TOE must be configured and operated in FIPS mode.<strong><em> </em></strong></p>\r\n<p><strong><em>User Data Protection</em></strong></p>\r\n<p>The TOE performs network switching and routing functions, passing network traffic among its various wireless, physical, and logical network connections. While implementing applicable network protocols associated with network traffic forwarding, the TOE is designed to ensure that it doesn&rsquo;t inadvertently reuse data found in network traffic.</p>\r\n<p>The TOE implements WPA2 to encrypt and decrypt wireless network traffic as it is sent and received.<strong><em> </em></strong></p>\r\n<p><strong><em>Identification and Authentication</em></strong><strong></strong></p>\r\n<p>The TOE requires users (i.e., administrators) to be successfully identified and authenticated before they can access any security management functions provided by the TOE. The TOE supports the local (i.e., on device) definition of administrators with usernames and passwords. Additionally, in the evaluated configuration the TOE can be configured to utilize the services of trusted RADIUS and TACACS/TACACS+ servers in the operational environment. These could be used to support, for example, centralized user administration.</p>\r\n<p>The TOE implements 802.1X to support the authentication and authorization of wireless clients prior to establishing secure wireless sessions.</p>\r\n<p><strong><em>Security Management</em></strong><strong></strong></p>\r\n<p>The TOE provides Command Line Interface (CLI) commands and a Web-based Graphical User Interface (Web GUI) to access the security management functions. The TOE&rsquo;s CLI can be accessed locally via a directly-connected console device and remotely via SSH. The GUI can be accessed remotely via HTTPS. Security management commands are limited to administrators and are available only after they have provided acceptable user identification and authentication data to the TOE.</p>\r\n<p>The TOE provides wireless clients access to manage their own credentials once connected, but otherwise security management functions are limited to administrators.<strong><em></em></strong></p>\r\n<p><strong><em>Protection of the TSF</em></strong><strong></strong></p>\r\n<p>The TOE protects particularly sensitive data such as stored passwords and cryptographic keys so that they are not accessible even by an administrator. It also provides its own timing mechanism to ensure that reliable time information is available (e.g., for log accountability) and to ensure that information can be synchronized with a reliable time source.</p>\r\n<p>The TOE implements cryptographic protocols to protect communication between TOE components as well as between TOE and other components in the operational environment (e.g., administrator workstations).</p>\r\n<p>The TOE includes functions to perform self-tests so that it might detect when it is failing. There is also self-test functionality that verifies the integrity of the TOE&rsquo;s stored executable files. This protects against corrupted executables that would cause unexpected or insecure behavior. There are also mechanisms so that the TOE itself can be updated while ensuring that the updates will not introduce malicious or other unexpected changes in the TOE.</p>\r\n<p><strong><em>Resource Utilization</em></strong></p>\r\n<p>The TOE can limit network connections in order to ensure that administrators will be able to connect when they need to perform security management operations on the TOE. <strong><em></em></strong></p>\r\n<p><strong><em>TOE Access</em></strong><strong></strong></p>\r\n<p>The TOE can be configured to display an informative banner when an administrator establishes an interactive session and subsequently will enforce an administrator-defined inactivity timeout value after which an inactive session will be terminated.</p>\r\n<p><strong><em>Trusted Path/Channels</em></strong><strong></strong></p>\r\n<p>The TOE protects interactive communication with administrators using SSHv2 for CLI access or HTTPS for Web GUI access. In each case, the cryptographic protocols protect confidentiality and integrity of communicated data. Similarly, remote wireless client communications are protected using WPA2 that involve the use of supporting cryptographic functions to ensure those wireless sessions are not subject to disclosure or modification.</p>\r\n<p>The TOE protects communication with network peers, such as a log server or time server, using IPsec via IPv4 or IPv6 connections to prevent unintended disclosure or modification of logs or time updates.</p>","features":[]}