{"product_id":10566,"v_id":10566,"product_name":"Hewlett Packard Enterprise 10500 Series and 5830AF Series Switches with Comware version 5.2","certification_status":"Certified","certification_date":"2014-07-21T00:00:00Z","tech_type":"Network Device, Network Switch","vendor_id":{"name":"Hewlett Packard Enterprise Company","website":"www.hp.com"},"vendor_poc":"Bob Pittman","vendor_phone":"+1.508.467.0284","vendor_email":"bob.pittman@hp.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p class=\"Default\">The Target of Evaluation (TOE) is the Hewlett-Packard Company 10500 Series Chassis&rsquo; with HP 10500 Main Processing Unit (JC614A) running Comware v5.20.105, Release 1208 P08, and 5830AF Series Switches running Comware v5.20.105, Release 1118 P08.</p>\r\n<p class=\"Default\">The 10500 Series switches in the evaluated configuration include the 10504, 10508, 10508-V, and 10512 switch chassis&rsquo;, each equipped with a 10500 Main Processing Unit (JC614A), while the 5830AF Series switches in the evaluated configuration include the 5830AF-48G switch with 1 interface slot, and the 5830AF-96G switch. Each series consists of a set of distinct devices which vary primarily according to power delivery, performance, and port density.</p>\r\n<p class=\"Default\">While the 5830AF Series have fixed ports, the 10500 Series supports plug-in modules, which provide additional functionality (e.g., various numbers and types of network connection ports), and security blades, which offer additional advanced security functions (e.g., firewall). With the exception of pluggable security blades, all of the available plug-in modules for the 10500 series switches are included in the evaluated configuration.</p>\r\n<p class=\"Default\">The TOE can be deployed as a single device or alternately as a group of 10500 or 5830AF Series devices connected using the HP Intelligent Resilient Framework (IRF) technology to effectively form a logical switch device. The IRF technology does not require that switches be co-located, but can be attached using standard LACP for automatic load balancing and high availability.</p>\r\n<p class=\"Default\">The HP 10500 and 5830AF Series switches are Gigabit Ethernet switch appliances which consist of hardware and software components. While the physical form factor of each series is substantially different, the underlying hardware share a similar architecture. The software utilized is a common code base of a modular nature with only the modules applicable for the specific hardware installed.</p>","evaluation_configuration":"","security_evaluation_summary":"<p class=\"Default\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Hewlett-Packard HP 10500 and 5830AF Series switches were judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 3.&nbsp; The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 3.&nbsp;&nbsp; The product, when delivered and configured as identified in the <em>Preparative Procedures for CC NDPP Evaluated Hewlett-Packard Network Switch Series&rdquo;, Version 1.07, dated June 23, 2014 </em>document, satisfies all of the security functional requirements stated in the&nbsp;<em>Hewlett-Packard Company 10500 Series and 5830AF Series Switches Security Target, Version 1.0, June 20, 2014.&nbsp;&nbsp; </em>The project underwent CCEVS Validator review.&nbsp; The evaluation was completed in June 2014.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.</p>","environmental_strengths":"<p><strong><em>Security Audit</em></strong><strong></strong></p>\r\n<p>The TOE is designed to be able to generate logs for a wide range of security relevant events. The TOE can be configured to store the logs locally so they can be accessed by an administrator or alternately to send the logs to a designated log server.</p>\r\n<p><strong><em>Cryptographic Support</em></strong><strong></strong></p>\r\n<p>The TOE includes NIST-validated cryptographic algorithms that provide key management, random bit generation, encryption/decryption, digital signature and secure hashing and key-hashing features in support of higher level cryptographic protocols including IPsec, SSH, and TLS/HTTPS. Note that in order to be in the evaluated configuration, the TOE must be configured in FIPS mode, which ensures the TOE&rsquo;s configuration is consistent with the FIPS 140-2 standard.</p>\r\n<p><strong><em>User Data Protection</em></strong></p>\r\n<p>The TOE performs network switching and routing functions, passing network traffic among its various physical and logical (e.g., VLAN) network connections. While implementing applicable network protocols associated with network traffic forwarding, the TOE is designed to ensure that it doesn&rsquo;t inadvertently reuse data found in network traffic.</p>\r\n<p><strong><em>Identification and Authentication</em></strong><strong></strong></p>\r\n<p>The TOE requires users (i.e., administrators) to be successfully identified and authenticated before they can access any security management functions available in the TOE. The TOE offers both a locally connected console as well as network accessible interfaces (SSHv2 and TLSv1.0) for interactive administrator sessions.</p>\r\n<p>The TOE supports the local (i.e., on device) definition of administrators with usernames and passwords. Additionally, the TOE can be configured to utilize the services of trusted RADIUS and TACACS servers in the operational environment to support, for example, centralized user administration.</p>\r\n<p><strong><em>Security Management</em></strong><strong></strong></p>\r\n<p>The TOE provides Command Line (CLI) commands to access the wide range of security management functions. Security management commands are limited to administrators and are available only after they have provided acceptable user identification and authentication data to the TOE.</p>\r\n<p>Note that the switches also support a secure web GUI via HTTPS to access the TOE, if it is configured through the device&rsquo;s console port.&nbsp; Configuration of this feature includes configuring the username, password, privilege level, and web service type for the web login.</p>\r\n<p><strong><em>Protection of the TSF</em></strong><strong></strong></p>\r\n<p>The TOE implements a number of features designed to protect itself to ensure the reliability and integrity of its security features.</p>\r\n<p>It protects particularly sensitive data such as stored passwords and cryptographic keys so that they are not accessible even by an administrator. It also provides its own timing mechanism to ensure that reliable time information is available (e.g., for log accountability).</p>\r\n<p>When deployed as an IRF group, all devices that are part of the IRF group are co-located, directly connected to form one instance of the TOE. IRF communication is not considered communication between distributed TOE components; rather, it is communication among collocated components that logically form an instance of the TOE. Since the IRF communication channels are not protected using mechanisms such as encryption, they need to be as protected as the TOE devices themselves.</p>\r\n<p>The TOE uses cryptographic means to protect communication with remote administrators. When the TOE is configured to use the services of a Syslog server or authentication servers in the operational environment, the communication between the TOE and the operational environment component is protected using encryption.</p>\r\n<p>The TOE includes functions to perform self-tests so that it might detect when it is failing. It also includes mechanisms so that the TOE itself can be updated while ensuring that the updates will not introduce malicious or other unexpected changes in the TOE.</p>\r\n<p><strong><em>TOE Access</em></strong><strong></strong></p>\r\n<p>The TOE can be configured to display an informative banner that will appear under a variety of circumstances.&nbsp; Such instances for a banner include for it to be displayed when an administrator establishes an interactive session, in conjunction with the login prompts, as a message of the day before authentication is completed, or as a legal advisory prior to a user logging in, requiring the user to indicate whether he/she wants to continue with the authentication process. The TOE subsequently will enforce an administrator-defined inactivity timeout value after which the inactive session will be terminated.</p>\r\n<p><strong><em>Trusted Path/Channels</em></strong><strong></strong></p>\r\n<p>The TOE protects interactive communication with administrators using SSHv2 for CLI access. Using SSHv2, both integrity and disclosure protection is ensured.&nbsp; Similarly, HTTPS is used to protect the communication with administrators using the Web GUI.</p>\r\n<p>The TOE protects communication with network peers, such as a log server, using IPsec connections to prevent unintended disclosure or modification of logs.</p>","features":[]}