{"product_id":10577,"v_id":10577,"product_name":"Brocade VDX 6700 and 8700 Series products with NOS v5.0","certification_status":"Certified","certification_date":"2015-05-08T00:00:00Z","tech_type":"Network Device, Network Switch, Router","vendor_id":{"name":"Brocade Communications Systems LLC A Broadcom Inc. Company","website":"www.broadcom.com"},"vendor_poc":"Christopher Marks","vendor_phone":"408-333-2400","vendor_email":"marksc@brocade.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p class=\"Body\">The Target of Evaluation (TOE) is the Brocade Communications Systems, Inc. VDX Product Series operating with NOS version 5.0.1b1.&nbsp;</p>\r\n<p class=\"Body\">The Target of Evaluation (TOE) is the Brocade VDX Product Series.&nbsp; The VDX Product Series are hardware appliance with embedded software installed on a management processor.&nbsp; Optionally, a number of co-located appliances can be connected in order to work as a unit with a common security policy. The embedded software is a version of Brocades' proprietary Multiservice Network Operating System (NOS). The NOS controls the switching and routing of network frames and packets among the connections available on the hardware appliances.&nbsp; These switch/routers include virtual cluster switch (VCS), which allows users to create flatter, virtualized and converged data center networks.&nbsp; These VCS fabrics are scalable, permitting users to expand at their own pace, and simplified, allowing users to manage the fabric as a single entity.&nbsp; VCS-based Ethernet fabrics are convergence-capable, with technologies such as Fibre Channel over Ethernet (FCoE) for storage.</p>\r\n<p class=\"Body\">All TOE appliances are configured at the factory with default parameters and an admin and user account with default passwords.&nbsp; Users must login to access the system&rsquo;s basic features through its Command Line Interface (CLI).&nbsp; However, the product should be configured in accordance with the evaluated configuration prior to being placed into operation. The CLI is a text based interface which is accessible from a directly connected terminal or via a remote terminal using SSH. The TOE uses SCP to download/compare software images. All of the remote management interfaces are protected using encryption as explained later in this ST.</p>\r\n<p class=\"Body\">The VDX 6710 switch is a fixed port switch with 48 1-Gigabit Ethernet copper interfaces and six 10 Gigabit Ethernet SFP+ interfaces.&nbsp; The VDX 6720 switches are also fixed port switches with either 24 10-Gigabit LAN ports or 60 10-Gigabit LAN ports, depending on the model.&nbsp; The VDX 6730 switch is a 10-Gigabit Ethernet fixed port switch with LAN and native Fibre Channel ports.&nbsp; Depending on the model, it either provides 24 10-Gigabit Ethernet LAN ports and eight 8-Gbps native Fibre Channel ports, or 60 10-Gigabit Ethernet LAN ports and 16 8-Gbps native Fibre Channel ports.&nbsp; The 6710, 6720 and 6730 hardware platforms that support the TOE have a number of common hardware characteristics:</p>\r\n<ul>\r\n<li>A system motherboard that features a Reduced Instruction Set Computer (RISC) CPU running at 1.3 GHz with integrated peripherals</li>\r\n<li>Extensive diagnostics and system-monitoring capabilities for enhanced high Reliability, Availability, and Serviceability (RAS)</li>\r\n<li>A USB port for firmware upgrades and system log downloads</li>\r\n<li>Support for long-range and short-range SFP+ 10-Gigabit Ethernet transceivers</li>\r\n</ul>\r\n<p class=\"Body\">The VDX 8770-4 switch provides up to 192 10-Gigabit Ethernet or 1 Gigabit Ethernet external ports or 48 40-Gigabit Ethernet external ports, while the VDX 8770-8 switch provides up to 384 10-Gigabit Ethernet or 1 Gigabit external ports or 96 40-Gigabit Ethernet external ports.&nbsp; The 8770 hardware platforms that support the TOE have a number of common hardware characteristics:</p>\r\n<p class=\"Body\">&nbsp;</p>\r\n<ul>\r\n<li>Dual, redundant management modules</li>\r\n<li>Serial (console), Ethernet, and USB connections for management modules (though only Brocade-branded USB devices are supported)</li>\r\n<li>Support for short-range and long-range 1 Gbps SFP transceivers</li>\r\n<li>Support for short-range and long range 10 Gbps SFP+ transceivers</li>\r\n<li>Support for 40 Gbps QSFP transceivers</li>\r\n</ul>\r\n<p class=\"Body\">&nbsp;</p>\r\n<p class=\"Body\">During normal operation, IP packets are sent to the management IP address or through the appliance over one or more of its physical network interfaces, which processes them according to the system&rsquo;s configuration and state information dynamically maintained by the appliance. This processing typically results in the frames or packets being forwarded out of the device over another interface, or dropped in accordance with a configured policy.</p>","evaluation_configuration":"<p class=\"Body\">The evaluated configuration consists of the Brocade Communications Systems, Inc. VDX Product Series operating with NOS version 5.0.1a, including the following series and models</p>\r\n<ul>\r\n<li>VDX 6710-54</li>\r\n<li>VDX 6720-24</li>\r\n<li>VDX 6720-60</li>\r\n<li>VDX 6730-32</li>\r\n<li>VDX 6730-76</li>\r\n<li>VDX 6740</li>\r\n<li>VDX 6740T</li>\r\n<li>VDX 6740T-1G</li>\r\n<li>VDX 8770-4, and</li>\r\n<li>VDX 8770-8.</li>\r\n</ul>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Brocade VDX Product Series was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 4.&nbsp; The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 4.&nbsp; Gossamer Security Solutions determined that the evaluation assurance level (EAL) for the product is EAL 1.&nbsp; The product, when delivered and configured as identified in the Brocade &ndash; Network OS Common Criteria Configuration Guide, Supporting Network OS v5.0.1b1, Publication # 53-1003789-01, 08 April 2015 document, satisfies all of the security functional requirements stated in the Brocade Communications Systems, Inc. VDX Product Series (NDPP11e3) Security Target, Version 0.7, May 11, 2015.&nbsp; The project underwent CCEVS Validator review.&nbsp; The evaluation was completed in May 2015.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID10577-2015) prepared by CCEVS</p>","environmental_strengths":"<p>The logical boundaries of the Brocade VDX Product Series TOE are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p><strong>Security Audit</strong> - The TOE generates audit events for numerous activities including policy enforcement, system management and authentication. A syslog server in the environment is relied on to store audit records generated by the TOE.&nbsp; The TOE generates a complete audit record including the IP address of the TOE, the event details, and the time the event occurred.&nbsp; The time stamp is provided by the TOE appliance hardware. When the syslog server writes the audit record to the audit trail, it applies its own time stamp, placing the entire TOE-generated syslog protocol message MSG contents into an encapsulating syslog record.</p>\r\n<p><strong>Cryptographic Support</strong> - The TOE contains FIPS-certified cryptographic implementations that provide key management, random bit generation, encryption/decryption, digital signature, secure hashing and key-hashing features in support of higher level cryptographic protocols including SSH and TLS.</p>\r\n<p><strong>User Data Protection</strong> - The TOE performs a wide variety of network switching and routing functions, passing network traffic among its various network connections. While implementing applicable network protocols associated with network traffic routing, the TOE is carefully designed to ensure that it does not inadvertently reuse data found in network traffic. This is accomplished primarily by controlling the size of all buffers, fully overwriting buffer contents, and zero-padding of memory structures and buffers when necessary.</p>\r\n<p class=\"Body\"><strong>Identification and Authentication</strong> - The TOE authenticates administrative users. In order for an administrative user to access the TOE, a user account including a user name and password must be created for the user, and an administrative role must be assigned. Either the TOE performs the validation of the login credentials or the information is passed to a RADIUS or LDAP Server to perform the validation and the TOE enforces the decision.&nbsp; The administrator can configure the order in which the external authentication provider and the local credentials are checked.</p>\r\n<p><strong>Security Management</strong> - The TOE provides Command Line Interface commands to access the wide range of security management functions to manage its security policies. Security management commands are limited to authorized users (i.e., administrators) and available only after they have provided acceptable user identification and authentication data to the TOE. The security management functions are controlled through the use of privileges associated with roles that can be assigned to TOE users. Among the available privileges, only the Authorized Administrator role can actually manage the security policies provided by the TOE and the TOE offers a complete set of functions to facilitate effective management.</p>\r\n<p><strong>TSF Protection</strong> - The TOE implements a number of features designed to protect itself while also ensuring the reliability and integrity of its security features. &nbsp;It protects particularly sensitive data such as stored passwords and cryptographic keys so that they are not accessible even by an administrator. It also provides its own timing mechanism to ensure that reliable time information is available (e.g., for log accountability).&nbsp; Note that the TOE is a single appliance or a closely grouped (e.g., in the same rack) collection of appliances acting as a unit. As such, no intra-TOE communication is subject to any risks that may require special protection (e.g., cryptographic mechanisms).&nbsp; The TOE includes functions to perform self-tests so that it might detect when it is failing. It also includes mechanisms (i.e., verification of the digital signature of each new image) so that the TOE itself can be updated while ensuring that the updates will not introduce malicious or other unexpected changes in the TOE.</p>\r\n<p><strong>TOE Access</strong> - The TOE can be configured to display a message of the day banner when an administrator establishes an interactive session and subsequently will enforce an administrator-defined inactivity timeout value after which the inactive session (local or remote) will be terminated.</p>\r\n<p><strong>Trusted Path/Channels</strong> &ndash; The TOE protects interactive communication with administrators using SSHv2 for CLI access, ensuring both integrity and disclosure protection.&nbsp; If the negotiation of an encrypted session fails or if the user does not have authorization for remote administration, an attempted connection will not be established.&nbsp; The TOE protects communication with network peers, such as a log server, using TLS connections to prevent unintended disclosure or modification of logs. SSH v2 is used to support SCP which the TOE uses for secure download of TOE updates.</p>","features":[]}