{"product_id":10609,"v_id":10609,"product_name":"Cisco Aggregation Services Router (ASR) 1000 Series, IOS XE 3.13","certification_status":"Certified","certification_date":"2015-06-11T00:00:00Z","tech_type":"Network Device, Virtual Private Network","vendor_id":{"name":"Cisco Systems, Inc.","website":"https://www.cisco.com"},"vendor_poc":"Cert Team","vendor_phone":"+1 410-309-4862","vendor_email":"certteam@cisco.com","assigned_lab":{"cctl_name":"Booz Allen Hamilton Common Criteria Testing Laboratory"},"product_description":"<p>The Security Target (ST) defines the Information Technology (IT) security requirements for the Cisco Aggregation Services Router (ASR) 1000 Series. The Cisco ASR 1000 Series delivers embedded hardware acceleration for multiple Cisco IOS&reg; XE Software services. In addition, the Cisco ASR 1000 Series Router features redundant Route and Embedded Services Processors, as well as software-based redundancy. In support of the routing capabilities, the Cisco ASR 1000 Series provides IPSec connection capabilities to facilitate secure communications with external entities, as required.</p>","evaluation_configuration":"<p>The TOE is a hardware and software solution that makes up the router models as follows: Chassis: ASR1001X, ASR 1002X, ASR 1006, ASR 1013; Embedded Services Processors (ESP): ESP100, ESP200; Route Processor (RP): RP2. The network, on which they reside, is considered part of the environment. The software is pre-installed and is comprised of the Cisco IOS-XE software image Release 3.13. In addition, the software image is also downloadable from the Cisco web site. A login id and password is required to download the software image. The TOE is comprised of the following physical specifications as described in the table below:</p>\r\n<table style=\"width: 1000px; height: 436px;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\" align=\"left\">\r\n<thead>\r\n<tr>\r\n<td valign=\"top\" width=\"75\">\r\n<p><strong>Hardware Model</strong></p>\r\n</td>\r\n<td valign=\"top\" width=\"106\">\r\n<p><strong>ASR 1001-X</strong></p>\r\n</td>\r\n<td valign=\"top\" width=\"108\">\r\n<p><strong>ASR 1002-X</strong></p>\r\n</td>\r\n<td valign=\"top\" width=\"120\">\r\n<p><strong>ASR 1006</strong></p>\r\n</td>\r\n<td valign=\"top\" width=\"120\">\r\n<p><strong>ASR 1013</strong></p>\r\n</td>\r\n</tr>\r\n</thead>\r\n<tbody>\r\n<tr>\r\n<td valign=\"top\" width=\"75\">\r\n<p><strong>Size</strong></p>\r\n</td>\r\n<td valign=\"top\" width=\"106\">\r\n<p>1-Rack Unit</p>\r\n</td>\r\n<td valign=\"top\" width=\"108\">\r\n<p>2-Rack Units</p>\r\n</td>\r\n<td valign=\"top\" width=\"120\">\r\n<p>6-Rack Units</p>\r\n</td>\r\n<td valign=\"top\" width=\"120\">\r\n<p>13-Rack Units</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\" width=\"75\">\r\n<p><strong>Power</strong></p>\r\n</td>\r\n<td valign=\"top\" width=\"106\">\r\n<p>DC power: 500W</p>\r\n<p>AC Power: 471W</p>\r\n</td>\r\n<td valign=\"top\" width=\"108\">\r\n<p>DC power: 590W</p>\r\n<p>AC Power: 560W</p>\r\n</td>\r\n<td valign=\"top\" width=\"120\">\r\n<p>DC power: 1700W</p>\r\n<p>AC Power: 1600W</p>\r\n</td>\r\n<td valign=\"top\" width=\"120\">\r\n<p>DC power: 4000W</p>\r\n<p>AC Power: 3760W</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\" width=\"75\">\r\n<p><strong>Supported ESPs</strong></p>\r\n</td>\r\n<td valign=\"top\" width=\"106\">\r\n<p>Integrated ESP</p>\r\n</td>\r\n<td valign=\"top\" width=\"108\">\r\n<p>Integrated ESP</p>\r\n</td>\r\n<td valign=\"top\" width=\"120\">\r\n<p>Dual ESP100</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n<td valign=\"top\" width=\"120\">\r\n<p>Dual ESP100</p>\r\n<p>ESP200</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\" width=\"75\">\r\n<p><strong>Supported RPs</strong></p>\r\n</td>\r\n<td valign=\"top\" width=\"106\">\r\n<p>Integrated RP</p>\r\n</td>\r\n<td valign=\"top\" width=\"108\">\r\n<p>Integrated RP</p>\r\n</td>\r\n<td valign=\"top\" width=\"120\">\r\n<p>Dual RP2</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n<td valign=\"top\" width=\"120\">\r\n<p>Dual RP2</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\" width=\"75\">\r\n<p><strong>SPA Slots</strong></p>\r\n</td>\r\n<td valign=\"top\" width=\"106\">\r\n<p>1 SPA slot</p>\r\n</td>\r\n<td valign=\"top\" width=\"108\">\r\n<p>1 SPA slot</p>\r\n</td>\r\n<td valign=\"top\" width=\"120\">\r\n<p>12 SPA slots</p>\r\n</td>\r\n<td valign=\"top\" width=\"120\">\r\n<p>24 SPA slots</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\" width=\"75\">\r\n<p><strong>Interfaces</strong></p>\r\n</td>\r\n<td valign=\"top\" width=\"106\">\r\n<ul>\r\n<li>Port Adapter Interface</li>\r\n</ul>\r\n<ul>\r\n<li>Console Port</li>\r\n</ul>\r\n<ul>\r\n<li>Auxiliary Port</li>\r\n</ul>\r\n<ul>\r\n<li>10/100 BITS Ethernet Port</li>\r\n</ul>\r\n<ul>\r\n<li>10/100 Management Ethernet Port</li>\r\n</ul>\r\n<ul>\r\n<li>USB Port</li>\r\n</ul>\r\n<ul>\r\n<li>GigE Ports (4)</li>\r\n<li>Port Adapter Interface</li>\r\n</ul>\r\n</td>\r\n<td valign=\"top\" width=\"108\">\r\n<ul>\r\n<li>Console Port</li>\r\n</ul>\r\n<ul>\r\n<li>Auxiliary Port</li>\r\n</ul>\r\n<ul>\r\n<li>10/100 BITS Ethernet Port</li>\r\n</ul>\r\n<ul>\r\n<li>10/100 Management Ethernet Port</li>\r\n</ul>\r\n<ul>\r\n<li>USB Port</li>\r\n</ul>\r\n<ul>\r\n<li>GigE Ports (4)</li>\r\n<li>Port Adapter Interface (12)</li>\r\n</ul>\r\n</td>\r\n<td valign=\"top\" width=\"120\">\r\n<ul>\r\n<li>Console Port</li>\r\n</ul>\r\n<ul>\r\n<li>Auxiliary Port (2)</li>\r\n</ul>\r\n<ul>\r\n<li>10/100 BITS Ethernet Port (2)</li>\r\n</ul>\r\n<ul>\r\n<li>10/100 Management Ethernet Port (2)</li>\r\n</ul>\r\n<ul>\r\n<li>USB Ports (4)</li>\r\n<li>Port Adapter Interface (24)</li>\r\n</ul>\r\n</td>\r\n<td valign=\"top\" width=\"120\">\r\n<ul>\r\n<li>Console Port</li>\r\n</ul>\r\n<ul>\r\n<li>Auxiliary Port (2)</li>\r\n</ul>\r\n<ul>\r\n<li>10/100 BITS Ethernet Port (4)</li>\r\n</ul>\r\n<ul>\r\n<li>10/100 Management Ethernet Port (4)</li>\r\n</ul>\r\n<ul>\r\n<li>USB Ports (4)</li>\r\n</ul>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes and procedures. Cisco Aggregation Services Router (ASR) 1000 Series with the IOS XE 3.13 software version was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 4. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 4. The product, when configured as identified in the <em>Cisco Aggregation Services Router (ASR) 1000 Series Common Criteria Operational User Guidance and Preparative Procedures version 0.4</em> document, satisfies all of the security functional requirements stated in the <em>Cisco Aggregation Services Router (ASR) 1000 Series Security Target, Version 0.4</em>. The evaluation underwent CCEVS Validation review. The evaluation was completed in June 2015. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report, (report number CCEVS-VR-VID10609-2015, dated June 11, 2015) prepared by CCEVS.</p>","environmental_strengths":"<p><strong><em>Security Audit</em></strong></p>\r\n<p>The TOE can audit events related to cryptographic functionality, identification and authentication, and administrative actions. The Cisco ASR 1000 Series generates an audit record for each auditable event. The administrator configures auditable events, performs back-up operations and manages audit data storage. The TOE provides the administrator with a circular audit trail or a configurable audit trail threshold to track the storage capacity of the audit trail. Audit logs are backed up over an encrypted channel to an external audit server.</p>\r\n<p><strong><em>Cryptographic Support</em></strong></p>\r\n<p>The TOE provides cryptography in support of secure trusted path and channel connections with administrators and other IT entities via IPsec and SSHv2.</p>\r\n<p><strong><em>User Data Protection</em></strong></p>\r\n<p>The TOE ensures that all information flows from the TOE do not contain residual information from previous traffic. Packets are padded with zeros. Residual data is never transmitted from the TOE.</p>\r\n<p><strong><em>Identification and Authentication</em></strong></p>\r\n<p>The TOE performs two types of authentication: device-level authentication of the remote device (VPN peers) and user authentication for the Authorized Administrator of the TOE. Device-level authentication allows the TOE to establish a secure channel with a trusted peer. Device-level authentication is performed via IKE/IPsec mutual authentication. The TOE supports use of IKEv1 (ISAKMP) and IKEv2 pre-shared keys for authentication of IPsec tunnels.</p>\r\n<p>The TOE provides authentication services for administrative users attempting to connect to the TOE&rsquo;s local console and secure remote CLI administrative interfaces. Password-based authentication can be performed on all interfaces and public key authentication is available via the secure remote CLI only. The TOE provides administrator authentication against a local user database or a RADIUS AAA server.</p>\r\n<p><strong><em>Security Management</em></strong></p>\r\n<p>The TOE provides the ability to securely manage all TOE administrative users; all identification and authentication; all audit functionality of the TOE; all TOE cryptographic functionality; the timestamps maintained by the TOE; updates to the TOE; configuration of IPsec functionality; and TOE configuration file storage and retrieval. The TOE supports multiple administrative roles that restrict access to TOE functions depending on the admin role assigned to a user. The management interfaces are the remote CLI via SSHv2 or IPsec and the local console.</p>\r\n<p><strong><em>Packet Filtering</em></strong></p>\r\n<p>The TOE provides packet filtering and secure IPsec tunneling. The tunnels can be established between two trusted VPN peers as well as between remote VPN clients and the TOE. More accurately, these tunnels are sets of security associations (SAs). The SAs define the protocols and algorithms to be applied to sensitive packets and specify the keying material to be used. SAs are unidirectional and are established per the ESP security protocol. An authorized administrator can define the traffic that needs to be protected via IPsec by configuring access lists (permit, deny, log) and applying these access lists to interfaces using crypto map sets.</p>\r\n<p><strong><em>Protection of the TSF</em></strong></p>\r\n<p>The TOE provides protection of TSF data (authentication data and cryptographic keys). In addition, the TOE internally maintains the date and time. This date and time is used as the time stamp that is applied to TOE generated audit records. This time can be set manually, or an NTP server (or servers) can be used to synchronize the date-timestamp. The TOE is also capable of verifying software updates prior to the software updates being installed. Finally, the TOE performs testing to verify correct operation of the appliance itself and the cryptographic module.</p>\r\n<p><strong><em>TOE Access</em></strong></p>\r\n<p>The TOE can terminate inactive sessions after an Authorized Administrator configurable time-period. The TOE also allows users to terminate their own interactive session. Once a session has been terminated the TOE requires the user to re-authenticate to establish a new session. The TOE can also display an Authorized Administrator specified banner on the local console and remote CLI prior to allowing any administrative access to the TOE.</p>\r\n<p><strong><em>Trusted Path/Channels</em></strong></p>\r\n<p>The TOE establishes a trusted path between the TOE and the remote CLI using SSHv2 or IPsec. The TOE establishes a secure IPsec connection to an external syslog server to send audit data, to a CA server to validate certificates, and to an external authentication server to authenticate users. The TOE can also establish trusted paths of peer-to-peer IPsec sessions.</p>","features":[]}