{"product_id":11069,"v_id":11069,"product_name":"Alcatel-Lucent Enterprise OmniSwitch series 6465, 6560, 6860, 6865, 6900, 9900 with AOS 8.6.R11","certification_status":"Certified","certification_date":"2021-04-30T00:00:00Z","tech_type":"Network Device","vendor_id":{"name":"ALE USA Inc","website":"https://www.al-enterprise.com/"},"vendor_poc":"Eric Tolliver","vendor_phone":"(818) 878-4816","vendor_email":"eric.tolliver@al-enterprise.com","assigned_lab":{"cctl_name":"atsec information security corporation"},"product_description":"<p>The Target of Evaluation (TOE) is Alcatel-Lucent Enterprise OmniSwitch series 6465, 6560, 6860, 6865, 6900, 9900 with AOS 8.6.R11.</p>\r\n<p>The TOE is a network switch comprised of hardware and firmware. The firmware is Alcatel-Lucent Operating System (AOS) with the single purpose operating system that operates the management functions of all the Alcatel-Lucent Enterprise OmniSwitch switches.</p>\r\n<p>The TOE provides Layer-2 switching, Layer-3 routing, and traffic filtering. Layer-2 switching analyzes incoming frames and makes forwarding decisions based on information contained in the frames. Layer-3 routing determines the next network point to which a packet should be forwarded toward its destination. Filtering controls network traffic by controlling whether packets are forwarded or blocked at the TOE&rsquo;s interfaces.</p>","evaluation_configuration":"<p>The TOE hardware and firmware consists of the following families/series.</p>\r\n<p align=\"center\">TOE Hardware Configurations Covered by the Evaluation</p>\r\n<div align=\"center\">\r\n<table class=\"MsoNormalTable\" style=\"border-collapse: collapse; mso-table-layout-alt: fixed; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt; mso-border-insideh: .5pt solid windowtext; mso-border-insidev: .5pt solid windowtext;\" border=\"1\" width=\"0\" cellspacing=\"0\" cellpadding=\"0\">\r\n<thead>\r\n<tr>\r\n<td valign=\"top\" width=\"210\">\r\n<p>Family / Series</p>\r\n</td>\r\n<td valign=\"top\" width=\"187\">\r\n<p>AOS Version</p>\r\n</td>\r\n<td valign=\"top\" width=\"222\">\r\n<p>Main Processor</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\" width=\"210\">\r\n<p>OmniSwitch6465 (OS6465)</p>\r\n</td>\r\n<td valign=\"top\" width=\"187\">\r\n<p>AOS 8.6.9.R11</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n<td valign=\"top\" width=\"222\">\r\n<p>ARM Cortex-A9</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\" width=\"210\">\r\n<p>OmniSwitch 6560 (OS6560</p>\r\n</td>\r\n<td valign=\"top\" width=\"187\">\r\n<p>AOS 8.6.9.R11</p>\r\n</td>\r\n<td valign=\"top\" width=\"222\">\r\n<p>ARM Cortex-A9</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\" width=\"210\">\r\n<p>OmniSwitch 6860 (OS6860)</p>\r\n</td>\r\n<td valign=\"top\" width=\"187\">\r\n<p>AOS 8.6.9.R11</p>\r\n</td>\r\n<td valign=\"top\" width=\"222\">\r\n<p>ARM Cortex-A9</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\" width=\"210\">\r\n<p>OmniSwitch 6865 (OS6865</p>\r\n</td>\r\n<td valign=\"top\" width=\"187\">\r\n<p>AOS 8.6.9.R11</p>\r\n</td>\r\n<td valign=\"top\" width=\"222\">\r\n<p>ARM Cortex-A9</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td rowspan=\"3\" valign=\"top\" width=\"210\">\r\n<p>OmniSwitch 6900 (OS6900)</p>\r\n</td>\r\n<td rowspan=\"3\" valign=\"top\" width=\"187\">\r\n<p>AOS 8.6.9.R11</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n<td valign=\"top\" width=\"222\">\r\n<p>NXP MPC8572</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\" width=\"222\">\r\n<p>NXP QorIQ P2040</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td valign=\"top\" width=\"222\">\r\n<p>Intel Atom C2538</p>\r\n</td>\r\n</tr>\r\n<tr style=\"mso-yfti-irow: 8; mso-yfti-lastrow: yes; height: 6.7pt;\">\r\n<td valign=\"top\" width=\"210\">\r\n<p>OmniSwitch9900 (OS9900)</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n<td valign=\"top\" width=\"187\">\r\n<p>AOS 8.6.9.R11</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n<td valign=\"top\" width=\"222\">\r\n<p>Intel Atom C2518</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n</tr>\r\n</thead>\r\n</table>\r\n</div>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process. The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 R5. The evaluation methodology used by the evaluation team to conduct the evaluation was the Common Methodology for Information Technology Security Evaluation, Version 3.1, R5. The product, when delivered and configured as identified in the Preparation and Operations of Common Criteria Evaluated OmniSwitch Products (NDcPP), meets the requirements of the collaborative Protection Profile for Network Devices Version 2.1.</p>\r\n<h3><span lang=\"DE\">Alcatel-Lucent Enterprise OmniSwitch series </span><span lang=\"DE\">6465, 6560, 6860, 6865, 6900, 9900 with AOS 8.6.R11</span></h3>\r\n<p>Preparation and Operations of Common Criteria Evaluated OmniSwitch Products (NDcPP) document satisfies all of the security functional requirements stated in the Alcatel-Lucent Enterprise OmniSwitch series 6465, 6560, 6860, 6865, 6900, 9900 with AOS 8.6.R11 Security Target, version 3.1. The evaluation was subject to CCEVS Validator review. The evaluation was completed in April 2021. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report number CCEVS-VR-VID11069-2021, prepared by CCEVS.</p>","environmental_strengths":"<h3>Audit</h3>\r\n<p>The TOE generates audit records for events required by NDcPP. The audit records can be displayed on the serial console. The TOE writes audit records to a set of circular files stored in the systems flash memory. The TOE also provides the ability to send the audit records to an external syslog server using a secure channel.</p>\r\n<h3>Identification and Authentication</h3>\r\n<p>The TOE performs identification and authentication of TOE administrators as follows:</p>\r\n<p><!-- [if !supportLists]-->&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->TOE administrators accessing (either locally or remotely) the CLI via a serial console or an SSH session.</p>\r\n<p><!-- [if !supportLists]-->&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->TOE administrators accessing TOE storage using SFTP via an SSH session.</p>\r\n<p><!-- [if !supportLists]-->&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->A SNMP Management Station accessing the TOE through the SNMP management interface.</p>\r\n<p>The TOE provides the ability to lock out the administrators after a configurable number of unsuccessful attempts and terminate the logon session after a configurable period of inactivity.</p>\r\n<p>The TOE supports the following identification and authentication mechanisms:</p>\r\n<p><!-- [if !supportLists]-->&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->Identification and authentication performed by the TOE using credentials stored in the local file system.</p>\r\n<p><!-- [if !supportLists]-->&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->Identification and authentication performed by the TOE using credentials stored in an LDAP server.</p>\r\n<p><!-- [if !supportLists]-->&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->Identification and authentication performed by the external authentication server RADIUS.</p>\r\n<h3>Security Management</h3>\r\n<p>The security functions listed in the Security Target can be managed by authorized administrators through the management interfaces serial console, CLI, and SNMPv3.</p>\r\n<h3>TOE Security Functionality (TSF) Protection</h3>\r\n<p>The TOE protects itself by requiring administrators to identify and authenticate themselves prior to performing any actions and by defining the access allowed by each administrator.</p>\r\n<p>The TOE uses the filesystem access control to protect access to sensitive data like cryptographic keys and credentials.</p>\r\n<p>The TOE ensures that the TOE firmware updates are trusted by verifying the integrity of the updates.</p>\r\n<p>The TOE implements self-tests to ensure the correct operation of cryptographic services.</p>\r\n<p>The TOE provides a reliable date and time that is used for audit record timestamps, certificate verification and session timing.</p>\r\n<h3>Cryptographic Support</h3>\r\n<p>The TOE provides cryptographic services for secure communication channels, encryption of stored passwords, and verification of the integrity of the TOE firmware.</p>\r\n<p>The TOE implements several cryptographic protocols that can be used to establish trusted channels to other IT entities.</p>\r\n<p>The TOE provides cryptographic services via the following cryptographic modules.</p>\r\n<p><!-- [if !supportLists]-->&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->OpenSSL</p>\r\n<p><!-- [if !supportLists]-->&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->OpenSSH</p>\r\n<h3>TOE Access</h3>\r\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The TOE displays an administrator-configurable banner before the administrator successfully logs onto the TOE (either serial console, SSH, or SFTP).</p>\r\n<p>Trusted Path/Channels</p>\r\n<p>The TOE supports the use of the following cryptographic protocols that define a trusted channel between itself and external IT entities.</p>\r\n<p><!-- [if !supportLists]-->&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->TLS (v1.1 and v1.2)</p>\r\n<p><!-- [if !supportLists]-->&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <!--[endif]-->SSHv2</p>","features":[]}