{"product_id":11218,"v_id":11218,"product_name":"SonicWall Secure Mobile Access (SMA) v12.4","certification_status":"Certified","certification_date":"2021-09-28T00:00:00Z","tech_type":"Network Device","vendor_id":{"name":"SonicWall, Inc.","website":"www.sonicwall.com"},"vendor_poc":"Lawrence Wagner","vendor_phone":"1-888-557-6642","vendor_email":"lwagner@SonicWall.com","assigned_lab":{"cctl_name":"CygnaCom Solutions, Inc"},"product_description":"<p>The SonicWall Secure Mobile Access (SMA) v12.4 appliance functions as a remote access gateway operating as an intermediary device between end users on client devices and network resources residing on internal network.&nbsp; The appliance provides multiple access methods for end users or client devices to remotely access internal network resources from untrusted external networks. The SMA administrator configures policies comprised of security rules operating on users and targeting resources that must be satisfied in order to establish remote access.</p>\r\n<p>The TOE is offered as SMA 6210 and SMA 7210 hardware appliances and SMA 8200v virtual appliance that are part of SMA1000 product line. The SMA 6210 and SMA 7210 are identical except for CPU, RAM, and SFP+ ports. The SMA 8200v is a virtual appliance designed to operate in virtualization environment.</p>","evaluation_configuration":"","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes and procedures. The TOE was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 R5.</p>\r\n<p>The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 R5.</p>\r\n<p>CygnaCom Solutions has determined that the product meets the security criteria in the Security Target, which specifies compliance with U.S. Government Standard Collaborative Protection Profile for Network Devices, 23 March 2021, Version 2.2e.</p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 0in;\">A team of validators, on behalf of the CCEVS Validation Body, monitored the evaluation. The evaluation was completed in September 2021.Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.</p>","environmental_strengths":"<p>The TOE is the SonicWall Secure Mobile Access (SMA) v12.4.1 which in the evaluated configuration consists of SMA 6210, SMA 7210 appliances and the SMA 8200v virtual appliance. SonicWall SMA is a unified secure access gateway that enables organizations to provide anytime, anywhere and any device access to corporate resources.</p>\r\n<p>All SMA hardware appliances are shipped ready for immediate access through a Command Line Interface (CLI) and after basic network configuration through a web-based Appliance Management Console (AMC). Virtual appliance requires installation into hypervisor environment and supports configuration through AMC. To ensure secure use the product, it must be appropriately configured prior to being put into production environment as specified in the user guidance</p>\r\n<p>The TOE is designed to provide the following functionalities:</p>\r\n<ul style=\"margin-top: 0in;\" type=\"disc\">\r\n<li>Security Audit</li>\r\n<ul style=\"margin-top: 0in;\" type=\"circle\">\r\n<li>Audit record generation for security-relevant events</li>\r\n<li class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal; mso-list: l0 level2 lfo1;\">Interoperability with a remote audit server</li>\r\n</ul>\r\n</ul>\r\n<ul style=\"margin-top: 0in;\" type=\"disc\">\r\n<li>Cryptographic Support</li>\r\n<ul style=\"margin-top: 0in;\" type=\"circle\">\r\n<li>Validated cryptographic algorithms</li>\r\n<li>Destruction of cryptographic keys</li>\r\n<li class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal; mso-list: l0 level2 lfo1;\">Entropy generation</li>\r\n</ul>\r\n</ul>\r\n<ul style=\"margin-top: 0in;\" type=\"disc\">\r\n<li>Identification and Authentication</li>\r\n<ul style=\"margin-top: 0in;\" type=\"circle\">\r\n<li>Authentication failure policies</li>\r\n<li>Password management policies</li>\r\n<li class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal; mso-list: l0 level2 lfo1;\">Password and certificate-based authentication</li>\r\n</ul>\r\n</ul>\r\n<ul style=\"margin-top: 0in;\" type=\"disc\">\r\n<li>Security Management</li>\r\n<ul style=\"margin-top: 0in;\" type=\"circle\">\r\n<li class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal; mso-list: l0 level2 lfo1;\">Local and remote administration</li>\r\n</ul>\r\n</ul>\r\n<ul style=\"margin-top: 0in;\" type=\"disc\">\r\n<li>Protection of the TOE Security Function (TSF)</li>\r\n<ul style=\"margin-top: 0in;\" type=\"circle\">\r\n<li>Self-testing on power-up</li>\r\n<li class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal; mso-list: l0 level2 lfo1;\">Trusted update</li>\r\n</ul>\r\n</ul>\r\n<ul style=\"margin-top: 0in;\" type=\"disc\">\r\n<li>TOE Access</li>\r\n<ul style=\"margin-top: 0in;\" type=\"circle\">\r\n<li>Session timeout and lockout</li>\r\n<li class=\"MsoNormal\" style=\"margin-bottom: 0in; line-height: normal; mso-list: l0 level2 lfo1;\">Access banner</li>\r\n</ul>\r\n</ul>\r\n<ul style=\"margin-top: 0in;\" type=\"disc\">\r\n<li>Trusted Path/Channels</li>\r\n<ul style=\"margin-top: 0in;\" type=\"circle\">\r\n<li>Secure channel for remote administrators</li>\r\n<li class=\"MsoNormal\" style=\"mso-list: l0 level2 lfo1;\">Secure channel for communicating with authorized IT entities</li>\r\n</ul>\r\n</ul>","features":[]}