{"product_id":11377,"v_id":11377,"product_name":"DataSoft RAP-117","certification_status":"Certified","certification_date":"2023-07-26T00:00:00Z","tech_type":"Network Device","vendor_id":{"name":"DataSoft Corporation","website":"www.datasoft.com"},"vendor_poc":"Vik Patel","vendor_phone":"480-763-5777x401","vendor_email":"vik.patel@datasoft.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p class=\"MsoNormal\" style=\"text-align: justify;\">The Datasoft RAP-117 provides a small form factor Radio Access Point (RAP), which allows mobile and dismounted operators to perform Command and Control (or &ldquo;C2&rdquo;) related computing functions securely across existing tactical communications networks.<span style=\"mso-spacerun: yes;\">&nbsp; </span>With the ability to process the data communications for a variety of C2-related applications, the TOE is a subsystem that provides lightweight wireless connectivity (with support for multicast traffic) between commercial mobile computing platforms (i.e., smartphone, tablet, etc.) and the secure military radios at the tactical edge.</p>","evaluation_configuration":"<p class=\"MsoNormal\">The evaluated configuration consists of the <span style=\"mso-bidi-font-size: 10.0pt; mso-no-proof: yes;\">DataSoft</span> <span style=\"mso-bidi-font-size: 10.0pt; mso-no-proof: yes;\">RAP-117 </span>(HW version 2.0 and FW version 2.2.0).</p>","security_evaluation_summary":"<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\">The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation demonstrated that <span style=\"mso-bidi-font-style: italic;\">the TOE </span>meets the security requirements contained in the Security Target.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The criteria against which the TOE was judged are described in the <em>Common Criteria for Information Technology Security Evaluation</em>, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the <em>Common Methodology for Information Technology Security Evaluation, Evaluation Methodology</em>, Version 3.1, Revision 5, April 2017.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The product, when delivered and configured as identified in the <em><span style=\"mso-no-proof: yes;\">DataSoft RAP-117 WLAN Access System and IPsec VPN Gateway CC Configuration Guide</span></em>, Version 1.2, July 25<span style=\"mso-no-proof: yes;\">, 2023</span> document, satisfies all of the security functional requirements stated in the <em><span style=\"mso-no-proof: yes;\">DataSoft RAP-117 Security Target</span></em>, Version 1.4, July 25<span style=\"mso-no-proof: yes;\">, 2023</span>.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The project underwent CCEVS Validator review.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation was completed in <span style=\"mso-no-proof: yes;\">July 2023</span>.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Results of the evaluation can be found in the <em>Common Criteria Evaluation and Validation Scheme Validation Report</em> (report number CCEVS-VR-VID<span style=\"mso-no-proof: yes;\">11377-2023</span>) prepared by CCEVS.</p>","environmental_strengths":"<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\">The logical boundaries of the <span style=\"mso-no-proof: yes;\">DataSoft</span> <span style=\"mso-no-proof: yes;\">RAP-117</span> are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p class=\"MsoNormal\">&nbsp;</p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Security audit:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"font-family: 'Times New Roman',serif;\">The TOE provides auditing capabilities to provide a secure and reliable way to trace all changes to the system. <span style=\"mso-spacerun: yes;\">&nbsp;</span>Any administrative configuration changes during provisioning and other auditable events are audited internally and then transmitted externally over a secure communication channel to an audit server. All audited events have the necessary details like timestamp, event log, event code, and identity of the party involved to provide a comprehensive audit trail.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Cryptographic support:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"font-family: 'Times New Roman',serif;\">The TOE provides cryptographic functions for secure administration access via SSH; for communications with VPN clients via IPsec; for wireless communication via WPA2/WPA3 and for communication to external systems such as audit log servers and RADIUS via IPsec. <span style=\"mso-spacerun: yes;\">&nbsp;</span>Functions include Key generation, key establishment, key distribution, key destruction, and cryptographic operations.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Identification and authentication:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"font-family: 'Times New Roman',serif;\">The TOE provides secure connectivity between wireless clients via 802.1X authentication. The TOE supports certificate based authentication via external RADIUS server and supports SAE authentication via a local authentication mechanism. The TOE provides secure password-based and public key based authentication for remote administrators. <span style=\"mso-spacerun: yes;\">&nbsp;</span>The TOE also provides strong password requirements that the administrator can configure, including length, session timeout and password complexity. Consecutive unsuccessful attempts beyond a certain limit will result in locking of the user for a specified duration of time or until user unlock by another administrator.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Security management:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"font-family: 'Times New Roman',serif;\">TOE administrators manage the security functions of the TOE through a SSH CLI. <span style=\"mso-spacerun: yes;\">&nbsp;</span>Administration cannot be performed from a wireless client.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE also provides the ability to configure the session activity timeout of an administrator and to configure the TOE&rsquo;s access banner.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Packet filtering:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\">The TOE provides packet filtering and secure IPsec tunneling. <span style=\"mso-spacerun: yes;\">&nbsp;</span>The tunnels can be established with trusted VPN peers and VPN Clients. More accurately, these tunnels are sets of security associations (SAs). The SAs define the protocols and algorithms to be applied to sensitive packets and specify the keying material to be used.<span style=\"mso-spacerun: yes;\">&nbsp; </span>SAs are unidirectional and are established per the ESP security protocol.<span style=\"mso-spacerun: yes;\">&nbsp; </span>An authorized administrator can define the traffic that needs to be protected via IPsec by configuring access lists (permit, deny, log) and applying these access lists to interfaces using crypto map sets.</p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Protection of the TSF:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"font-family: 'Times New Roman',serif;\">The TOE provides image integrity verification to validate the authenticity of the images before loading them. Upon every boot up, power on self-tests are conducted to validate the integrity of the software components. If power-up self-tests fail, the TOE halts boot. The TOE also allows manual configuration of the TOE&rsquo;s real time clock (RTC) by administrators.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE protects cryptographic keys and passwords from unauthorized access.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>TOE access:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"font-family: 'Times New Roman',serif;\">The TOE offers a login banner which provides the administrator to ability to display a custom warning/access policy message as per the organization needs. <span style=\"mso-spacerun: yes;\">&nbsp;</span>The TOE is capable of restricting wireless access based on time and day. <span style=\"mso-spacerun: yes;\">&nbsp;</span>The TOE provides the ability to configure an inactivity timeout which terminates the session beyond the inactivity period configured. <span style=\"mso-spacerun: yes;\">&nbsp;</span>An administrator can also terminate their own session.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Trusted path/channels:</strong></p>\r\n<p class=\"Body\">The TOE communicates to external components in a secure manner using WPA2/WPA3 for wireless clients and using IPsec for VPN Clients, a RADIUS server, and a syslog server.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE also employs SSH to secure remote administrative sessions.</p>","features":[]}