{"product_id":11465,"v_id":11465,"product_name":"Cisco Catalyst 9400X/9600X Series Switches 17.12","certification_status":"Certified","certification_date":"2024-09-17T00:00:00Z","tech_type":"Network Device, Network Encryption","vendor_id":{"name":"Cisco Systems, Inc.","website":"https://www.cisco.com"},"vendor_poc":"Petra Manche","vendor_phone":"(408) 526-4000","vendor_email":"certteam@cisco.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p><span style=\"font-size: 10.0pt; font-family: Times, serif;\">The Cisco Catalyst 9400X/9600X Series Switches 17.12 TOE is an enterprise access and core/distribution switch for enterprise and campus deployments.&nbsp; Switches are used to connect multiple devices, such as computers, wireless access points, printers, and servers on the same network within a building or campus. A switch enables connected devices to share information and talk to each other and is a key building block for any network</span></p>","evaluation_configuration":"<div class=\"WordSection1\">\r\n<div class=\"WordSection1\">\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">Deployment of the TOE in its evaluated configuration consists of at least one TOE switch model following the CC installation and configuration guidance document (AGD).&nbsp; The TOE has two or more network interfaces and is connected to at least one internal and one external network. The Cisco IOS-XE configuration determines how packets are handled to and from the TOE&rsquo;s network interfaces. The switch configuration will determine how traffic flows received on an interface will be handled. Typically, packet flows are passed through the internet working device and forwarded to their configured destination.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The operational environment of the TOE will include at least one MACsec peer.&nbsp; The environment will also include an audit (syslog) server and a Management Workstation.&nbsp; The syslog server is used to store audit records, where the TOE uses TLS 1.2 to secure the transmission of the records.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The Cisco Catalyst 9400X/9600X Series Switches 17.12 TOE includes the <strong>cat9k_lite_iosxe.17.12.02.SPA.bin</strong> software image and is composed of the following hardware:</span></p>\r\n</div>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman', serif;\">&nbsp;</span></p>\r\n<div class=\"WordSection2\">\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">C9404R</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">C9407R</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">C9410R</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">C9400X-SUP-2</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">C9400X-SUP-2XL</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">C9400-LC-48HX</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">C9400-LC-48XS</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">C9400X-LC-48HN</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">C9400-LC-24XY</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">C9400-LC-12QC</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">C9606R</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">C9600X-SUP2</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">C9600-LC-40YL4CD</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">C9600X-LC-32CD</li>\r\n</ul>\r\n</div>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 10.0pt; font-family: Times, serif;\">&nbsp;</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n</div>","security_evaluation_summary":"<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 10.0pt; font-family: Times, serif;\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.&nbsp; The evaluation demonstrated that the TOE<em> </em>meets the security requirements contained in the Security Target.&nbsp; The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.&nbsp; The product, when delivered and configured as identified in the Cisco Catalyst 9400X/9600X Series Switches 17.12 CC Configuration Guide, Version 0.4, September 17, 2024 document, satisfies all of the security functional requirements stated in the Cisco Catalyst 9400X/9600X Series Switches 17.12 Security Target, Version 0.6, September 17, 2024.&nbsp; The project underwent CCEVS Validator review.&nbsp; The evaluation was completed in September 2024.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11465-2024) prepared by CCEVS.</span></p>","environmental_strengths":"<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The logical boundaries of the Catalyst 9400X/9600X Series Switches 17.12 are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security audit:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">Auditing allows Security Administrators to discover intentional and unintentional issues with the TOE&rsquo;s configuration<span style=\"font-family: Calibri, sans-serif;\"> </span>and/or operation.&nbsp; Auditing of administrative activities provides information that may be used to hasten corrective action should the system be configured incorrectly.&nbsp; Security audit data can also provide an indication of failure of critical portions of the TOE (e.g. a communication channel failure) or anomalous activity (e.g. establishment of an administrative session at a suspicious time, repeated failures to establish sessions or authenticate to the TOE) of a suspicious nature.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE provides extensive capabilities to generate audit data targeted at detecting such activity.&nbsp; The TOE generates an audit record for each auditable event.&nbsp; Each security relevant audit event has the date, timestamp, event description, and subject identity.&nbsp; The TOE stores audit messages in a circular audit trail configurable by the Security Administrator.&nbsp; All audit logs are transmitted to an external audit server over a trusted channel protected with TLS.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Cryptographic support:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE provides cryptographic functions to implement SSH, TLS, and MACsec protocols.&nbsp; The cryptographic algorithm implementation has been validated for CAVP conformance.&nbsp; This includes key generation and random bit generation, key establishment methods, key destruction, and the various types of cryptographic operations to provide AES encryption/decryption, signature verification, hash generation, and keyed hash generation.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The 9400X series supports MACsec using the proprietary Unified Access Data Plane (UADP) 2.0 Application-Specific Integrated Circuit (ASIC). The MACsec Controller (MSC) is embedded within the ASICs that are utilized within Cisco hardware platforms.&nbsp; The 9600X series support MACsec using the Marvell CDR5M PHY using the 400G MACsec Engine on Marvell Alaska C PHYs version X7121M C0.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">SSH and TLS protocols are implemented using the IOS Common Cryptographic Module (IC2M) and CiscoSSL FOM cryptographic modules.</p>\r\n<p style=\"text-align: justify; break-after: avoid; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Identification and authentication:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE implements three types of authentication to provide a trusted means for Security Administrators and remote servers/endpoints to securely communicate:&nbsp; X.509v3 certificate-based authentication for remote syslog servers, password-based authentication for Security Administrators, and pre-shared keys for MACsec endpoints.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">Security Administrators have the ability to compose strong passwords which are stored using a SHA-2 hash.&nbsp; Additionally, the TOE detects and tracks successive unsuccessful remote authentication attempts and will prevent the offending account from making further attempts until a Security Administrator defined period has elapsed or until the Administrator manually unblocks the account.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security management:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE provides a secure remote administrative interface and local interface to perform security management<span style=\"font-family: Calibri, sans-serif;\"> </span>functions.&nbsp; This includes ability to configure cryptographic functionality; an access banner containing an advisory notice and consent warning message; a session inactivity timer before session termination as well as an ability to update TOE software.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE provides a Security Administrator role and only the Security Administrator can perform the above security management functions.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Protection of the TSF:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE protects critical security data including keys and passwords against tampering by untrusted subjects. The TOE provides reliable timestamps to support monitoring local and remote interactive administrative sessions for inactivity, validating X.509 certificates (to determine if a certificate has expired), and to support accurate audit records.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE provides self-tests to ensure it is operating correctly, including the ability to detect software integrity failures.&nbsp; Additionally, the TOE provides an ability to perform software updates and to verify those software updates are from Cisco Systems, Inc.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>TOE access:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE monitors both local and remote admin sessions for inactivity and terminates when a threshold period is reached.&nbsp; Once a session has been terminated the TOE requires the user to re-authenticate.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE also displays a Security Administrator specified advisory notice and consent warning message prior to initiating identification and authentication for each administrative user.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Trusted path/channels:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE provides encryption (protection from disclosure and detection of modification) for communication paths between itself and remote endpoints.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 10.0pt; font-family: Times, serif;\">In addition, the TOE provides two-way authentication of each endpoint in a cryptographically secure manner, meaning that even if there was a malicious attacker between the two endpoints, any attempt to represent themselves to either endpoint of the communications path as the other communicating party would be detected.</span></p>","features":[{"id":3472,"feature_name":"Asymmetric Key Generation"},{"id":3505,"feature_name":"Auditing"},{"id":3484,"feature_name":"Certificate Authentication"},{"id":3485,"feature_name":"Certificate Validation"},{"id":3480,"feature_name":"Cryptographic Hashing"},{"id":3474,"feature_name":"Cryptographic Key Establishment"},{"id":3476,"feature_name":"Cryptographic Signature Generation"},{"id":3477,"feature_name":"Cryptographic Signature Verification"},{"id":3471,"feature_name":"DRBG"},{"id":3528,"feature_name":"Key Destruction"},{"id":3481,"feature_name":"Keyed-hash message authentication"},{"id":3469,"feature_name":"MACsec"},{"id":3466,"feature_name":"Network Switch"},{"id":3490,"feature_name":"SSH Server"},{"id":3492,"feature_name":"TLS 1.2"},{"id":3488,"feature_name":"TLS Client"}]}