{"product_id":11466,"v_id":11466,"product_name":"Cisco Catalyst Industrial Ethernet 9300 Rugged Series Switches running IOS-XE 17.12","certification_status":"Certified","certification_date":"2024-08-12T00:00:00Z","tech_type":"Network Device, Network Encryption","vendor_id":{"name":"Cisco Systems, Inc.","website":"https://www.cisco.com"},"vendor_poc":"Petra Manche","vendor_phone":"(408) 526-4000","vendor_email":"certteam@cisco.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The Cisco Catalyst Industrial Ethernet 9300 Rugged Series Switches Target of Evaluation (TOE) is comprised of both software and hardware. &nbsp;The software is comprised of the Universal Cisco Internet Operating System (IOS) XE software image Release IOS-XE 17.12. &nbsp;The Cisco Catalyst Industrial Ethernet 9300 Rugged Series Switches that comprises the TOE has common hardware characteristics. &nbsp;These characteristics affect only non-TSF relevant functions of the switches (such as throughput and amount of storage) and therefore support security equivalency of the switches in terms of hardware.</p>","evaluation_configuration":"<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE is a hardware and software solution that makes up the switch models as follows:</span></p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">IE-9310-26S2C</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">IE-9320-26S2C</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">IE-9320-22S2C4X</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">IE-9320-24T4X</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">IE-9320-24P4X</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">IE-9320-24P4S</li>\r\n<li style=\"margin: 0in 0in 6pt 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">IE-9320-16P8U4X</li>\r\n</ul>","security_evaluation_summary":"<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.&nbsp; The evaluation demonstrated that the TOE<em> </em>meets the security requirements contained in the Security Target.&nbsp; The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.&nbsp; The product, when delivered and configured as identified in the Cisco Cisco Catalyst Industrial Ethernet 9300 Rugged Series Switches running IOS-XE 17.12 CC Configuration Guide, Version 0.5, June 20, 2024 document, satisfies all of the security functional requirements stated in the Cisco Catalyst Industrial Ethernet 9300 Rugged Series Switches running IOS-XE 17.12 Security Target, Version 0.6, August 6, 2024.&nbsp; The project underwent CCEVS Validator review.&nbsp; The evaluation was completed in August 2024.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11466-2024) prepared by CCEVS.</p>","environmental_strengths":"<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The logical boundaries of the Catalyst Industrial Ethernet 9300 Rugged Series Switches running IOS-XE 17.12 are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security audit:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The Cisco Catalyst IE9300 Rugged Series Switches provide extensive auditing capabilities.&nbsp; The TOE generates a comprehensive set of audit logs that identify specific TOE operations.&nbsp; For each event, the TOE records the date and time of each event, the type of event, the subject identity, and the outcome of the event.</span></p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">Auditable events include:</span></p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">failure on invoking cryptographic functionality such as establishment, termination and failure of cryptographic session establishments and connections</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">creation and update of Secure Association Key</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">modifications to the group of users that are part of the Authorized Administrator roles</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">all use of the user identification mechanism</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">any use of the authentication mechanism</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Administrator lockout due to excessive authentication failures</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">any change in the configuration of the TOE</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">changes to time</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">initiation of TOE update</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">indication of completion of TSF self-test</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">maximum sessions being exceeded</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">termination of a remote session</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">attempts to unlock a termination session</li>\r\n<li style=\"margin: 0in 0in 6pt 0px; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\">initiation and termination of a trusted channel</li>\r\n</ul>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE is configured to transmit its audit messages to an external syslog server. Communication with the syslog server is protected using IPsec and the TOE can determine when communication with the syslog server fails. If that should occur, the TOE will store all audit records locally and when the connection to the remote syslog server is restored, all stored audit records will be transmitted to the remote syslog server.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The audit logs can be viewed on the TOE using the appropriate IOS-XE 17.12 commands. The records include the date/time the event occurred, the event/type of event, the user associated with the event, and additional information of the event and its success and/or failure. The TOE does not have an interface to modify audit records, though there is an interface available for the Authorized Administrator to clear audit data stored locally on the TOE.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Cryptographic support:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE provides the cryptography to support all security functions. All algorithms claimed have Cryptographic Algorithm Validation Program (CAVP) certificates.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE leverages the IOS Common Cryptographic Module (IC2M), firmware version Rel5a (CAVP cert. #A1462). The IOS software calls the IC2M Rel5a cryptographic module that is validated for conformance to the requirements of Federal Information Processing Standards (FIPS) 140-2 Level 1.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE supports MACsec using the proprietary UAPD MSC MACsec embedded in ASICs v1.1 (CAVP Cert. #4848).</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE provides cryptographic support for IPsec, which is used to secure the session between the TOE and the authentication servers.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE authenticates and encrypts packets between itself and a MACsec peer.&nbsp; The MACsec Key Agreement (MKA) Protocol provides the required session keys and manages the required encryption keys to protect data exchanged by the peers.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security management:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE provides secure administrative services for management of general TOE configuration and the security functionality provided by the TOE. All TOE administration occurs either through a secure SSHv2 session or via a local serial console connection. The TOE provides the ability to securely manage:</span></p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Administration of the TOE locally and remotely</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configuration of warning and consent access banners</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configuration of session inactivity thresholds</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Updates of the TOE software</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configuration of authentication failures</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configuration of the audit functions of the TOE</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configuration of the TOE provided services</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configuration of the cryptographic functionality of the TOE</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Generate, install, and manage Pre-Shared Key (PSK)</li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Manage the Key Server, Connectivity Association Key (CAK) and MKA participants</li>\r\n<li style=\"margin: 0in 0in 6pt 0px; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configure lockout time interval for excessive authentication failures</li>\r\n</ul>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE supports two separate Administrator roles: non-privileged Administrator and privileged Administrator. Only the privileged Administrator can perform the above security relevant management functions. The privileged Administrator is the Authorized Administrator of the TOE who can enable, disable, determine, and modify the behaviour of the security functions of the TOE as described in this document.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Protection of the TSF:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE protects against interference and tampering by untrusted subjects by implementing identification, authentication, and access controls to limit configuration to Authorized Administrators. The TOE prevents reading of cryptographic keys and passwords. Additionally, Cisco IOS-XE is not a general-purpose operating system and access to Cisco IOS-XE memory space is restricted to only Cisco IOS-XE functions.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE can verify any software updates prior to the software updates being installed on the TOE to avoid the installation of unauthorized software.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE detects replay of information received via secure channels (MACsec). The detection is applied to network packets that terminate at the TOE, such as trusted communications between the TOE and an IT entity (e.g., MACsec peer). If replay is detected, the packets are discarded.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE internally maintains the date and time. This date and time information is used as the timestamp that is applied to audit records generated by the TOE. The TOE provides the Authorized Administrators the capability to update the TOE&rsquo;s clock manually to maintain a reliable timestamp.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">Finally, the TOE performs testing to verify correct operation of the TOE itself and that of the cryptographic module.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>TOE access:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE can terminate inactive sessions after an Authorized Administrator configurable time-period. Once a session has been terminated, the TOE requires the user to re-authenticate to establish a new session.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE can also display an Authorized Administrator specified banner on the CLI management interface prior to allowing any administrative access to the TOE.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Trusted path/channels:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE allows a trusted path to be established to itself from remote Administrators over SSHv2 and initiates outbound IPsec trusted channels to transmit audit messages to remote syslog servers. In addition, IPsec is used as a trusted channel between the TOE and the remote authentication servers.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE supports MACsec secured trusted channels between itself and MACsec peers.</span></p>","features":[{"id":3520,"feature_name":"Asymmetric Key Generation"},{"id":3519,"feature_name":"Auditing"},{"id":3553,"feature_name":"Certificate Authentication"},{"id":3552,"feature_name":"Certificate Validation"},{"id":3541,"feature_name":"Cryptographic Hashing"},{"id":3529,"feature_name":"Cryptographic Key Establishment"},{"id":3537,"feature_name":"Cryptographic Signature Generation"},{"id":3536,"feature_name":"Cryptographic Signature Verification"},{"id":3524,"feature_name":"DRBG"},{"id":3566,"feature_name":"IKEv2"},{"id":3557,"feature_name":"IPsec"},{"id":3530,"feature_name":"Key Destruction"},{"id":3542,"feature_name":"Keyed-hash message authentication"},{"id":3512,"feature_name":"MACsec"},{"id":3569,"feature_name":"Network Switch"},{"id":3561,"feature_name":"SSH Server"}]}