{"product_id":11483,"v_id":11483,"product_name":"Cisco Embedded Services Router (ESR) 6300 v17.12","certification_status":"Certified","certification_date":"2024-06-14T00:00:00Z","tech_type":"Network Device, Virtual Private Network","vendor_id":{"name":"Cisco Systems, Inc.","website":"https://www.cisco.com"},"vendor_poc":"Petra Manche","vendor_phone":"(408) 526-4000","vendor_email":"certteam@cisco.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt;\"><span style=\"mso-bidi-font-size: 10.0pt; color: black;\">The TOE is comprised of both software and hardware. The hardware models included in the evaluation are the ESR-6300-NCP-K9 and ESR-6300-CON-K9.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE software is comprised of the Cisco IOS-XE version 17.12.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt;\"><span style=\"mso-bidi-font-size: 10.0pt; color: black;\">The ESR6300 consists of the following architectural features and components:</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 39.0pt; text-indent: -.25in; mso-list: l0 level1 lfo1; tab-stops: list 39.0pt;\"><!-- [if !supportLists]--><span style=\"mso-bidi-font-size: 10.0pt; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; color: black; mso-bidi-font-weight: bold;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"mso-bidi-font-size: 10.0pt; color: black;\">Compact 3&rdquo; x 3.75&rdquo; form factor board optimized for custom solutions</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 39.0pt; text-indent: -.25in; mso-list: l0 level1 lfo1; tab-stops: list 39.0pt;\"><!-- [if !supportLists]--><span style=\"mso-bidi-font-size: 10.0pt; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; color: black; mso-bidi-font-weight: bold;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"mso-bidi-font-size: 10.0pt; color: black;\">DRAM: 4-GB DDR4 memory capacity</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 39.0pt; text-indent: -.25in; mso-list: l0 level1 lfo1; tab-stops: list 39.0pt;\"><!-- [if !supportLists]--><span style=\"mso-bidi-font-size: 10.0pt; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; color: black; mso-bidi-font-weight: bold;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"mso-bidi-font-size: 10.0pt; color: black;\">Flash Memory: 4-GB usable eMMC flash</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 39.0pt; text-indent: -.25in; mso-list: l0 level1 lfo1; tab-stops: list 39.0pt;\"><!-- [if !supportLists]--><span style=\"mso-bidi-font-size: 10.0pt; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; color: black; mso-bidi-font-weight: bold;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"mso-bidi-font-size: 10.0pt; color: black;\">Optional router enclosure as described in Table 4</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 39.0pt; text-indent: -.25in; mso-list: l0 level1 lfo1; tab-stops: list 39.0pt;\"><!-- [if !supportLists]--><span style=\"mso-bidi-font-size: 10.0pt; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; color: black; mso-bidi-font-weight: bold;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"mso-bidi-font-size: 10.0pt; color: black;\">Integrated multi-pin BTB Interface Connector - provides pins dedicated for power input, ethernet ports, and console ports. The following interfaces were used during testing:</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: .75in; text-indent: -.25in; mso-list: l0 level1 lfo1; tab-stops: list .75in;\"><!-- [if !supportLists]--><span style=\"mso-bidi-font-size: 10.0pt; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; color: black; mso-bidi-font-weight: bold;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"mso-bidi-font-size: 10.0pt; color: black;\">Console: 1 UART RS232 RJ45 console port</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: .75in; text-indent: -.25in; mso-list: l0 level1 lfo1; tab-stops: list .75in;\"><!-- [if !supportLists]--><span style=\"mso-bidi-font-size: 10.0pt; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; color: black; mso-bidi-font-weight: bold;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"mso-bidi-font-size: 10.0pt; color: black;\">WAN Interfaces: 2 Combo Layer 3 GE WAN ports </span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: .75in; text-indent: -.25in; mso-list: l0 level1 lfo1; tab-stops: list .75in;\"><!-- [if !supportLists]--><span style=\"mso-bidi-font-size: 10.0pt; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; color: black; mso-bidi-font-weight: bold;\"><span style=\"mso-list: Ignore;\">&middot;<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><!--[endif]--><span style=\"mso-bidi-font-size: 10.0pt; color: black;\">LAN Interfaces: 4 Layer 2 GE LAN ports</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify;\"><span style=\"mso-bidi-font-size: 10.0pt;\">The ESR6300 is an embedded router module with a compact form factor of 3.0 by 3.775 inches. Its compact, modular, ruggedized design allows Cisco partners and integrators to build a wide variety of custom embedded solutions. The TOE can be inserted into an enclosure that can accommodate the TOE's size (3.0 x 3.775 in) and provides no compute capabilities. The ESR6300 is available with a custom-designed cooling plate, as well as without the cooling plate. Both versions of the ESR6300 board include an integrated multi-pin Board-to-Board (BTB) interface connector with pins dedicated for power input, ethernet ports, and console ports. The TOE functionality is implemented inside the ESR 6300 physical chassis, as the chassis includes the underlying board (with or without a cooling plate) and all electronic components attached to it; therefore, no computational capabilities outside of the TOE boundary are required to secure the TOE. Refer to Annex A in the Guidance Document (AGD) for hardware technical guidance on the ESR6300 board layout and dimensions and Multi-pin BTB Interface Connector description that includes pinout mapping descriptions for network interfaces and power inputs.</span></p>","evaluation_configuration":"<p class=\"MsoBodyText\"><span style=\"mso-bidi-font-size: 10.0pt; color: black;\">The TOE is comprised of both software and hardware. The hardware models included in the evaluation are the ESR-6300-NCP-K9 and ESR-6300-CON-K9.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE software is comprised of the Cisco IOS-XE version 17.12.</span></p>","security_evaluation_summary":"<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\">The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation demonstrated that <span style=\"mso-bidi-font-style: italic;\">the TOE </span>meets the security requirements contained in the Security Target.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The product, when delivered and configured as identified in the <span style=\"mso-no-proof: yes;\">Cisco Embedded Services Router (ESR) 6300 v17.12 CC Configuration Guide</span>, Version 1.0, May 30<span style=\"mso-no-proof: yes;\">, 2024</span> document, satisfies all of the security functional requirements stated in the <span style=\"mso-no-proof: yes;\">Cisco Embedded Services Router (ESR) 6300 v17.12 Security Target</span>, Version 1.1, June 10<span style=\"mso-no-proof: yes;\">, 2024</span>.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The project underwent CCEVS Validator review.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation was completed in <span style=\"mso-no-proof: yes;\">June 2024</span>.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID<span style=\"mso-no-proof: yes;\">11483-2024</span>) prepared by CCEVS.</p>","environmental_strengths":"<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\">The logical boundaries of the <span style=\"mso-no-proof: yes;\">Cisco Embedded Services Router (ESR) 6300</span> are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p class=\"MsoNormal\">&nbsp;</p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Security audit:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\">The TOE provides extensive auditing capabilities. The TOE can audit events related to cryptographic functionality, identification and authentication, and administrative actions. The TOE generates an audit record for each auditable event.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Each security relevant audit event has the date, timestamp, event description, and subject identity.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The administrator configures auditable events, performs back-up operations and manages audit data storage.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE provides the administrator with a circular audit trail. The TOE is configured to transmit its audit messages to an external syslog server over an encrypted channel.</p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Cryptographic support:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><a name=\"_Ref234304332\"></a>The TOE provides cryptography in support of other TOE security functionality. <span style=\"mso-spacerun: yes;\">&nbsp;</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"mso-bookmark: _Ref234304332;\">The TOE provides cryptography in support of VPN connections and remote administrative management via SSHv2 and IPsec to secure the transmission of audit records to the remote syslog server. In addition, IPsec is used to secure the session between the TOE and the authentication servers.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Identification and authentication:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt;\"><span style=\"mso-bidi-font-size: 10.0pt;\">The TOE performs two types of authentication: device-level authentication of the remote device (VPN peers) and user authentication for the Authorized Administrator of the TOE.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Device-level authentication allows the TOE to establish a secure channel with a trusted peer.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The secure channel is established only after each device authenticates the other.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Device-level authentication is performed via IKE/IPsec mutual authentication. The TOE supports use of IKEv1 (ISAKMP) and IKEv2 pre-shared keys for authentication of IPsec tunnels. The IKE phase authentication for the IPsec communication channel between the TOE and authentication server and between the TOE and syslog server is considered part of the Identification and Authentication security functionality of the TOE.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt;\"><span style=\"mso-bidi-font-size: 10.0pt;\">The TOE provides authentication services for administrative users to connect to the TOE&rsquo;s secure CLI administrator interface.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE requires Authorized Administrators to authenticate prior to being granted access to any of the management functionality.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE can be configured to require a minimum password length of 15 characters. The TOE provides administrator authentication against a local user database.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Password-based authentication can be performed on the serial console or SSH interfaces.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The SSHv2 interface also supports authentication using SSH keys.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE supports the use of a RADIUS AAA server (part of the IT Environment) for authentication of administrative users attempting to connect to the TOE&rsquo;s CLI.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt;\"><span style=\"mso-bidi-font-size: 10.0pt;\">The TOE provides an automatic lockout when a user attempts to authenticate and enters invalid information.<span style=\"mso-spacerun: yes;\">&nbsp; </span>After a defined number of authentication attempts exceeding the configured allowable attempts, the user is locked out until an authorized administrator can enable the user account.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"mso-bidi-font-size: 10.0pt;\">The TOE uses X.509v3 certificates as defined by RFC 5280 to support authentication for IPsec connections.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Security management:</strong></p>\r\n<p class=\"MsoNormal\"><span style=\"mso-bidi-font-size: 10.0pt;\">The TOE provides secure administrative services for management of general TOE configuration and the security functionality provided by the TOE.<span style=\"mso-spacerun: yes;\">&nbsp; </span>All TOE administration occurs either through a secure SSHv2 session or via a local console connection.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE provides the ability to securely manage:</span></p>\r\n<p class=\"MsoListParagraphCxSpFirst\" style=\"margin-left: .75in; mso-add-space: auto; text-indent: -.25in; mso-list: l0 level2 lfo1;\"><!-- [if !supportLists]--><span style=\"font-family: 'Courier New'; mso-fareast-font-family: 'Courier New';\"><span style=\"mso-list: Ignore;\">o<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp; </span></span></span><!--[endif]-->Administration of the TOE locally and remotely;</p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: .75in; mso-add-space: auto; text-indent: -.25in; mso-list: l0 level2 lfo1;\"><!-- [if !supportLists]--><span style=\"font-family: 'Courier New'; mso-fareast-font-family: 'Courier New';\"><span style=\"mso-list: Ignore;\">o<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp; </span></span></span><!--[endif]-->All TOE administrative users;</p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: .75in; mso-add-space: auto; text-indent: -.25in; mso-list: l0 level2 lfo1;\"><!-- [if !supportLists]--><span style=\"font-family: 'Courier New'; mso-fareast-font-family: 'Courier New';\"><span style=\"mso-list: Ignore;\">o<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp; </span></span></span><!--[endif]-->All identification and authentication;</p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: .75in; mso-add-space: auto; text-indent: -.25in; mso-list: l0 level2 lfo1;\"><!-- [if !supportLists]--><span style=\"font-family: 'Courier New'; mso-fareast-font-family: 'Courier New';\"><span style=\"mso-list: Ignore;\">o<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp; </span></span></span><!--[endif]-->All audit functionality of the TOE;</p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: .75in; mso-add-space: auto; text-indent: -.25in; mso-list: l0 level2 lfo1;\"><!-- [if !supportLists]--><span style=\"font-family: 'Courier New'; mso-fareast-font-family: 'Courier New';\"><span style=\"mso-list: Ignore;\">o<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp; </span></span></span><!--[endif]-->All TOE cryptographic functionality;</p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: .75in; mso-add-space: auto; text-indent: -.25in; mso-list: l0 level2 lfo1;\"><!-- [if !supportLists]--><span style=\"font-family: 'Courier New'; mso-fareast-font-family: 'Courier New';\"><span style=\"mso-list: Ignore;\">o<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp; </span></span></span><!--[endif]-->NTP configuration;</p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: .75in; mso-add-space: auto; text-indent: -.25in; mso-list: l0 level2 lfo1;\"><!-- [if !supportLists]--><span style=\"font-family: 'Courier New'; mso-fareast-font-family: 'Courier New';\"><span style=\"mso-list: Ignore;\">o<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp; </span></span></span><!--[endif]-->Update to the TOE and verification of the updates;</p>\r\n<p class=\"MsoListParagraph\" style=\"text-indent: -.25in; mso-list: l0 level2 lfo1; margin: 0in 0in 6.0pt .75in;\"><!-- [if !supportLists]--><span style=\"font-family: 'Courier New'; mso-fareast-font-family: 'Courier New';\"><span style=\"mso-list: Ignore;\">o<span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;&nbsp; </span></span></span><!--[endif]-->Configuration of IPsec functionality.</p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt;\"><span style=\"mso-bidi-font-size: 10.0pt;\">The TOE supports two separate administrator roles: non-privileged administrator and privileged administrator. <span style=\"mso-spacerun: yes;\">&nbsp;</span>Only the privileged administrator can perform the above security relevant management functions. Management of the TSF data is restricted to Security Administrators. The ability to enable, disable, determine and modify the behavior of all of the security functions of the TOE is restricted to authorized administrators.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"mso-bidi-font-size: 10.0pt;\">Administrators can create configurable login banners to be displayed at time of login, and can also define an inactivity timeout for each admin interface to terminate sessions after a set period of inactivity.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Packet filtering:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"mso-bidi-font-size: 10.0pt;\">The TOE provides packet filtering and secure IPsec tunneling.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The tunnels can be established between two trusted VPN peers and the TOE.<span style=\"mso-spacerun: yes;\">&nbsp; </span>More accurately, these tunnels are sets of security associations (SAs).<span style=\"mso-spacerun: yes;\">&nbsp; </span>The SAs define the protocols and algorithms to be applied to sensitive packets and specify the keying material to be used.<span style=\"mso-spacerun: yes;\">&nbsp; </span>SAs are unidirectional and are established per the ESP security protocol.<span style=\"mso-spacerun: yes;\">&nbsp; </span>An authorized administrator can define the traffic that needs to be protected via IPsec by configuring access lists (permit, deny, log) and applying these access lists to interfaces using IPsec Virtual Tunnel Interfaces (VTI).</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Protection of the TSF:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt;\"><span style=\"mso-bidi-font-size: 10.0pt;\">The TOE protects against interference and tampering by untrusted subjects by implementing identification, authentication, and access controls to limit configuration to Authorized Administrators.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE prevents reading of cryptographic keys and passwords. Additionally, Cisco IOS-XE is not a general-purpose operating system and access to Cisco IOS-XE memory space is restricted to only Cisco IOS-XE functions.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt;\"><span style=\"mso-bidi-font-size: 10.0pt;\">The TOE has an internal clock, however the TOE synchronizes time with an NTP server and then internally maintains the date and time. This date and time are used as the timestamp that is applied to audit records generated by the TOE.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt;\"><span style=\"mso-bidi-font-size: 10.0pt;\">The TOE performs testing to verify correct operation of the router itself and that of the cryptographic module.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt;\"><span style=\"mso-bidi-font-size: 10.0pt;\">The TOE is able to verify any software updates prior to the software updates being installed on the TOE to avoid the installation of unauthorized software.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"mso-bidi-font-size: 10.0pt;\">Whenever a failure occurs within the TOE that results in the TOE ceasing operation, the TOE securely disables its interfaces to prevent the unintentional flow of any information to or from the TOE and reloads.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>TOE access:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt;\"><span style=\"mso-bidi-font-size: 10.0pt;\">The TOE can terminate inactive sessions after an Authorized Administrator configurable time-period.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Once a session has been terminated the TOE requires the user to re-authenticate to establish a new session.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Sessions can also be terminated if an Authorized Administrator enters the &ldquo;exit&rdquo; or &ldquo;logout&rdquo; command.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\"><span style=\"mso-bidi-font-size: 10.0pt;\">The TOE can also display a Security Administrator specified banner on the CLI management interface prior to allowing any administrative access to the TOE.</span></p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Trusted path/channels:</strong></p>\r\n<p class=\"MsoNormal\"><span style=\"mso-bidi-font-size: 10.0pt;\">The TOE allows trusted paths to be established to itself from remote administrators over SSHv2, and initiates outbound IPsec tunnels to transmit audit messages to remote syslog servers.<span style=\"mso-spacerun: yes;\">&nbsp; </span>In addition, IPsec is used to secure the session between the TOE and the authentication servers.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE can also establish trusted paths of peer-to-peer IPsec sessions.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The peer-to-peer IPsec sessions can be used for securing the communications between the TOE and authentication server/syslog server, as well as to protect communications with a CA or remote administrative console.<span style=\"mso-spacerun: yes;\">&nbsp; </span>In addition, IPsec is used to secure the session between the TOE and the remote authentication servers and uses NTPv4 to secure the connection to the NTP server.</span></p>","features":[{"id":3575,"feature_name":"Asymmetric Key Generation"},{"id":3577,"feature_name":"Auditing"},{"id":3573,"feature_name":"Certificate Authentication"},{"id":3574,"feature_name":"Certificate Validation"},{"id":3582,"feature_name":"Cryptographic Hashing"},{"id":3578,"feature_name":"Cryptographic Key Establishment"},{"id":3581,"feature_name":"Cryptographic Signature Generation"},{"id":3580,"feature_name":"Cryptographic Signature Verification"},{"id":3576,"feature_name":"DRBG"},{"id":3585,"feature_name":"IKEv1"},{"id":3586,"feature_name":"IKEv2"},{"id":3572,"feature_name":"IPsec"},{"id":3579,"feature_name":"Key Destruction"},{"id":3583,"feature_name":"Keyed-hash message authentication"},{"id":3570,"feature_name":"Network Router"},{"id":3584,"feature_name":"SSH Server"},{"id":3571,"feature_name":"VPN Gateway"}]}