{"product_id":11488,"v_id":11488,"product_name":"Trend Micro TippingPoint Threat Protection System (TPS) v6.3","certification_status":"Certified","certification_date":"2024-12-09T00:00:00Z","tech_type":"Network Device","vendor_id":{"name":"Trend Micro","website":"www.trendmicro.com"},"vendor_poc":"Greg Cooper","vendor_phone":"512-646-6100","vendor_email":"greg_cooper@trendmicro.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p>The Target of Evaluation (TOE) is Trend Micro TippingPoint Threat Protection System (TPS) v6.3. The TOE comprises a range of standalone physical and virtual network appliances that provide threat protection, shielding network vulnerabilities, blocking exploits, and defending against known and zero-day attacks. It provides coverage across various threat vectors, including advanced threats, malware, and phishing attempts. It employs a combination of technologies, such as deep packet inspection, threat reputation, and malware analysis, on a flow-by-flow basis, in order to detect and prevent attacks on the network.</p>\r\n<p>The focus of the evaluation was on functionality meeting the requirements specified in collaborative Protection Profile for Network Devices, Version 2.2e, including: protection of communications between the TOE and trusted external IT entities; identification and authentication of administrators; auditing of security-relevant events; verification of the source and integrity of updates to the TOE; and use of approved cryptographic mechanisms.</p>","evaluation_configuration":"<p style=\"margin: 0in 0in 3pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE comprises the following appliances running TPS software v6.3:</span></p>\r\n<ul style=\"margin-top: 0in; margin-bottom: 0in;\">\r\n<li style=\"margin: 0in 0in 0in 0px; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">TPS 1100TX</span></li>\r\n<li style=\"margin: 0in 0in 0in 0px; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">TPS 5500TX</span></li>\r\n<li style=\"margin: 0in 0in 0in 0px; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">TPS 8200TX</span></li>\r\n<li style=\"margin: 0in 0in 0in 0px; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">TPS 8400TX</span></li>\r\n<li style=\"margin: 0in 0in 0in 0px; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">TPS 8600TXE</span></li>\r\n<li style=\"margin: 0in 0in 0in 0px; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">TPS 9200TXE</span></li>\r\n<li style=\"margin: 0in 0in 6pt 0px; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">vTPS</span></li>\r\n</ul>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The 1100TX includes one I/O module slot, the 5500TX, 8200TX, 8600TXE, and 9200TXE include two I/O module slots, and the 8400TX includes four I/O module slots. The following standard I/O modules are supported for the 1100TX, 5500TX, 8200TX, and 8400TX devices.</span></p>\r\n<div align=\"center\">\r\n<table class=\"MsoTableGrid\" style=\"border-collapse: collapse; border: none;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\r\n<tbody>\r\n<tr>\r\n<td style=\"border: solid windowtext 1.0pt; background: #D9D9D9; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 3pt 0in; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><strong><span style=\"font-family: Calibri, sans-serif; color: black;\">Standard I/O Modules</span></strong></p>\r\n</td>\r\n<td style=\"border: solid windowtext 1.0pt; border-left: none; background: #D9D9D9; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 3pt 0in; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><strong><span style=\"font-family: Calibri, sans-serif; color: black;\">Trend Micro Part Number</span></strong></p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td style=\"border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 3pt 0in; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">TippingPoint 6-Segment Gig-T</span></p>\r\n</td>\r\n<td style=\"border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 3pt 0in; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">TPNN0059</span></p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td style=\"border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 3pt 0in; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">TippingPoint 6-Segment GbE SFP</span></p>\r\n</td>\r\n<td style=\"border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 3pt 0in; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">TPNN0068</span></p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td style=\"border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 3pt 0in; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">TippingPoint 4-Segment 10 GbE SFP+</span></p>\r\n</td>\r\n<td style=\"border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 3pt 0in; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">TPNN0060</span></p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td style=\"border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 3pt 0in; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">TippingPoint 1-Segment 40 GbE QSFP+</span></p>\r\n</td>\r\n<td style=\"border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 3pt 0in; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">TPNN0069</span></p>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n</div>\r\n<p style=\"margin: 3pt 0in 6pt; line-height: normal; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The following standard I/O modules are supported solely for the 8600TXE and 9200TXE devices.</span></p>\r\n<div align=\"center\">\r\n<table class=\"TableGrid1\" style=\"border-collapse: collapse; border: none;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\r\n<tbody>\r\n<tr>\r\n<td style=\"border: solid windowtext 1.0pt; background: #D9D9D9; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; line-height: normal; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><span style=\"font-family: Calibri, sans-serif; color: black;\">Standard I/O Modules</span></strong></p>\r\n</td>\r\n<td style=\"border: solid windowtext 1.0pt; border-left: none; background: #D9D9D9; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; line-height: normal; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><span style=\"font-family: Calibri, sans-serif; color: black;\">Trend Micro Part Number</span></strong></p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td style=\"border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; line-height: normal; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\"><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">TippingPoint 6-Segment 25/10/1 GbE SFP28</span></p>\r\n</td>\r\n<td style=\"border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; line-height: normal; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\"><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">TPNN0370</span></p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td style=\"border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; line-height: normal; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\"><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">TippingPoint 4-Segment 100/40 GbE QSFP28</span></p>\r\n</td>\r\n<td style=\"border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; line-height: normal; text-align: justify; font-size: 10pt; font-family: 'Times New Roman', serif;\"><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">TPNN0371</span></p>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n</div>\r\n<p style=\"margin: 3pt 0in; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The vTPS virtual appliance consists of TPS v6.3, running on hosts with Intel Xeon CPUs based on Ivy Bridge or newer that support the RDRAND instruction and either:</span></p>\r\n<ul style=\"margin-top: 0in; margin-bottom: 0in;\">\r\n<li style=\"margin: 0in 0in 0in 0px; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">an ESXi Hypervisor: Version 7.0 or 8.0, or</span></li>\r\n</ul>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 6pt 0px; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">a RHEL version 8 or version 9 KVM.</span></li>\r\n</ul>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The vTPS virtual appliance uses virtual data ports and does not require I/O modules.</span></p>\r\n<p style=\"margin: 0in 0in 3pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The vTPS appliance is provided as one of the following image files:</span></p>\r\n<ul style=\"margin-top: 0in; margin-bottom: 0in;\">\r\n<li style=\"margin: 0in 0in 0in 2.8667px; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">vTPS_vmw_6.3.0_xxxx.zip</span></li>\r\n<li style=\"margin: 0in 0in 6pt 3.0667px; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">vTPS_kvm_6.3.0_xxxx.tar.gz</span><span style=\"font-family: Calibri, sans-serif;\">.</span></li>\r\n</ul>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance. The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, September 2017.&nbsp;The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 release 5. The product, when delivered and configured as identified in the guidance documentation, satisfies all the security functional requirements stated in the Trend Micro TippingPoint Threat Protection System (TPS) v6.3 Security Target. The evaluation was completed in October 2024. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.</p>","environmental_strengths":"<p style=\"margin: 0in; break-after: avoid; text-align: justify; line-height: 115%; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><em><span style=\"font-size: 11.0pt; line-height: 115%; font-family: Calibri, sans-serif;\">Security Audit</span></em></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE is able to generate audit records for security relevant events. The TOE can be configured to store the audit records locally on the TOE and can also be configured to send the logs to a designated external log server. The audit records in local audit storage cannot be modified or deleted. In the event the space available for storing audit records locally is exhausted, the TOE deletes the oldest historical log file, renames the current log file to be a historical file, and creates a new current log file. The TOE will write a warning to the audit trail when the space available for storage of audit records drops below 25% capacity.</span></p>\r\n<p style=\"margin: 0in; break-after: avoid; text-align: justify; line-height: 115%; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><em><span style=\"font-size: 11.0pt; line-height: 115%; font-family: Calibri, sans-serif;\">Cryptographic Support</span></em></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE is operated in FIPS mode and includes FIPS-approved and NIST-recommended cryptographic algorithms. The TOE provides cryptographic mechanisms for symmetric encryption and decryption, cryptographic signature services, cryptographic hashing services, keyed-hash message authentication services, deterministic random bit generation seeded from a suitable entropy source, and cryptographic key destruction. The cryptographic mechanisms support SSH used for secure communication, both as client and server.</span></p>\r\n<p style=\"margin: 0in; break-after: avoid; text-align: justify; line-height: 115%; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><em><span style=\"font-size: 11.0pt; line-height: 115%; font-family: Calibri, sans-serif;\">Identification and Authentication</span></em></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE requires administrators to be successfully identified and authenticated before they can access any of the security management functions provided by the TOE. The TOE offers both a locally connected console and a network accessible interface over SSH to support administration of the TOE. </span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE supports the local (i.e., on device) definition of administrators with usernames and passwords. When a user is authenticated at the local console, no information about the authentication data (i.e., password) is echoed to the user. Passwords can be composed of any combination of upper and lower case letters, numbers, and the following special characters: &ldquo;!&rdquo;; &ldquo;@&rdquo;; &ldquo;#&rdquo;; &ldquo;$&rdquo;; &ldquo;%&rdquo;; &ldquo;^&rdquo;; &ldquo;&amp;&rdquo;; &ldquo;*&rdquo;; &ldquo;(&ldquo;; &ldquo;)&rdquo;; &ldquo;,&rdquo;; &ldquo;.&rdquo;; &ldquo;?&rdquo;; &ldquo;&lt;&rdquo;; &ldquo;&gt;&rdquo;; and &ldquo;/&rdquo;. The minimum password length is configurable by an administrator. The TOE can support minimum password lengths of 15 characters. In addition, administrators accessing the Ethernet Management port can be defined with an SSH public key for public key-based authentication for SSH connections rather than a password.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE provides authentication failure handling for remote administrator access. When the defined number of unsuccessful authentication attempts has been reached, the remote administrator accessing the TOE via SSH is locked out for an administrator configurable period of time. Authentication failures by remote administrators cannot lead to a situation where no administrator access is available to the TOE since administrator access is still available via the local console.</span></p>\r\n<p style=\"margin: 0in; break-after: avoid; text-align: justify; line-height: 115%; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><em><span style=\"font-size: 11.0pt; line-height: 115%; font-family: Calibri, sans-serif;\">Security Management</span></em></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE provides administrator roles and supports local and remote administration. The TOE supports Super User, Admin, and Operator roles that map to the Security Administrator role in the claimed PP. Each user must be assigned a role in order to perform any management action. The TOE provides authorized administrators with a command line interface (CLI), accessible locally via direct console connection and remotely via SSH, for TOE configuration and to monitor, collect, log, and react in real-time to potentially malicious network traffic.</span></p>\r\n<p style=\"margin: 0in; break-after: avoid; text-align: justify; line-height: 115%; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><em><span style=\"font-size: 11.0pt; line-height: 115%; font-family: Calibri, sans-serif;\">Protection of the TSF</span></em></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE protects sensitive data such as stored passwords and cryptographic keys so that they are not accessible even by an administrator. It also provides its own timing mechanism that ensures reliable time information is available. </span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE provides mechanisms to view the current version of the TOE and to install updates of the TOE software. TOE updates are initiated manually by the Super User or Admin, who can verify the integrity of the update prior to installation using a digital signature.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE performs tests for software module integrity and cryptographic known-answer tests.</span></p>\r\n<p style=\"margin: 0in; break-after: avoid; text-align: justify; line-height: 115%; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><em><span style=\"font-size: 11.0pt; line-height: 115%; font-family: Calibri, sans-serif;\">TOE Access</span></em></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE implements administrator-configurable session inactivity limits for local interactive sessions at the console and for SSH sessions. The TOE will terminate such sessions when the inactivity period expires. In addition, administrators can terminate their own interactive sessions by logging out at the console and SSH.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif;\">The TOE supports an administrator-configurable TOE access banner that is displayed prior to a user completing the login process at the CLI. This is implemented for both local and remote management connections.</span></p>\r\n<p style=\"margin: 0in; break-after: avoid; text-align: justify; line-height: 115%; font-size: 10pt; font-family: 'Times New Roman', serif;\"><strong><em><span style=\"font-size: 11.0pt; line-height: 115%; font-family: Calibri, sans-serif;\">Trusted Path/Channels</span></em></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif; color: black;\">The TOE protects interactive communication with remote administrators using SSH. SSH ensures confidentiality of transmitted information and detects any loss of integrity.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: 'Times New Roman', serif;\"><span style=\"font-family: Calibri, sans-serif; color: black;\">The TOE also uses SSH to protect the transmission of audit records to an external audit server.</span></p>","features":[{"id":855,"feature_name":"Asymmetric Key Generation"},{"id":851,"feature_name":"Auditing"},{"id":858,"feature_name":"Cryptographic Hashing"},{"id":856,"feature_name":"Cryptographic Key Establishment"},{"id":857,"feature_name":"Cryptographic Signature Verification"},{"id":853,"feature_name":"DRBG"},{"id":852,"feature_name":"Key Destruction"},{"id":859,"feature_name":"Keyed-hash message authentication"},{"id":860,"feature_name":"SSH Client"},{"id":861,"feature_name":"SSH Server"},{"id":854,"feature_name":"Virtual Network Device"}]}