{"product_id":11511,"v_id":11511,"product_name":"Cisco MDS 9000 Series Switches Running NX-OS 9.4","certification_status":"Certified","certification_date":"2025-03-13T00:00:00Z","tech_type":"Network Device","vendor_id":{"name":"Cisco Systems, Inc.","website":"https://www.cisco.com"},"vendor_poc":"Petra Manche","vendor_phone":"4085264000","vendor_email":"certteam@cisco.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The Target of Evaluation (TOE) is comprised of both software and hardware. &nbsp;The hardware is comprised of the following model series: 9100, 9200, 9300, and 9700. &nbsp;The software is comprised of the Cisco NX-OS software image Release 9.4.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The Cisco MDS 9000 Series Switches that comprise the TOE have common hardware characteristics. &nbsp;These characteristics affect only non-TSF relevant functions of the switches (such as throughput and amount of storage) and therefore support security equivalency of the switches in terms of hardware.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">Cisco NX-OS is a Cisco-developed highly configurable proprietary operating system that provides for efficient and effective routing and switching. &nbsp;Although Cisco NX-OS performs many networking functions, this TOE only addresses the functions that provide for the security of the TOE itself.</p>","evaluation_configuration":"<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE consists of one or more switches and includes the Cisco NX-OS software. &nbsp;The TOE has two or more network interfaces and is connected to at least one internal and one external network. &nbsp;The Cisco NX-OS configuration determines how packets are handled to and from the TOE&rsquo;s network interfaces. &nbsp;The switch configuration will determine how traffic flows received on an interface will be handled. &nbsp;Typically, packet flows are passed through the internetworking device and forwarded to their configured destination.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">If the TOE is to be remotely administered, then the management workstation must be connected to an internal network and SSHv2 must be used to securely connect to the TOE. &nbsp;Audit records are stored locally and are also remotely backed up to a remote syslog server. &nbsp;If these servers are used, they must be attached to the internal (trusted) network. &nbsp;The internal (trusted) network is meant to be separated effectively from unauthorized individuals and user traffic; one that is in a controlled environment where implementation of security policies can be enforced.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">All supported modules for the 9100, 9200, and 9300 are considered part of the TOE evaluated configuration. &nbsp;Supervisor-4 for the 9700 Series is considered part of the TOE evaluated configuration.</p>\r\n<div align=\"center\">\r\n<table class=\"MsoNormalTable\" style=\"border-collapse: collapse; border: none;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 157.25pt; border: solid windowtext 1.0pt; background: #D9D9D9; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in -5.4pt 0in -1.15pt; text-align: center; font-size: 10pt; font-family: Cambria, serif; font-weight: bold;\"><span style=\"color: black;\">Series</span></p>\r\n</td>\r\n<td style=\"width: 153.0pt; border: solid windowtext 1.0pt; border-left: none; background: #D9D9D9; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in -5.4pt 0in -1.15pt; text-align: center; font-size: 10pt; font-family: Cambria, serif; font-weight: bold;\"><span style=\"color: black;\">Model</span></p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td style=\"width: 157.25pt; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">Cisco MDS 9100 Series</span></p>\r\n</td>\r\n<td style=\"width: 153.0pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">DS-C9148T-K9-24EK9</span></p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">DS-C9148T-K9-24IK9</span></p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td style=\"width: 157.25pt; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">Cisco MDS 9200 Series</span></p>\r\n</td>\r\n<td style=\"width: 153.0pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">DS-C9220I-4PEK9</span></p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">DS-C9220I-4PIK9</span></p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td style=\"width: 157.25pt; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">Cisco MDS 9300 Series</span></p>\r\n</td>\r\n<td style=\"width: 153.0pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">DS-C9396T-48EK9</span></p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">DS-C9396T-48IK9</span></p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">DS-C9396V-48EK9</span></p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">DS-C9396V-48IK9</span></p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td style=\"width: 157.25pt; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">Cisco MDS 9700 Series</span></p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">(any of three chassis models, each with one or a pair of Supervisor-4)</span></p>\r\n</td>\r\n<td style=\"width: 153.0pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">DS-C9706 with DS-X97-SF4-K9</span></p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">DS-C9710 with DS-X97-SF4-K9</span></p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">DS-C9718 with DS-X97-SF4-K9</span></p>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n</div>","security_evaluation_summary":"<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.&nbsp; The evaluation demonstrated that the TOE<em> </em>meets the security requirements contained in the Security Target.&nbsp; The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.&nbsp; The product, when delivered and configured as identified in the Cisco MDS 9000 Series Switches Running NX-OS 9.4 Common Criteria Operational User Guidance and Preparative Procedures, Version 1.1, March 12, 2025 document, satisfies all of the security functional requirements stated in the Cisco MDS 9000 Series Switches Running NX-OS 9.4 Security Target, Version 1.1, March 12, 2025.&nbsp; The project underwent CCEVS Validator review.&nbsp; The evaluation was completed in March 2025.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11511-2025) prepared by CCEVS.</p>","environmental_strengths":"<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The logical boundaries of the Cisco MDS 9000 Series Switches Running NX-OS 9.4 are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security audit:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The Cisco MDS 9000 Series Switches provide extensive auditing capabilities. &nbsp;The TOE can audit events related to cryptographic functionality, identification and authentication, enforcement of information flow control policies and administrative actions. &nbsp;The Cisco MDS 9000 Series Switches generate an audit record for each auditable event. &nbsp;For each event, the TOE records the date, timestamp, event description, subject identity that triggered the event and the outcome of the event.</p>\r\n<p style=\"margin: 0in 0in 3pt; font-size: 10pt; font-family: Times, serif;\">The auditable events include:</p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">failure on invoking cryptographic functionality such as establishment, termination and failure of cryptographic session establishments and connections;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">modifications to the group of users that are part of the authorized administrator roles;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">all use of the user identification mechanism;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">any use of the authentication mechanism;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Administrator lockout due to excessive authentication failures;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">any change in the configuration of the TOE;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">changes to time;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">initiation of TOE update;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">indication of completion of TSF self-test;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">maximum sessions being exceeded;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">termination of a remote session;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">attempts to unlock a termination session; and</li>\r\n<li style=\"margin: 0in 0in 12pt 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">initiation and termination of a trusted channel.</li>\r\n</ul>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The authorized administrator configures auditable events, performs back-up operations, and manages audit data storage. &nbsp;The TOE is configured to transmit the audit messages to an external syslog server. &nbsp;Communication with the syslog server is protected by using TLS and the TOE can determine when communication with the syslog server fails.&nbsp; In the presence of a TLS communication failure, the TOE will continuously and automatically re-attempt to reestablish the syslog connection in case of a network disruption. In the case of a TLS protocol failure the administrator should review the configuration of both the TOE and the syslog server.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The audit logs can be viewed on the TOE using the appropriate Cisco NX-OS commands.&nbsp; The records include the date/time the event occurred, the event/type of event, the user associated with the event, and additional information of the event and its success and/or failure.&nbsp; The TOE does not have an interface to modify audit records, though there is an interface available for the authorized administrator to clear (delete) audit data stored locally on the TOE.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Cryptographic support:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE provides cryptography in support of other TOE security functionality.&nbsp; All the algorithms claimed have CAVP certificates (Operation Environment &ndash; Intel Xeon processor).&nbsp; All the algorithms claimed have CAVP certificates.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The NX-OS software calls the CiscoSSL FOM Cryptographic implementation version 7.3a and has been validated for conformance to the requirements of FIPS 140-2 Level 1.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE provides cryptography in support of remote administrative management via SSHv2 and secure the session between the TOE and remote syslog server using TLS.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Identification and authentication:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE performs one type of authentication: authentication for the Authorized Administrator of the TOE using a local user database.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE provides authentication services for administrative users wishing to connect to the TOE&rsquo;s secure CLI administrator interface.&nbsp; The TOE requires Authorized Administrators to authenticate prior to being granted access to any of the management functionality.&nbsp; The TOE is configured to require a minimum password length of 8 characters as well as password-strength checking that disables the use of weak passwords.&nbsp; The TOE provides administrator authentication against a local user database.&nbsp; Password-based authentication can be performed on the serial console or SSH interfaces.&nbsp; The SSHv2 interface also supports authentication using SSH keys.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">After a configurable number of incorrect login attempts, Cisco MDS 9K Series will lockout the account until an Authorized Administrator takes action.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE uses X.509v3 certificates as defined by RFC 5280 to support authentication for TLS connections.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security management:</strong></p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">The TOE provides secure administrative services for management of general TOE configuration and the security functionality provided by the TOE. &nbsp;All TOE administration occurs either through a secure SSHv2 session or via a local console connection. &nbsp;The TOE provides the ability to securely manage:</p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Administration of the TOE locally and remotely;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configuration of warning and consent access banners;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configuration of session inactivity thresholds;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Updates of the TOE software;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configuration of authentication failures;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configuration of the audit functions of the TOE;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configuration of the TOE provided services; and</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configuration of the cryptographic functionality of the TOE.</li>\r\n</ul>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">The Cisco MDS 9K Series switch supports the following predefined roles:</p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">network-admin &ndash; This role is a super administrative role. &nbsp;This role has read and write privileges for any configuration item on the MDS 9000 Series.</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">network-operator - This role has read access to the entire Cisco NX-OS device.</li>\r\n<li style=\"margin: 0in 0in 12pt 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">server-admin - Complete read access to the entire Cisco NX-OS device and upgrade capability.</li>\r\n</ul>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">All administrators are considered to be security administrators in this ST. &nbsp;The Cisco MDS 9K Series has a CLI that can be administered either remotely using SSHv2 or locally via a console that is directly connected via a serial cable.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Protection of the TSF:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE protects against interference and tampering by untrusted subjects by implementing identification, authentication, and access controls to limit configuration and access to Authorized Administrators. &nbsp;The TOE prevents reading of cryptographic passwords.&nbsp; Additionally, Cisco NX-OS is not a general-purpose operating system and access to Cisco NX-OS memory space is restricted to only Cisco NX-OS functions.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">Use of separate VLANs is used to ensure routing protocol communications between the TOE and neighbor switches including routing table updates and neighbor switch authentication will be logically isolated from traffic on other VLANs.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE is able to verify any software updates prior to the software updates being installed on the TOE to avoid the installation of unauthorized software.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE internally maintains the date and time. &nbsp;This date and time are used as the timestamp that is applied to audit records generated by the TOE. Administrators can update the TOE&rsquo;s clock manually. &nbsp;Finally, the TOE performs power-up self-tests and conditional self-tests to verify correct operation of the switch itself and that of the cryptographic module.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>TOE access:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE can terminate inactive sessions after an Authorized Administrator configurable time-period.&nbsp; Once a session has been terminated, the TOE requires the user to re-authenticate to establish a new session.&nbsp; The administrator can also terminate their own session by exiting out of the CLI.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE can also be configured to display an Authorized Administrator specified banner on the CLI management interface prior to allowing any administrative access to the TOE.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Trusted path/channels:</strong></p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">The TOE allows trusted paths to be established to itself from remote administrators over SSHv2 for remote CLI access. MDS 9K also allows a trusted channel to be established with a syslog server using TLS.</p>","features":[{"id":495,"feature_name":"Asymmetric Key Generation"},{"id":490,"feature_name":"Auditing"},{"id":509,"feature_name":"Certificate Authentication"},{"id":500,"feature_name":"Certificate Validation"},{"id":498,"feature_name":"Cryptographic Hashing"},{"id":496,"feature_name":"Cryptographic Key Establishment"},{"id":497,"feature_name":"Cryptographic Signature Verification"},{"id":493,"feature_name":"DRBG"},{"id":491,"feature_name":"Key Destruction"},{"id":499,"feature_name":"Keyed-hash message authentication"},{"id":613,"feature_name":"Network Switch"},{"id":506,"feature_name":"SSH Server"},{"id":504,"feature_name":"TLS 1.2"},{"id":503,"feature_name":"TLS Client"}]}