{"product_id":11521,"v_id":11521,"product_name":"Cisco Embedded Services 9300 and 3300 Series Switches (ESS9300 & ESS3300) running IOS-XE 17.12","certification_status":"Certified","certification_date":"2025-03-13T00:00:00Z","tech_type":"Network Device,Network Encryption","vendor_id":{"name":"Cisco Systems, Inc.","website":"https://www.cisco.com"},"vendor_poc":"Petra Manche","vendor_phone":"(408) 526-4000","vendor_email":"certteam@cisco.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE is comprised of both software and hardware. &nbsp;The hardware is comprised of an industry standard small form factor cards which provide a compact, module, and customizable solution.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The ESS9300 and ESS3300 models provide secure Layer 2 switching using Enterprise-grade Cisco IOS-XE switching security features to ensure highly secure data communication. &nbsp;The products feature a robust industrial design and support Power over Ethernet.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Cisco IOS-XE is a Cisco-developed highly configurable proprietary operating system that provides for efficient and effective routing and switching.&nbsp; Although IOS-XE performs many networking functions, this TOE only addresses the functions that provide for the security of the TOE itself.</span></p>","evaluation_configuration":"<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The hardware models included in the <span style=\"color: black;\">evaluation are: </span></span><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif; color: black;\">ESS-3300-NCP, ESS-3300-CON, ESS-3300-24T-NCP, ESS-3300-24T-CON and </span><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif; color: black; background: white;\">ESS-9300-10X-E</span><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif; color: black;\">. &nbsp;The software is comprised of the Cisco IOS-XE 17.12.</span></p>","security_evaluation_summary":"<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt;\">The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.&nbsp; The evaluation demonstrated that the TOE<em> </em>meets the security requirements contained in the Security Target.&nbsp; The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.&nbsp; The product, when delivered and configured as identified in the Cisco Embedded Services 3300 and 9300 Series Switches (ESS3300 &amp; ESS9300) running IOS-XE 17.12 Common Criteria Configuration Guide, version 1.0, March 10, 2025 document, satisfies all of the security functional requirements stated in the Cisco Embedded Services 9300 and 3300 Series Switches (ESS9300 &amp; ESS3300) running IOS-XE 17.12 Security Target, version 1.0, March 10, 2025.&nbsp; The project underwent CCEVS Validator review.&nbsp; The evaluation was completed in March 2025.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11521-2025) prepared by CCEVS.</span></p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>","environmental_strengths":"<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt;\">The logical boundaries of the Cisco Embedded Services 9300 and 3300 Series Switches (ESS9300 &amp; ESS3300) running IOS-XE 17.12 are realized in the security functions that it implements. Each of these security functions is summarized below.</span></p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Security audit:</span></strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Auditing allows Security Administrators to discover intentional and unintentional issues with the TOE&rsquo;s configuration and/or operation.&nbsp; Auditing of administrative activities provides information that may be used to hasten corrective action should the system be configured incorrectly.&nbsp; Security audit data can also provide an indication of failure of critical portions of the TOE (e.g. a communication channel failure or anomalous activity (e.g. establishment of an administrative session at a suspicious time, repeated failures to establish sessions or authenticate to the TOE) of a suspicious nature.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE provides extensive capabilities to generate audit data targeted at detecting such activity.&nbsp; The TOE generates an audit record for each auditable event.&nbsp; Each security relevant audit event has the date, timestamp, event description, and subject identity.&nbsp; The TOE stores audit messages in a circular audit trail configurable by the Security Administrator.&nbsp; All audit logs are transmitted to an external audit server over a trusted channel protected with IPsec.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Cryptographic support:</span></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE provides cryptographic functions to implement SSH, IPsec, and MACsec protocols.&nbsp; The cryptographic algorithm implementation has been validated for CAVP conformance.&nbsp; This includes key generation and random bit generation, key establishment methods, key destruction, and the various types of cryptographic operations to provide AES encryption/decryption, signature verification, hash generation, and keyed hash generation.&nbsp; A high-level summary of the crypto graphic services provided by the TOE and their uses are shown in </span><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Table 6. TOE Cryptography Use</span><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\"> below.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><a name=\"_Ref152482760\"></a><a name=\"_Toc192496855\"></a><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Table </span></strong><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">6</span></strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\"><strong>. TOE Cryptography Use</strong></span></p>\r\n<div align=\"center\">\r\n<table class=\"MsoNormalTable\" style=\"width: 5.75in; border-collapse: collapse; border: none;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\r\n<thead>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 128.2pt; border: solid windowtext 1.0pt; background: #E6E6E6; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif; color: black;\">Cryptographic Method</span></strong></p>\r\n</td>\r\n<td style=\"width: 285.8pt; border: solid windowtext 1.0pt; border-left: none; background: #E6E6E6; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif; color: black;\">Use within the TOE</span></strong></p>\r\n</td>\r\n</tr>\r\n</thead>\r\n<tbody>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 128.2pt; border: solid windowtext 1.0pt; border-top: none; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Internet Key Exchange</span></p>\r\n</td>\r\n<td style=\"width: 285.8pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used to establish initial IPsec session.</span></p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 128.2pt; border: solid windowtext 1.0pt; border-top: none; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Secure Shell Establishment</span></p>\r\n</td>\r\n<td style=\"width: 285.8pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used to establish initial SSH session.</span></p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 128.2pt; border: solid windowtext 1.0pt; border-top: none; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">RSA Signature Services</span></p>\r\n</td>\r\n<td style=\"width: 285.8pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used in IPsec session establishment.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used in SSH session establishment.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">X.509 certificate signing </span></p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 128.2pt; border: solid windowtext 1.0pt; border-top: none; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">NIST SP 800-90A DRBG</span></p>\r\n</td>\r\n<td style=\"width: 285.8pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used for random number generation, key generation and seeds to asymmetric key generation</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used in IPsec session establishment.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used in SSH session establishment.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used in MACsec session establishment.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 128.2pt; border: solid windowtext 1.0pt; border-top: none; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">SHS</span></p>\r\n</td>\r\n<td style=\"width: 285.8pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used to provide IPsec traffic integrity verification</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used to provide SSH traffic integrity verification</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used for keyed-hash message authentication</span></p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 128.2pt; border: solid windowtext 1.0pt; border-top: none; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">AES</span></p>\r\n</td>\r\n<td style=\"width: 285.8pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used to encrypt IPsec session traffic. </span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used to encrypt SSH session traffic.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used to encrypt MACsec traffic.</span></p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 128.2pt; border: solid windowtext 1.0pt; border-top: none; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">EC-DH</span></p>\r\n</td>\r\n<td style=\"width: 285.8pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 2.9pt 5.75pt 2.9pt 5.75pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Used as the Key exchange method for SSH and IPsec</span></p>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n</div>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE provides cryptographic support for remote administrative management via SSHv2 and IPsec to secure the transmission of audit records to the remote syslog server. In addition, IPsec is used to secure the session between the TOE and the authentication servers. </span><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">SSH and IPsec protocols are implemented using the IOS Common Cryptographic Module (IC2M) version Rel5a cryptographic modules. </span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE authenticates and encrypts packets between itself and a MACsec peer.&nbsp; The MACsec Key Agreement (MKA) Protocol provides the required session keys and manages the required encryption keys to protect data exchanged by the peers. </span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The ESS3300 supports MACsec using the Broadcom BCM54194 a fully integrated octal Gigabit transceiver with standard compliant IEEE 802.1AE 256bit MACsec functionality (Cert # AES 4544). The tested environment is AES ECB 128bit &amp; 256bit Encryption/Decryption Engine. </span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The ESS9300 supports MACsec using the proprietary Unified Access Data Plane (UADP) MSC version 1.1 (Cert. # AES 4848). The MACsec Controller (MSC) is embedded within the ASICs that are utilized within Cisco hardware platforms. The tested environment is <a name=\"_Hlk180989820\"></a>Synopsys VCS v2011.12mx-SP1-3.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">All the algorithms claimed have CAVP certificates.&nbsp; Refer to </span><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Table 7. CAVP Certificates</span><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\"> for identification of the relevant CAVP certificates.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><a name=\"_Ref152332704\"></a><a name=\"_Toc192496856\"></a><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Table </span></strong><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">7</span></strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\"><strong>. CAVP Certificates</strong></span></p>\r\n<div align=\"center\">\r\n<table class=\"MsoNormalTable\" style=\"width: 405.25pt; border-collapse: collapse; border: none;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\r\n<thead>\r\n<tr style=\"page-break-inside: avoid; height: 24.65pt;\">\r\n<td style=\"width: 127.75pt; border: solid windowtext 1.0pt; background: #EEECE1; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif; color: black;\">SFR</span></strong></p>\r\n</td>\r\n<td style=\"width: 77.2pt; border: solid windowtext 1.0pt; border-left: none; background: #EEECE1; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif; color: black;\">Selection</span></strong></p>\r\n</td>\r\n<td style=\"width: 51.55pt; border: solid windowtext 1.0pt; border-left: none; background: #EEECE1; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif; color: black;\">Algorithm</span></strong></p>\r\n</td>\r\n<td style=\"width: 76.85pt; border: solid windowtext 1.0pt; border-left: none; background: #EEECE1; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif; color: black;\">Implementation</span></strong></p>\r\n</td>\r\n<td style=\"width: 71.9pt; border: solid windowtext 1.0pt; border-left: none; background: #EEECE1; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif; color: black;\">Certificate Number</span></strong></p>\r\n</td>\r\n</tr>\r\n</thead>\r\n<tbody>\r\n<tr style=\"page-break-inside: avoid; height: 15.0pt;\">\r\n<td style=\"width: 127.75pt; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">FCS_CKM.1 &ndash; Cryptographic Key Generation</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n</td>\r\n<td style=\"width: 77.2pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">2048</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">3072</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">P-256 </span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">P-384</span></p>\r\n</td>\r\n<td style=\"width: 51.55pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">RSA</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">ECDSA</span></p>\r\n</td>\r\n<td style=\"width: 76.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">IC2M Rel5a</span></p>\r\n</td>\r\n<td style=\"width: 71.9pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">A1462</span></p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid; height: 15.0pt;\">\r\n<td style=\"width: 127.75pt; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">FCS_CKM.2 &ndash; Cryptographic Key Establishment</span></p>\r\n</td>\r\n<td style=\"width: 77.2pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">P-256 </span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">P-384</span></p>\r\n</td>\r\n<td style=\"width: 51.55pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">KAS-ECC</span></p>\r\n</td>\r\n<td style=\"width: 76.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">IC2M Rel5a</span></p>\r\n</td>\r\n<td style=\"width: 71.9pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">A1462</span></p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid; height: 15.0pt;\">\r\n<td style=\"width: 127.75pt; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">FCS_COP.1/DataEncryption &ndash; AES Data Encryption/Decryption</span></p>\r\n</td>\r\n<td style=\"width: 77.2pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">AES-CBC-128</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">AES-CBC-256</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">AES-GCM-128</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">AES-GCM-256&nbsp; </span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n</td>\r\n<td style=\"width: 51.55pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">AES</span></p>\r\n</td>\r\n<td style=\"width: 76.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">IC2M Rel5a</span></p>\r\n</td>\r\n<td style=\"width: 71.9pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">A1462</span></p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid; height: 15.0pt;\">\r\n<td style=\"width: 127.75pt; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">FCS_COP.1/MACSEC Cryptographic Operation (MACsec AES Data Encryption and Decryption)</span></p>\r\n</td>\r\n<td style=\"width: 77.2pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">AES-GCM-128</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">AES-GCM-256</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n</td>\r\n<td style=\"width: 51.55pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">AES</span></p>\r\n</td>\r\n<td style=\"width: 76.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">MACsec</span></p>\r\n</td>\r\n<td style=\"width: 71.9pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">4544 (ESS3000)</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">4848 (ESS9300)</span></p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid; height: 15.0pt;\">\r\n<td style=\"width: 127.75pt; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">FCS_COP.1/MACSEC Cryptographic Operation (MACsec AES Data Encryption andDecryption)</span></p>\r\n</td>\r\n<td style=\"width: 77.2pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">AES-KW</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">128 bits</span></p>\r\n</td>\r\n<td style=\"width: 51.55pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">AES</span></p>\r\n</td>\r\n<td style=\"width: 76.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">IC2M Rel5a</span></p>\r\n</td>\r\n<td style=\"width: 71.9pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">A1462</span></p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid; height: 15.0pt;\">\r\n<td style=\"width: 127.75pt; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">FCS_COP.1/SigGen &ndash; Cryptographic Operation (Signature Generation and Verification)</span></p>\r\n</td>\r\n<td style=\"width: 77.2pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">2048</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">3072</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n</td>\r\n<td style=\"width: 51.55pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">RSA</span></p>\r\n</td>\r\n<td style=\"width: 76.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">IC2M Rel5a</span></p>\r\n</td>\r\n<td style=\"width: 71.9pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">A1462</span></p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid; height: 15.0pt;\">\r\n<td style=\"width: 127.75pt; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">FCS_COP.1/Hash &ndash; Cryptographic Operation (Hash Algorithm)</span></p>\r\n</td>\r\n<td style=\"width: 77.2pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">SHA-1</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">SHA-256</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">SHA-384</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">SHA-512</span></p>\r\n</td>\r\n<td style=\"width: 51.55pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">SHS</span></p>\r\n</td>\r\n<td style=\"width: 76.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">IC2M Rel5a</span></p>\r\n</td>\r\n<td style=\"width: 71.9pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">A1462</span></p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid; height: 15.0pt;\">\r\n<td style=\"width: 127.75pt; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">FCS_COP.1/KeyedHash &ndash; Cryptographic Operation (Keyed Hash Algorithm)</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n</td>\r\n<td style=\"width: 77.2pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">HMAC-SHA-256 </span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n</td>\r\n<td style=\"width: 51.55pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">HMAC</span></p>\r\n</td>\r\n<td style=\"width: 76.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">IC2M Rel5a</span></p>\r\n</td>\r\n<td style=\"width: 71.9pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">A1462</span></p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid; height: 15.0pt;\">\r\n<td style=\"width: 127.75pt; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">FCS_COP.1/CMAC Cryptographic Operation (AES-CMAC Keyed Hash Algorithm)</span></p>\r\n</td>\r\n<td style=\"width: 77.2pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">AES-CMAC</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">128 bits</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">256 bits</span></p>\r\n</td>\r\n<td style=\"width: 51.55pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">AES-CMAC</span></p>\r\n</td>\r\n<td style=\"width: 76.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">IC2M Rel5a</span></p>\r\n</td>\r\n<td style=\"width: 71.9pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">A1462</span></p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid; height: 15.0pt;\">\r\n<td style=\"width: 127.75pt; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">FCS_RBG_EXT.1&ndash; Random Bit Generation</span></p>\r\n</td>\r\n<td style=\"width: 77.2pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">CTR_DRBG (AES)</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">256 bits</span></p>\r\n</td>\r\n<td style=\"width: 51.55pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">DRBG</span></p>\r\n</td>\r\n<td style=\"width: 76.85pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">IC2M Rel5a</span></p>\r\n</td>\r\n<td style=\"width: 71.9pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">A1462</span></p>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n</div>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Identification and authentication:</span></strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE implements three types of authentications to provide a trusted means for Security Administrators and remote servers/endpoints to securely communicate:&nbsp; X.509v3 certificate-based authentication per RFC 5280 for IPSec connections to remote syslog or RADIUS AAA servers, password-based and public key based (SSH) authentication for Security Administrators, and pre-shared keys for MACsec endpoints.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Security Administrators have the ability to compose strong passwords which are stored using a SHA-2 hash.&nbsp; Additionally, the TOE detects and tracks successive unsuccessful remote authentication attempts and provides an automatic lockout when a user attempts to authenticate and enters invalid information.&nbsp; After a defined number of authentication attempts exceeding the configured allowable attempts within a configured time interval, the user or administrators account is locked out until the configured amount of time has passed.&nbsp; </span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE provides authentication services for administrative users to connect to the TOE&rsquo;s secure CLI administrator interface.&nbsp; The TOE requires Authorized Administrators to authenticate prior to being granted access to any of the management functionality. The TOE provides administrator authentication against a local user database.&nbsp; The TOE supports the use of a RADIUS AAA server (part of the IT Environment) for authentication of administrative users attempting to connect to the TOE&rsquo;s CLI.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>&nbsp;</strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security management:</strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE provides secure administrative services for management of general TOE configuration and the security functionality provided by the TOE.&nbsp; All TOE administration occurs either through a secure SSHv2 session or via a local console connection.&nbsp; The TOE provides the ability to securely:</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Administer of the TOE locally and remotely;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Configure the access banner;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Configure the session inactivity time before session termination or locking;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Update the TOE, and to verify the updates using [digital signature] capability prior to installing those updates;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Configure the authentication failure parameters for FIA_AFL.1;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Configure the number of failed administrator authentication attempts that will cause an account to be locked out <span style=\"font-size: 9.0pt; font-family: Calibri, sans-serif;\">and how long they will be locked out for</span>;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Configure audit behavior (e.g. changes to storage locations for audit; changes to behavior when local audit storage space is full);</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Manage the cryptographic keys;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Configure the cryptographic functionality;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Configure thresholds for SSH rekeying;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Configure the lifetime for IPsec SAs;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Set the time which is used for time-stamps;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Configure the reference identifier for the peer;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Manage the TOE&rsquo;s trust store and designate X509.v3 certificates as trust anchors;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Import X509.v3 certificates to the TOE&rsquo;s trust store;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Manage the trusted public keys database; </span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Manage a PSK-based CAK and install it in the device;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Manage the Key Server to create, delete, and activate MKA participants [as specified in 802.1X, sections 9.13 and 9.16 (cf. MIB object ieee8021XkayMkaParticipantEntry) and section. 12.2 (cf. function createMKA())];</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Specify a lifetime of a CAK;</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Enable, disable, or delete a PSK-based CAK using CLI management commands.</span></li>\r\n</ul>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE supports two separate administrator roles: non-privileged administrator and privileged administrator.&nbsp; Only the privileged administrator can perform the above security relevant management functions. Management of the TSF data is restricted to Security Administrators. The ability to enable, disable, determine and modify the behavior of all of the security functions of the TOE is restricted to authorized administrators.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Protection of the TSF:</span></strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE protects critical security data including keys and passwords against tampering by untrusted subjects. The TOE prevents reading of cryptographic keys and passwords. The TOE provides reliable timestamps to support monitoring local and remote interactive administrative sessions for inactivity, validating X.509 certificates (to determine if a certificate has expired), and to support accurate audit records.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE provides self-tests to ensure it is operating correctly, including the ability to detect software integrity failures.&nbsp; Additionally, the TOE provides an ability to perform software updates and to verify those software updates are from Cisco Systems, Inc.&nbsp;&nbsp; </span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Whenever a self-test&nbsp; failure occurs within the TOE,&nbsp; the TOE ceases operation (crashes). In the event of a crash appropriate information is displayed on the console screen and saved in the crashinfo file.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Additionally, Cisco IOS-XE is not a general-purpose operating system and access to Cisco IOS-XE memory space is restricted to only Cisco IOS-XE functions.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">TOE access:</span></strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE monitors both local and remote admin sessions for inactivity and terminates when a threshold time period is reached.&nbsp; Once a session has been terminated the TOE requires the user to re-authenticate.&nbsp; Sessions can also be terminated by an Authorized Administrator.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE also displays a Security Administrator specified advisory notice and consent warning message prior to initiating identification and authentication for each administrative user.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">Trusted path/channels:</span></strong></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE provides encryption (protection from disclosure and detection of modification) for communication paths between itself and remote endpoints.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">The TOE allows trusted paths to be established to itself from remote administrators over SSHv2 and initiates outbound IPsec tunnels to transmit audit messages to remote syslog servers.&nbsp; In addition, IPsec is used to secure the session between the TOE and the authentication servers.&nbsp; The TOE also supports MACsec secured trusted channels between itself and MACsec peers.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 9.0pt; font-family: 'Times New Roman', serif;\">In addition, the TOE provides two-way authentication of each endpoint in a cryptographically secure manner, meaning that even if there was a malicious attacker between the two endpoints, any attempt to represent themselves to either endpoint of the communications path as the other communicating party would be detected.</span></p>","features":[{"id":398,"feature_name":"Asymmetric Key Generation"},{"id":395,"feature_name":"Auditing"},{"id":426,"feature_name":"Certificate Authentication"},{"id":409,"feature_name":"Cryptographic Hashing"},{"id":401,"feature_name":"Cryptographic Key Establishment"},{"id":406,"feature_name":"Cryptographic Signature Verification"},{"id":397,"feature_name":"DRBG"},{"id":428,"feature_name":"IKEv2"},{"id":424,"feature_name":"IPsec"},{"id":396,"feature_name":"Key Destruction"},{"id":430,"feature_name":"MACsec"},{"id":419,"feature_name":"SSH Server"}]}