{"product_id":11524,"v_id":11524,"product_name":"NIKSUN NetOmni, and NetDetector/NetVCR/LogWave running Everest Software v6.0.1.0","certification_status":"Certified","certification_date":"2025-05-02T00:00:00Z","tech_type":"Network Device","vendor_id":{"name":"NIKSUN, Inc.","website":"www.niksun.com"},"vendor_poc":"Darryle Merlette","vendor_phone":"609-936-9999","vendor_email":"merlette@niksun.com","assigned_lab":{"cctl_name":"Advanced  Data Security"},"product_description":"<p>The Target of Evaluation (TOE) includes the NIKSUN NetOmni, and NetDetector/NetVCR/LogWave appliances, running the software Everest version 6.0.1.0. NIKSUN NetOmni, and NetDetector/NetVCR/LogWave independently represents a TOE. Each of the appliances are running the exact same Everest software and the functionality is distinguished based on the licenses that are activated on the appliance. NetOmni&rsquo;s primary functionality is to provide an overview of critical operations of the monitored network. The overview includes monitoring business service disruptions, performance issues, and security incidents.</p>","evaluation_configuration":"<p style=\"text-align: justify; margin: 0in 0in 0.0001pt; font-size: 10pt; font-family: Times, serif;\" data-mce-style=\"text-align: justify; margin: 0in 0in 0.0001pt; font-size: 10pt; font-family: Times, serif;\">The TOE consists of the following hardware models:</p><p style=\"margin: 0in 0in 0.0001pt; font-size: 10pt; font-family: Times, serif;\" data-mce-style=\"margin: 0in 0in 0.0001pt; font-size: 10pt; font-family: Times, serif;\"><br data-mce-bogus=\"1\"></p><table class=\"MsoTableGrid\" style=\"width: 486.9pt; border-collapse: collapse; border: none;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\" data-mce-style=\"width: 486.9pt; border-collapse: collapse; border: none;\"><thead><tr style=\"page-break-inside: avoid;\" data-mce-style=\"page-break-inside: avoid;\"><td style=\"width: 2.2in; border: solid windowtext 1.0pt; background: #DAEEF3; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\" data-mce-style=\"width: 2.2in; border: solid windowtext 1.0pt; background: #DAEEF3; padding: 0in 5.4pt 0in 5.4pt;\"><p style=\"margin: 0in 0in 0.0001pt; text-align: center; font-size: 10pt; font-family: Calibri, sans-serif; font-weight: bold;\" data-mce-style=\"margin: 0in 0in 0.0001pt; text-align: center; font-size: 10pt; font-family: Calibri, sans-serif; font-weight: bold;\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\" data-mce-style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\">Appliance</span></p></td><td style=\"width: 76.5pt; border: solid windowtext 1.0pt; border-left: none; background: #DAEEF3; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\" data-mce-style=\"width: 76.5pt; border: solid windowtext 1.0pt; border-left: none; background: #DAEEF3; padding: 0in 5.4pt 0in 5.4pt;\"><p style=\"margin: 0in 0in 0.0001pt; text-align: center; font-size: 10pt; font-family: Calibri, sans-serif; font-weight: bold;\" data-mce-style=\"margin: 0in 0in 0.0001pt; text-align: center; font-size: 10pt; font-family: Calibri, sans-serif; font-weight: bold;\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\" data-mce-style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\">Model #</span></p></td><td style=\"width: 125.35pt; border: solid windowtext 1.0pt; border-left: none; background: #DAEEF3; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\" data-mce-style=\"width: 125.35pt; border: solid windowtext 1.0pt; border-left: none; background: #DAEEF3; padding: 0in 5.4pt 0in 5.4pt;\"><p style=\"margin: 0in 0in 0.0001pt; text-align: center; font-size: 10pt; font-family: Calibri, sans-serif; font-weight: bold;\" data-mce-style=\"margin: 0in 0in 0.0001pt; text-align: center; font-size: 10pt; font-family: Calibri, sans-serif; font-weight: bold;\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\" data-mce-style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\">Processor</span></p></td><td style=\"width: 126.65pt; border: solid windowtext 1.0pt; border-left: none; background: #DAEEF3; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\" data-mce-style=\"width: 126.65pt; border: solid windowtext 1.0pt; border-left: none; background: #DAEEF3; padding: 0in 5.4pt 0in 5.4pt;\"><p style=\"margin: 0in 0in 0.0001pt; text-align: center; font-size: 10pt; font-family: Calibri, sans-serif; font-weight: bold;\" data-mce-style=\"margin: 0in 0in 0.0001pt; text-align: center; font-size: 10pt; font-family: Calibri, sans-serif; font-weight: bold;\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\" data-mce-style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\">CPU Microarchitecture</span></p></td></tr><tr style=\"page-break-inside: avoid;\" data-mce-style=\"page-break-inside: avoid;\"><td style=\"width: 2.2in; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\" data-mce-style=\"width: 2.2in; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\"><p style=\"margin: 0in 0in 0.0001pt; font-size: 10pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0in 0in 0.0001pt; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\" data-mce-style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\">NetOmni</span></p></td><td style=\"width: 76.5pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\" data-mce-style=\"width: 76.5pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\"><p style=\"margin: 0in -5.25pt 0.0001pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0in -5.25pt 0.0001pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\" data-mce-style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\">B1000</span></p></td><td style=\"width: 125.35pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\" data-mce-style=\"width: 125.35pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\"><p style=\"margin: 0in -5.25pt 0.0001pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0in -5.25pt 0.0001pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\" data-mce-style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\">AMD EPYC 7252</span></p></td><td style=\"width: 126.65pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\" data-mce-style=\"width: 126.65pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\"><p style=\"margin: 0in -5.25pt 0.0001pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0in -5.25pt 0.0001pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\" data-mce-style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\">AMD Zen-2</span></p></td></tr><tr style=\"page-break-inside: avoid;\" data-mce-style=\"page-break-inside: avoid;\"><td style=\"width: 2.2in; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\" data-mce-style=\"width: 2.2in; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\"><p style=\"margin: 0in 0in 0.0001pt; font-size: 10pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0in 0in 0.0001pt; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\" data-mce-style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\">NetDetector/NetVCR/LogWave</span></p></td><td style=\"width: 76.5pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\" data-mce-style=\"width: 76.5pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\"><p style=\"margin: 0in -5.25pt 0.0001pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0in -5.25pt 0.0001pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\" data-mce-style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\">C3010</span></p></td><td style=\"width: 125.35pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\" data-mce-style=\"width: 125.35pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\"><p style=\"margin: 0in -5.25pt 0.0001pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0in -5.25pt 0.0001pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\" data-mce-style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\">Intel Xeon Gold 6238</span></p></td><td style=\"width: 126.65pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\" data-mce-style=\"width: 126.65pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\"><p style=\"margin: 0in -5.25pt 0.0001pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0in -5.25pt 0.0001pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\" data-mce-style=\"font-size: 11.0pt; font-family: 'Times New Roman', serif;\">Intel Cascade Lake</span></p></td></tr></thead></table><p style=\"margin: 0in 0in 0.0001pt; font-size: 10pt; font-family: Times, serif;\" data-mce-style=\"margin: 0in 0in 0.0001pt; font-size: 10pt; font-family: Times, serif;\"><br data-mce-bogus=\"1\"></p>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance. The evaluation demonstrated that the TOE meets the security requirements contained in the Security Target.  NIKSUN NetOmni, and NetDetector/NetVCR/LogWave appliances, running the software Everest version 6.0.1.was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 5, April 2017. The TOE, when installed and configured per the instructions provided in the preparative and administrative guidance, satisfies all the security functional requirements stated in the NIKSUN NetOmni, and NetDetector/NetVCR/LogWave appliances, running the software Everest version 6.0.1 Security Target. The evaluation underwent CCEVS Validator review. The evaluation was completed in May 2025.  Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11524-2025) prepared by CCEVS.</p>","environmental_strengths":"<p>The logical scope of the TOE includes those security functions implemented exclusively by the TOE. Each security function is summarized below.</p><h4>Security Audit</h4><p>The TOE provides extensive auditing capabilities. The TOE can audit events related to cryptographic functionality, identification and authentication, and administrative actions. The TOE generates an audit record for each auditable event.  The TOE keeps local and remote audit records of security relevant events. The TOE internally maintains the date and time, which can be set manually. Each security relevant audit event includes the date, timestamp, event description, and subject identity. The TOE provides the administrator with a circular audit trail. The TOE can be configured to transmit its audit messages to an external syslog server over an encrypted channel using TLS.</p><h4>Cryptographic Support</h4><p><br data-mce-bogus=\"1\"></p><p>The TOE relies on its NIKOS FIPS Object Module and NIKOS Java Object Module to implement cryptographic methods and trusted channels. The TOE uses non-mutually authenticated TLS to secure the automatic transfer of syslog audit files and VAR logs to the Syslog Server. The TOE uses TLS to secure the connection to the LDAP/AD Server for remote authentication. When a user utilizes the “Forgot Username/Password” feature on the login screen, the TOE will send an email to the SMTPS Server over a protected TLS channel. TOE communicates with another NIKSUN appliance over TLS. X.509v3 certificates are used to support authentication mechanisms. SSH is used to secure the remote CLI interface for remote management of the TOE. SSH is also used to secure communications with the SCP Server when the TOE receives software image updates. TLS/HTTPS is used to secure the connection for remote management of the TOE via the web GUI as well as connections to other devices. The TOE will deny any connections for disallowed protocols and invalid X.509v3 certificates.</p><p>Appliance cryptographic providers</p><table style=\"width: 495.9pt;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\" data-mce-style=\"width: 495.9pt;\"><thead><tr><td style=\"width: 1.95in;\" valign=\"top\" data-mce-style=\"width: 1.95in;\"><p>Cryptographic Provider</p></td><td style=\"width: 139.5pt;\" valign=\"top\" data-mce-style=\"width: 139.5pt;\"><p>Protocol</p></td><td style=\"width: 3.0in;\" valign=\"top\" data-mce-style=\"width: 3.0in;\"><p>Usage</p></td></tr></thead><tbody><tr style=\"height: 2.2pt;\" data-mce-style=\"height: 2.2pt;\"><td style=\"width: 1.95in;\" valign=\"top\" data-mce-style=\"width: 1.95in;\"><p>Bouncy Castle v1.0.2.5</p></td><td style=\"width: 139.5pt;\" valign=\"top\" data-mce-style=\"width: 139.5pt;\"><p>HTTPS (TLS 1.2)</p></td><td style=\"width: 3.0in;\" valign=\"top\" data-mce-style=\"width: 3.0in;\"><p>NIKSUN appliance and SMTPS Servers</p></td></tr><tr style=\"height: 2.2pt;\" data-mce-style=\"height: 2.2pt;\"><td style=\"width: 1.95in;\" valign=\"top\" data-mce-style=\"width: 1.95in;\"><p>OpenSSL v3.0.15</p></td><td style=\"width: 139.5pt;\" valign=\"top\" data-mce-style=\"width: 139.5pt;\"><p>TLS 1.2<br><br></p><p>SSHv2</p></td><td style=\"width: 3.0in;\" valign=\"top\" data-mce-style=\"width: 3.0in;\"><p>Syslog, HTTPS Server, and LDAP</p><p><br data-mce-bogus=\"1\"></p><p>SSH Server, SCP Server</p></td></tr></tbody></table><p><br data-mce-bogus=\"1\"></p><h4>Identification and Authentication</h4><p><br data-mce-bogus=\"1\"></p><p>The TOE verifies the identity of users connecting to the TOE. All users must be identified and authenticated before being allowed to perform actions on the TOE. This is true of users accessing the TOE via the local console, or through protected paths using the remote CLI via SSH or the web GUI via TLS 1.2. Users can authenticate to the TOE using a username and password. In addition, when authenticating by the remote CLI, users can instead use SSH public-key authentication. LDAP can be configured to provide external authentication. Passwords can consist of upper-case letters, lower-case letters, numbers, and a set of selected special characters. Password information is never revealed during the authentication process, including during login failures. Before a user authenticates to the device, a customizable warning banner can be configured to be displayed. In addition, via the web GUI only, the user has the option to use a “Forgot Username/Password” feature prior to authenticating.</p><p>The TOE uses X.509v3 certificates to perform non-mutual authentication for the Syslog Server. The TSF determines the validity of the certificates by confirming the validity of the certificate chain and verifying that the certificate chain ends in a trusted Certificate Authority (CA). The TSF connects with a CRL distribution point through HTTP to confirm certificate validity and to access certificate revocation lists (CRL).</p><h4>Security Management</h4><p>The TOE has a role-based authentication system where roles (permissions) are assigned to groups for the web GUI. Authorized actions for a particular user are dependent on which group they are assigned to. There are 4 initial groups: Administrator, Account Administrator, Advanced Users, and Users. Only users assigned to the Administrator group are capable of performing SFR related management functions via the web GUI and thus, are Security Administrators in the context of the evaluation. The root user is the Security Administrator user for the remote and local CLI and is able to update the TOE’s software and verify it via published hash validation.</p><p><br data-mce-bogus=\"1\"></p><p>The NDcPP’s definition of “role” is synonymous with NIKSUN’s definition of “permissions”. NIKSUN’s terminology fits into the Protection Profiles by using the term “user roles” in place of “user permissions”. For the remainder of this document, “user permissions” is used to match the terminology used by Common Criteria.</p><h4>Protection of the TSF</h4><p>The TOE stores passwords in a variety of locations depending on their use and encryption. They cannot be viewed by any user regardless of the user’s role. The vcr and root user passwords are stored in the OS hashed by SHA-512. Web GUI passwords are stored in the PostgreSQL Database hashed with SHA-256. Pre-shared keys, symmetric keys, and private keys cannot be accessed in plaintext form by any user. There is an underlying hardware clock that is used for accurate timekeeping and is set by the Security Administrator. The TOE performs integrity checks during initial start-up (power-on) to ensure the firmware integrity. After successful integrity checks, the TOE then further performs all cryptographic algorithm self-tests for its OpenSSL and Bouncy Castle cryptographic providers. The TOE also performs self-tests on the CPU, RAM, and disk components. The TOE’s DRBGs also perform their own health tests.</p><p>The version of the TOE is verified via the CLI or web GUI. The TOE is updated by the root user via the CLI. Updated software images are downloaded to the SCP Server and are transferred to the TOE via the SCP using SSH. The administrator conducts a hash verification on the system image using SHA-256 against the known hash to ensure the integrity of the update.</p><h4>TOE Access</h4><p>Before any user authenticates to the TOE, the TOE displays a configurable Security Administrator banner for the web GUI. The local and remote CLI interfaces display the default security banner prior to authentication that is also configurable. The TOE can terminate local CLI, remote CLI, and web GUI sessions after a specified time period of inactivity. Administrative users have the capability to terminate their own sessions.</p><h4>Trusted Path/Channels</h4><p>The TOE connects and sends data to IT entities that reside in the Operational Environment via trusted channels. In the evaluated configuration, the TOE connects to Syslog Server via TLS to send audit data for remote storage. The TLS connection to the Syslog server is over non-mutually authenticated TLS channel. TLS is used to connect to an SMTP email server for secure credentials reset. TLS is also used for the TOE’s connection with the LDAP/AD Server for its remote authentication store. TLS is used for the transfer of data between the NIKSUN appliances. SSH is used for the connection to the SCP Server when the TOE receives software image updates.</p><p>TLS/HTTPS and SSH are used for remote administration of the TOE via the web GUI and remote CLI respectively.</p>","features":[{"id":273,"feature_name":"Asymmetric Key Generation"},{"id":269,"feature_name":"Auditing"},{"id":291,"feature_name":"Certificate Authentication"},{"id":283,"feature_name":"Certificate Validation"},{"id":279,"feature_name":"Cryptographic Hashing"},{"id":276,"feature_name":"Cryptographic Key Establishment"},{"id":278,"feature_name":"Cryptographic Signature Verification"},{"id":271,"feature_name":"DRBG"},{"id":290,"feature_name":"HTTPS Client"},{"id":1545,"feature_name":"HTTPS Server without Mutual Authentication"},{"id":270,"feature_name":"Key Destruction"},{"id":280,"feature_name":"Keyed-hash message authentication"},{"id":287,"feature_name":"SSH Client"},{"id":289,"feature_name":"SSH Server"},{"id":284,"feature_name":"TLS 1.2"},{"id":285,"feature_name":"TLS Client"},{"id":286,"feature_name":"TLS Server without Mutual Authentication"}]}