{"product_id":11528,"v_id":11528,"product_name":"SonicWall SonicOS/X v7.0.1 with VPN and IPS on NSsp 15700","certification_status":"Certified","certification_date":"2025-04-25T00:00:00Z","tech_type":"Firewall,Network Device,Virtual Private Network","vendor_id":{"name":"SonicWall, Inc.","website":"www.sonicwall.com"},"vendor_poc":"Akbal Singh Karlcut","vendor_phone":"408-962-8137","vendor_email":"akarlcut@sonicwall.com","assigned_lab":{"cctl_name":"Acumen Security"},"product_description":"<p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The TOE is comprised of the SonicWall SonicOS/X v7.0.1 software running on purpose built NSsp 15700 series<span style=\"font-size: 10.0pt;\"> </span>hardware appliance platforms.</p>\r\n<p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The appliance firewall capabilities include stateful packet inspection. Stateful packet inspection maintains the state of network connections, such as Transmission Control Protocol (TCP) streams and User Datagram Protocol (UDP) communication, traveling across the firewall. The firewall distinguishes between legitimate packets and illegitimate packets for the given network deployment. Only packets adhering to the administrator-configured access rules are permitted to pass through the firewall; all others are rejected.</p>\r\n<p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The appliance capabilities include deep-packet inspection (DPI) used for intrusion prevention and detection. These services employ stream-based analysis wherein traffic traversing the product is parsed and interpreted so that its content might be matched against a set of signatures to determine the acceptability of the traffic. Only traffic adhering to the administrator-configured policies is permitted to pass through the TOE.</p>\r\n<p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The appliances support Virtual Private Network (VPN) functionality, which provides a secure connection between the device and the audit server. The appliances support authentication and protect data from disclosure or modification during transfer.</p>\r\n<p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The appliances are managed through a web based Graphical User Interface (GUI). All management activities may be performed through the web management GUI via a hierarchy of menu buttons. Administrators may configure policies and manage network traffic, users, and system logs. The appliances also have local console access where limited administrative functionality to configure the network, perform system updates, and view logs.</p>","evaluation_configuration":"<p style=\"margin: 0cm 0cm 12pt; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0cm 0cm 12pt; font-size: 11pt; font-family: Calibri, sans-serif;\">This section provides an overview of the TOE architecture, including physical boundaries, security functions, and relevant TOE documentation and references.</p><p style=\"margin: 0cm 0cm 12pt; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0cm 0cm 12pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The TOE supports secure connectivity with several other IT environment devices as described below.</p><div align=\"center\"><table class=\"MsoNormalTable\" style=\"width: 100%; border-collapse: collapse; border: none;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\" data-mce-style=\"width: 100%; border-collapse: collapse; border: none;\"><thead><tr style=\"height: 5.85pt;\" data-mce-style=\"height: 5.85pt;\"><td style=\"width: 85.25pt; border: solid windowtext 1.0pt; background: #FFC000; padding: 0cm 3.6pt 0cm 3.6pt;\" valign=\"bottom\" data-mce-style=\"width: 85.25pt; border: solid windowtext 1.0pt; background: #FFC000; padding: 0cm 3.6pt 0cm 3.6pt;\"><p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\"><strong><span style=\"font-size: 10.0pt; color: black;\" data-mce-style=\"font-size: 10.0pt; color: black;\">Component</span></strong></p></td><td style=\"width: 54.0pt; border: solid windowtext 1.0pt; border-left: none; background: #FFC000; padding: 0cm 3.6pt 0cm 3.6pt;\" valign=\"top\" data-mce-style=\"width: 54.0pt; border: solid windowtext 1.0pt; border-left: none; background: #FFC000; padding: 0cm 3.6pt 0cm 3.6pt;\"><p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\"><strong><span style=\"font-size: 10.0pt; color: black;\" data-mce-style=\"font-size: 10.0pt; color: black;\">Required</span></strong></p></td><td style=\"width: 328.25pt; border: solid windowtext 1.0pt; border-left: none; background: #FFC000; padding: 0cm 3.6pt 0cm 3.6pt;\" valign=\"top\" data-mce-style=\"width: 328.25pt; border: solid windowtext 1.0pt; border-left: none; background: #FFC000; padding: 0cm 3.6pt 0cm 3.6pt;\"><p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\"><strong><span style=\"font-size: 10.0pt; color: black;\" data-mce-style=\"font-size: 10.0pt; color: black;\">Usage/Purpose Description</span></strong></p></td></tr></thead><tbody><tr style=\"height: 6.8pt;\" data-mce-style=\"height: 6.8pt;\"><td style=\"width: 85.25pt; border: solid windowtext 1.0pt; border-top: none; padding: 0cm 3.6pt 0cm 3.6pt;\" valign=\"top\" data-mce-style=\"width: 85.25pt; border: solid windowtext 1.0pt; border-top: none; padding: 0cm 3.6pt 0cm 3.6pt;\"><p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 10.0pt;\" data-mce-style=\"font-size: 10.0pt;\">Management Workstation</span></p></td><td style=\"width: 54.0pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0cm 3.6pt 0cm 3.6pt;\" valign=\"top\" data-mce-style=\"width: 54.0pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0cm 3.6pt 0cm 3.6pt;\"><p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 10.0pt;\" data-mce-style=\"font-size: 10.0pt;\">Yes</span></p></td><td style=\"width: 328.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0cm 3.6pt 0cm 3.6pt;\" valign=\"top\" data-mce-style=\"width: 328.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0cm 3.6pt 0cm 3.6pt;\"><p style=\"margin: 0cm 0cm 6pt 0.05pt; line-height: 107%; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0cm 0cm 6pt 0.05pt; line-height: 107%; font-size: 11pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 10.0pt; line-height: 107%;\" data-mce-style=\"font-size: 10.0pt; line-height: 107%;\">This includes any IT Environment Management workstation</span></p></td></tr><tr style=\"height: 6.8pt;\" data-mce-style=\"height: 6.8pt;\"><td style=\"width: 85.25pt; border: solid windowtext 1.0pt; border-top: none; padding: 0cm 3.6pt 0cm 3.6pt;\" valign=\"top\" data-mce-style=\"width: 85.25pt; border: solid windowtext 1.0pt; border-top: none; padding: 0cm 3.6pt 0cm 3.6pt;\"><p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 10.0pt;\" data-mce-style=\"font-size: 10.0pt;\">Audit Server</span></p></td><td style=\"width: 54.0pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0cm 3.6pt 0cm 3.6pt;\" valign=\"top\" data-mce-style=\"width: 54.0pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0cm 3.6pt 0cm 3.6pt;\"><p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 10.0pt;\" data-mce-style=\"font-size: 10.0pt;\">Yes</span></p></td><td style=\"width: 328.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0cm 3.6pt 0cm 3.6pt;\" valign=\"top\" data-mce-style=\"width: 328.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0cm 3.6pt 0cm 3.6pt;\"><p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 10.0pt;\" data-mce-style=\"font-size: 10.0pt;\">An audit server supporting the syslog protocol with an IPsec peer supporting IKEv2 and ESP in the cryptographic protocols defined in 5.2.2 of this document.</span></p></td></tr><tr style=\"height: 6.8pt;\" data-mce-style=\"height: 6.8pt;\"><td style=\"width: 85.25pt; border: solid windowtext 1.0pt; border-top: none; padding: 0cm 3.6pt 0cm 3.6pt;\" valign=\"top\" data-mce-style=\"width: 85.25pt; border: solid windowtext 1.0pt; border-top: none; padding: 0cm 3.6pt 0cm 3.6pt;\"><p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 10.0pt;\" data-mce-style=\"font-size: 10.0pt;\">Management Console</span></p></td><td style=\"width: 54.0pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0cm 3.6pt 0cm 3.6pt;\" valign=\"top\" data-mce-style=\"width: 54.0pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0cm 3.6pt 0cm 3.6pt;\"><p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 10.0pt;\" data-mce-style=\"font-size: 10.0pt;\">Yes</span></p></td><td style=\"width: 328.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0cm 3.6pt 0cm 3.6pt;\" valign=\"top\" data-mce-style=\"width: 328.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0cm 3.6pt 0cm 3.6pt;\"><p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\" data-mce-style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 10.0pt;\" data-mce-style=\"font-size: 10.0pt;\">Any computer that provides a supported browser may be used to access the GUI</span></p></td></tr></tbody></table></div>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Sonicwall SonicOS/X v7.0.1 with VPN and IPS on NSsp 15700 was evaluated is described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 5.&nbsp; The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 5.&nbsp; The product, when delivered and configured as identified in the Common Criteria Administrator Guidance, satisfies all of the security functional requirements stated in the ST. The project underwent CCEVS Validator review.&nbsp; The evaluation was completed in April 2025.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.&nbsp;&nbsp;</p>","environmental_strengths":"<p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The TOE provides the security functions required by the Collaborative Protection Profile for Network Devices, hereafter referred to as NDcPP v2.2e or NDcPP, collaborative Protection Profile Module for Stateful Traffic Filter Firewall, hereafter referred to as MOD_CPP_FW v1.4e or MOD_CPP_FW, PP-Module for VPN Gateways Version 1.3 hereafter referred to as MOD_VPNGW v1.3 or MOD_VPNGW, PP-Module for Intrusion Protection Systems (IPS) Version 1.0, hereafter referred to as MOD_IPS v1.0 or MOD_IPS. <span style=\"color: red;\">&nbsp;</span></p>\r\n<h4 style=\"margin: 12pt 0cm 6pt 43.2pt; text-indent: -43.2pt; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(33, 182, 215); font-weight: normal;\">Security Audit</h4>\r\n<p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\">&nbsp;The TOE generates audit records for administrative activity, security related configuration changes, cryptographic key changes and startup and shutdown of the audit functions. The audit events are associated with the administrator who performs them, if applicable. The audit records are transmitted over an IPsec VPN tunnel to an external audit server in the IT environment for storage.</p>\r\n<h4 style=\"margin: 12pt 0cm 6pt 43.2pt; text-indent: -43.2pt; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(33, 182, 215); font-weight: normal;\">Cryptographic Support</h4>\r\n<p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The TOE provides cryptographic functions (key generation, key establishment, key destruction, cryptographic operation) to secure remote administrative sessions over Hypertext Transfer Protocol Secure (HTTPS)/Transport Layer Security (TLS), and to support Internet Protocol Security (IPsec) to provide VPN functionality and to protect the connection to the audit server.&nbsp;</p>\r\n<h4 style=\"margin: 12pt 0cm 6pt 43.2pt; text-indent: -43.2pt; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(33, 182, 215); font-weight: normal;\">Residual Data Protection</h4>\r\n<p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The TOE ensures that data cannot be recovered once deallocated.</p>\r\n<h4 style=\"margin: 12pt 0cm 6pt 43.2pt; text-indent: -43.2pt; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(33, 182, 215); font-weight: normal;\">Identification and Authentication</h4>\r\n<p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The TOE provides a password-based logon mechanism. This mechanism enforces minimum strength requirements and ensures that passwords are obscured when entered. The TOE also validates and authenticates X.509 certificates for all certificate use.</p>\r\n<h4 style=\"margin: 12pt 0cm 6pt 43.2pt; text-indent: -43.2pt; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(33, 182, 215); font-weight: normal;\">Security Management</h4>\r\n<p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The TOE provides management capabilities via a Web-based GUI, accessed over HTTPS. Management functions allow the administrators to configure and update the system, manage users and configure the Virtual Private Network (VPN) and Intrusion Prevention System (IPS) functionality.</p>\r\n<h4 style=\"margin: 12pt 0cm 6pt 43.2pt; text-indent: -43.2pt; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(33, 182, 215); font-weight: normal;\"><span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;</span>Protection of the TSF</h4>\r\n<p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The TOE prevents the reading of plaintext passwords and keys. The TOE provides a reliable timestamp for its own use. To protect the integrity of its security functions, the TOE implements a suite of self-tests at startup and shuts down if a critical failure occurs. The TOE verifies the software image when it is loaded. The TOE ensures that updates to the TOE software can be verified using a digital signature.</p>\r\n<h4 style=\"margin: 12pt 0cm 6pt 43.2pt; text-indent: -43.2pt; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(33, 182, 215); font-weight: normal;\">TOE Access</h4>\r\n<p style=\"margin: 0cm 0cm 6pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The TOE monitors local and remote administrative sessions for inactivity and either locks or terminates the session when a threshold time period is reached. An advisory notice is displayed at the start of each session.</p>\r\n<h4 style=\"margin: 12pt 0cm 6pt 43.2pt; text-indent: -43.2pt; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(33, 182, 215); font-weight: normal;\">Trusted Path/Channels</h4>\r\n<p style=\"margin: 0cm 0cm 12pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The TSF provides IPsec VPN tunnels for trusted communication between itself and an audit server. The TOE implements HTTPS for protection of communications between itself and the Management Console.</p>\r\n<h4 style=\"margin: 12pt 0cm 6pt 43.2pt; text-indent: -43.2pt; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(33, 182, 215); font-weight: normal;\">Intrusion Prevention</h4>\r\n<p style=\"margin: 0cm 0cm 12pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The TOE performs analysis of IP-based network traffic and detects violations of administratively defined IPS policies. The TOE inspects each packet header and payload for anomalies and known signature-based attacks and determines whether to allow traffic to traverse the TOE.</p>\r\n<h4 style=\"margin: 12pt 0cm 6pt 43.2pt; text-indent: -43.2pt; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(33, 182, 215); font-weight: normal;\"><span style=\"font: 7.0pt 'Times New Roman';\">&nbsp;</span>Stateful Traffic Filtering and Packet Filtering</h4>\r\n<p style=\"margin: 0cm 0cm 12pt; font-size: 11pt; font-family: Calibri, sans-serif;\">The TOE restricts the flow of network traffic between protected networks and other attached networks based on addresses and ports of the network nodes originating (source) and/or receiving (destination) applicable network traffic, as well as on established connection information.</p>\r\n<p><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">The TOE performs packet filtering on network packets.</span></p>","features":[{"id":2695,"feature_name":"Asymmetric Key Generation"},{"id":2679,"feature_name":"Auditing"},{"id":2685,"feature_name":"Certificate Authentication"},{"id":2686,"feature_name":"Certificate Validation"},{"id":2702,"feature_name":"Cryptographic Hashing"},{"id":2696,"feature_name":"Cryptographic Key Establishment"},{"id":2701,"feature_name":"Cryptographic Signature Verification"},{"id":2694,"feature_name":"DRBG"},{"id":2678,"feature_name":"Firewall"},{"id":2714,"feature_name":"HTTPS Server without Mutual Authentication"},{"id":2720,"feature_name":"IKEv2"},{"id":2690,"feature_name":"Intrusion Prevention"},{"id":2684,"feature_name":"IPsec"},{"id":2680,"feature_name":"Key Destruction"},{"id":2704,"feature_name":"Keyed-hash message authentication"},{"id":2721,"feature_name":"TLS 1.2"},{"id":2710,"feature_name":"TLS Server without Mutual Authentication"},{"id":2683,"feature_name":"VPN Gateway"}]}