{"product_id":11572,"v_id":11572,"product_name":"Fortinet FortiSwitch v7.6","certification_status":"Certified","certification_date":"2025-08-19T00:00:00Z","tech_type":"Network Device","vendor_id":{"name":"Fortinet, Inc.","website":"https://www.fortinet.com"},"vendor_poc":"Marc Boire","vendor_phone":"613-225-9381","vendor_email":"mboire@fortinet.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p><span style=\"color: rgb(224, 62, 45); font-family: 'times new roman', times, serif;\" data-olk-copy-source=\"MessageBody\">The Target of Evaluation (TOE) is FortiSwitchOS with the specific build version of 7.6.0, build 8083, which incorporated a patch to address <span style=\"text-decoration: underline;\">FG-IR-24-435 (CVE-2024-48887</span>). NIAP strongly recommends that all vendor-delivered bug fixes and security patches be installed; and with such updates properly installed, the product is still considered by NIAP to be in its evaluated configuration as per <span style=\"text-decoration: underline;\">NIAP Publication #6 section 2.4.5</span>.</span></p>\r\n<p>&nbsp;</p>\r\n<p><span style=\"font-family: 'times new roman', times, serif;\">The Fortinet FortiSwitch v7.6 TOE is a series of scalable Ethernet Switch network devices used to connect devices on Ethernet local area networks (LANs). &nbsp;The switches are enterprise level switches suitable for SD-Branch deployments with high throughput requirements.&nbsp; The TOE is optimal for use in converged network environments, enabling voice, data, and wireless traffic to be delivered across a single network.</span></p>\r\n<p><span style=\"font-family: 'times new roman', times, serif;\">For this evaluation, the TOE is treated as a network device offering NIST validated cryptographic functions, security auditing, secure administration, trusted updates, self-tests, and secure connection to an external audit server.</span></p>\r\n<p><span style=\"font-family: 'times new roman', times, serif;\">Cryptographic functionality is provided by the OpenSSL and OpenSSH libraries included in the TOE in support of higher-level protocols (TLS, SSH). The module&rsquo;s FIPS-Approved cryptographic algorithms have obtained CAVP certificates.</span></p>\r\n<p><span style=\"font-family: 'times new roman', times, serif;\">The TOE audits security relevant events, stores audit records locally, and can be configured to forward its audit records to an external syslog server in the network environment. An administrator can manually set the TOE&rsquo;s time.</span></p>\r\n<p><span style=\"font-family: 'times new roman', times, serif;\">The TOE uses TLS to protect syslog, offers a management GUI protected by TLS/HTTPS, and provides a management CLI protected by SSH.</span></p>\r\n<p><span style=\"font-family: 'times new roman', times, serif;\">Administrators are able to query the current version of the product firmware and manage the security functions of the TOE including perform updates on the product. Public/private keys are used to provide digital signatures for protection of the update files.</span></p>\r\n<p><span style=\"font-family: 'times new roman', times, serif;\">The TOE provides self-tests to ensure the integrity and correct operation of the TOE.</span></p>","evaluation_configuration":"<p>The TOE comprises the following FortiSwitch appliance models, all running FortiSwitch 7.6.0, build 8083:</p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-1024E</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-T1024E</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-624F</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-624F FPOE</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-648F</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-648F FPOE</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-424E</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-424E FIBER</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-424E POE</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-424E FPOE</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FSR-424F POE</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-M426E FPOE</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-448E</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-448E POE</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-448E FPOE</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-1048E</span></li>\r\n<li style=\"text-align: justify; margin: 0in 0in 0in 0px; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-3032E</span></li>\r\n<li style=\"margin: 0in 0in 6pt 0px; text-align: justify; font-size: 12pt; font-family: 'Times New Roman', serif; color: black;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: windowtext;\">FS-2048F</span></li>\r\n</ul>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance. The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, September 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 release 5. The product, when configured as identified in the guidance documentation, satisfies all of the security functional requirements stated in the Fortinet FortiSwitch v7.6 Security Target. The evaluation was completed in August 2025. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.</p>","environmental_strengths":"<p><em><strong>Security Audit</strong></em></p>\r\n<p>The TOE generates audit events associated with identification and authentication, management, updates, and user sessions. The TOE can store the events in a local log and export them to a syslog server using a TLS protected channel.&nbsp;</p>\r\n<p><em><strong>Cryptographic Support</strong></em></p>\r\n<p>The TOE provides CAVP certified cryptography in support of its SSH, TLS, self-testing, and for verifying TOE update package signatures. Cryptographic services include key management, random bit generation, symmetric encryption and decryption, digital signature, and secure hashing.</p>\r\n<p><em><strong>Identification and Authentication</strong></em></p>\r\n<p>The TOE requires users to be identified and authenticated before they can use functions mediated by the TOE, with the exception of viewing and agreeing to the login banner. The TOE authenticates a user&rsquo;s credentials (password, public key) using local mechanisms provided by the TOE. The TOE also provides X.509 certificate checking for its TLS connections.</p>\r\n<p><em><strong>Security Management</strong></em></p>\r\n<p>The TOE provides CLI and web-based management interfaces that an administrator can access locally or remotely via a network port. Remote connections to the management interfaces are protected with SSH for the CLI and HTTPS for the GUI. The local administrative interface is subject to physical protection. To access the TOE locally, an administrator must directly connect their workstation to the TOE using a serial cable and successfully log in. The management interface is limited to the authorized administrators.&nbsp;&nbsp;&nbsp;</p>\r\n<p><em><strong>Protection of the TSF</strong></em></p>\r\n<p>The TOE implements various self-protection mechanisms. The TOE performs self-tests that cover the correct operation of the TSF. It provides functions necessary to securely update the TOE. It relies upon administrator manually provided time to ensure reliable timestamps. It protects sensitive data such as passwords and cryptographic keys stored on the TOE so that they are not accessible, even by an authorized administrator.</p>\r\n<p><em><strong>TOE Access</strong></em></p>\r\n<p>The TOE will terminate local and remote interactive sessions after a configurable period of inactivity. The TOE additionally provides the capability for administrators to terminate their own interactive sessions. The TOE can be configured to display an advisory and consent warning message before establishing a user session.</p>\r\n<p><em><strong>Trusted Path/Channels</strong></em></p>\r\n<p>When accessed remotely, the CLI and GUI management interfaces are protected by SSH or TLS, thus ensuring protection against modification and disclosure.</p>\r\n<p>The TOE protects communications with the external syslog server from modification and disclosure by using TLS.</p>","features":[{"id":1106,"feature_name":"Asymmetric Key Generation"},{"id":1102,"feature_name":"Auditing"},{"id":1115,"feature_name":"Certificate Authentication"},{"id":1111,"feature_name":"Certificate Validation"},{"id":1109,"feature_name":"Cryptograhic Hashing"},{"id":1107,"feature_name":"Cryptographic Key Establishment"},{"id":1108,"feature_name":"Cryptographic Signature Verification"},{"id":1105,"feature_name":"DRBG"},{"id":1101,"feature_name":"Flaw Remediation"},{"id":1113,"feature_name":"HTTPS Client"},{"id":1114,"feature_name":"IPsec"},{"id":1103,"feature_name":"Key Destruction"},{"id":1110,"feature_name":"Keyed-hash message authentication"},{"id":1104,"feature_name":"SSH Server"},{"id":1116,"feature_name":"TLS 1.2"},{"id":1117,"feature_name":"TLS 1.3"},{"id":1112,"feature_name":"TLS Client"}]}