{"product_id":11627,"v_id":11627,"product_name":"Alcatel-Lucent Enterprise OmniSwitch series 6360, 6465, 6465T, 6560, 6570, 6860N, 6865, 6870, 6900, 9900 with AOS 8.10","certification_status":"Certified","certification_date":"2026-02-25T00:00:00Z","tech_type":"Network Device,Remote Access","vendor_id":{"name":"ALE USA Inc","website":"https://www.al-enterprise.com/"},"vendor_poc":"Eric Tolliver","vendor_phone":"818-878-4623","vendor_email":"eric.tolliver@al-enterprise.com","assigned_lab":{"cctl_name":"atsec information security corporation"},"product_description":"<p>The TOE is Alcatel-Lucent Enterprise OmniSwitch family of network switches. All the switches in the OmniSwitch family use the same secure level code, support Deep Packet Inspection (DPI) and Shortest Path Bridging (SPB), and provide wire-rate switching and routing capacity.</p>\r\n<p>The TOE includes hardware and software components listed in table below.</p>\r\n<p>The software running all the platforms below is Alcatel-Lucent Operating System (AOS), which is the single purpose operating system supporting device management and network management.</p>","evaluation_configuration":"<p>The evaluation covers the following hardware platforms:</p>\r\n<table style=\"width: 7.0in;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\r\n<thead>\r\n<tr>\r\n<td style=\"width: 84.6pt;\" valign=\"top\">\r\n<p><strong>Model</strong></p>\r\n</td>\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p><strong>Switch Processor</strong></p>\r\n</td>\r\n<td style=\"width: 135.0pt;\" valign=\"top\">\r\n<p><strong>Application Processor Series</strong></p>\r\n</td>\r\n<td style=\"width: 63.0pt;\" valign=\"top\">\r\n<p><strong>Software Image</strong></p>\r\n</td>\r\n<td style=\"width: 108.25pt;\" valign=\"top\">\r\n<p><strong>Network Interface</strong></p>\r\n</td>\r\n</tr>\r\n</thead>\r\n<tbody>\r\n<tr style=\"height: 5.1pt;\">\r\n<td style=\"width: 84.6pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>OmniSwitch 6360</p>\r\n</td>\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Marvell 98DX236S</p>\r\n</td>\r\n<td style=\"width: 135.0pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Arm ARMv7-A Cortex-A</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n<td style=\"width: 63.0pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Nosa.img</p>\r\n</td>\r\n<td style=\"width: 108.25pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Marvell AlleyCat 3</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 5.1pt;\">\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Marvell 98DX233S</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td style=\"width: 84.6pt;\" valign=\"top\">\r\n<p>OmniSwitch 6465</p>\r\n</td>\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Marvell 98DX3233</p>\r\n</td>\r\n<td style=\"width: 135.0pt;\" valign=\"top\">\r\n<p>Arm ARMv7-A Cortex-A</p>\r\n</td>\r\n<td style=\"width: 63.0pt;\" valign=\"top\">\r\n<p>Nos.img</p>\r\n</td>\r\n<td style=\"width: 108.25pt;\" valign=\"top\">\r\n<p>Marvell AlleyCat 3</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td style=\"width: 84.6pt;\" valign=\"top\">\r\n<p>OmniSwitch 6465T</p>\r\n</td>\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Marvell 98DX3233</p>\r\n</td>\r\n<td style=\"width: 135.0pt;\" valign=\"top\">\r\n<p>Arm ARMv7-A Cortex-A</p>\r\n</td>\r\n<td style=\"width: 63.0pt;\" valign=\"top\">\r\n<p>Nos.img</p>\r\n</td>\r\n<td style=\"width: 108.25pt;\" valign=\"top\">\r\n<p>Marvell AlleyCat 3</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td style=\"width: 84.6pt;\" valign=\"top\">\r\n<p>OmniSwitch 6560</p>\r\n</td>\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Marvell 88F6820</p>\r\n</td>\r\n<td style=\"width: 135.0pt;\" valign=\"top\">\r\n<p>Arm ARMv7-A Cortex-A</p>\r\n</td>\r\n<td style=\"width: 63.0pt;\" valign=\"top\">\r\n<p>Nos.img</p>\r\n</td>\r\n<td style=\"width: 108.25pt;\" valign=\"top\">\r\n<p>Marvell AlleyCat 3</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 5.1pt;\">\r\n<td style=\"width: 84.6pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>OmniSwitch 6570</p>\r\n</td>\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Marvell 98DX3501</p>\r\n</td>\r\n<td style=\"width: 135.0pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Arm ARMv8.2-A Cortex-A</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n<td style=\"width: 63.0pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Wos.img</p>\r\n</td>\r\n<td style=\"width: 108.25pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Marvell AlleyCat 5</p>\r\n<p>&nbsp;</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 5.1pt;\">\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Marvell 98DX3510</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 5.1pt;\">\r\n<td style=\"width: 84.6pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>OmniSwitch 6860N</p>\r\n</td>\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Intel Atom C3338</p>\r\n</td>\r\n<td style=\"width: 135.0pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Intel Goldmont Atom</p>\r\n</td>\r\n<td style=\"width: 63.0pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Uosn.img</p>\r\n</td>\r\n<td style=\"width: 108.25pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Broadcom Trident3</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 5.1pt;\">\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Intel Atom C3558</p>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td style=\"width: 84.6pt;\" valign=\"top\">\r\n<p>OmniSwitch 6865</p>\r\n</td>\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Broadcom BCM56342</p>\r\n</td>\r\n<td style=\"width: 135.0pt;\" valign=\"top\">\r\n<p>Arm ARMv7-A Cortex-A</p>\r\n</td>\r\n<td style=\"width: 63.0pt;\" valign=\"top\">\r\n<p>Uos.img</p>\r\n</td>\r\n<td style=\"width: 108.25pt;\" valign=\"top\">\r\n<p>Broadcom Helix4</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 5.1pt;\">\r\n<td style=\"width: 84.6pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>OmniSwitch 6870</p>\r\n</td>\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Intel Atom C3338</p>\r\n</td>\r\n<td style=\"width: 135.0pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Intel Goldmont Atom</p>\r\n</td>\r\n<td style=\"width: 63.0pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Kos.img</p>\r\n</td>\r\n<td style=\"width: 108.25pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Marvell Prestera DX</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 5.1pt;\">\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Intel Atom C3558</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 5.1pt;\">\r\n<td style=\"width: 84.6pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>OmniSwitch 6900</p>\r\n</td>\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Intel Atom C3558</p>\r\n</td>\r\n<td style=\"width: 135.0pt;\" valign=\"top\">\r\n<p>Intel Goldmont Atom</p>\r\n</td>\r\n<td style=\"width: 63.0pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Yos.img</p>\r\n</td>\r\n<td style=\"width: 108.25pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Broadcom Trident3</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 5.1pt;\">\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Intel Xeon D1518</p>\r\n</td>\r\n<td style=\"width: 135.0pt;\" valign=\"top\">\r\n<p>Intel Broadwell Xeon</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 5.1pt;\">\r\n<td style=\"width: 84.6pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>OmniSwitch 9900</p>\r\n</td>\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Intel Atom C2518</p>\r\n</td>\r\n<td style=\"width: 135.0pt;\" valign=\"top\">\r\n<p>Intel Silvermont Atom</p>\r\n</td>\r\n<td style=\"width: 63.0pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Mos.img</p>\r\n</td>\r\n<td style=\"width: 108.25pt;\" rowspan=\"2\" valign=\"top\">\r\n<p>Marvell Prestera DX</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 5.1pt;\">\r\n<td style=\"width: 113.15pt;\" valign=\"top\">\r\n<p>Intel Atom C3558</p>\r\n</td>\r\n<td style=\"width: 135.0pt;\" valign=\"top\">\r\n<p>Intel Goldmont Atom</p>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<h2 align=\"center\">&nbsp;</h2>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process. The criteria against which the&nbsp; Alcatel-Lucent Enterprise OmniSwitch series 6360, 6465, 6465T, 6560, 6570, 6860N, 6865, 6870, 6900, 9900 with AOS 8.10 TOE was evaluated are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 5. The evaluation methodology used by the evaluation team to conduct the evaluation was the Common Methodology for Information Technology Security Evaluation, Version 3.1, Revision 5 supplemented by that found in the Protection Profiles cited below. The evaluation was completed in February 2026. The product, when delivered and configured as identified in the <em>Alcatel-Lucent Enterprise Preparation and Operation of Common Criteria Evaluated OmniSwitch Products (NDcPP) AOS Release 8.10</em> document, meets the requirements of the following:</p>\r\n<ul>\r\n<li>collaborative Protection Profile for Network Devices, Version 3.0e, 2023-12-06</li>\r\n<li>Functional Package for Secure Shell (SSH), Version 1.0, 2021-05-13</li>\r\n</ul>","environmental_strengths":"<h3>Security Audit</h3>\r\n<p>The TOE generates audit records for security-related events. The audit records contain time stamps and other information about the events, which are helpful to the administrator in investigating the issues related to the configuration and operation of the TOE.</p>\r\n<p>The TOE writes audit records to a set of circular log files stored in the flash memory for permanent storage. The TOE can be configured to transfer the audit data to an external syslog server in real-time using the TLS protocol.</p>\r\n<h3>Cryptographic Support</h3>\r\n<p>The TOE implements the cryptography supporting the following functionalities:</p>\r\n<ul>\r\n<li>Establishment of secure network connections using the SSH and TLS protocols</li>\r\n<li>Validation of X.509 certificates</li>\r\n<li>Storage of user passwords</li>\r\n<li>Digital signature verification of TOE software updates</li>\r\n</ul>\r\n<p>The TOE provides cryptographic support using the OpenSSL library version 3.0.13, which is bundled in the TOE. The TOE also includes a software-based, SP800-90B compliant Entropy Source seeding DRBGs with full entropy.</p>\r\n<h3>Identification and Authentication</h3>\r\n<p>Administrators can access the TOE through either the local console port or a remote SSH client. The TOE authenticates administrators before granting access to management functions. For local administrative sessions, authentication is performed using passwords. For remote sessions, administrators are authenticated via SSH passwords or SSH public keys. The TOE also supports validation of X.509 certificates for authenticating external IT entities.</p>\r\n<h3>Security Management</h3>\r\n<p>The TOE provides a Command-Line Interface (CLI) to the administrators for managing the configurable aspects of the TOE. The TOE provides a range of management functions, which are restricted to administrators with the appropriate privileges.</p>\r\n<p><strong>Protection of the TSF</strong></p>\r\n<p>The TOE includes protective features to maintain the integrity and reliability of its security functions.</p>\r\n<ul>\r\n<li>The TOE uses the filesystem access control to protect sensitive data such as cryptographic keys and credentials.</li>\r\n<li>The TOE employs the digital signature to ensure trusted updates to the TOE software.</li>\r\n<li>The TOE performs self-tests to verify the correct operation of cryptographic services and the overall integrity of TOE software.</li>\r\n<li>The TOE provides a reliable system date and time, which is used for audit record time stamps, SSH rekeying, certificate validation, account lockout, and administrative session termination.</li>\r\n</ul>\r\n<p><strong>TOE Access</strong></p>\r\n<p>The TOE can be configured to display a login banner when an administrator establishes an interactive session (both local and remote). The TOE terminates interactive sessions after an administrator-defined period of inactivity. The TOE allows administrators to terminate their own administrative sessions.</p>\r\n<p><strong>TOE Trusted Path/Channel</strong></p>\r\n<p>The TOE includes the OpenSSL library version 3.0.13 and OpenSSH package version 9.8. The TOE implements the TLS protocol version 1.2 (TLS v1.2) and the SSH protocol version 2 (SSHv2) using OpenSSL and OpenSSH, respectively.</p>\r\n<ul>\r\n<li>The TOE uses the TLS protocol to secure the communication with the external audit server.</li>\r\n<li>The TOE uses the SSH protocol to protect the administrative sessions from the administrator&rsquo;s workstation to the TOE.</li>\r\n</ul>","features":[]}