{"product_id":11636,"v_id":11636,"product_name":"FortiSandbox 4.4","certification_status":"Certified","certification_date":"2025-10-31T00:00:00Z","tech_type":"Network Device,Remote Access","vendor_id":{"name":"Fortinet, Inc.","website":"https://www.fortinet.com"},"vendor_poc":"Marc Boire","vendor_phone":"613-225-9381","vendor_email":"mboire@fortinet.com","assigned_lab":{"cctl_name":"UL Verification Services"},"product_description":"<p>FortiSandbox 4.4 is a high-performance security solution that utilizes AI/machine learning technology to identify and isolate advanced threats in real-time.</p>\r\n<p>FortiSandbox inspects files, websites, URLs and network traffic for malicious activity, including zero-day threats, and uses sandboxing technology to analyze suspicious files in a secure virtual environment.</p>","evaluation_configuration":"<p>The TOE Evaluated Configuration includes only the functions necessary to enforce the requirements of this protection profile, described below.&nbsp; All other functionality, Fortinet product interactions, or other unique features of the device are outside the scope of the evaluation and were not tested.</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\"><u>Evaluated Configuration #1:</u></p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 48px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">FortiSandbox 1500G, using an AMD EPYC 7313P CPU on the Zen 3 microarchitecture</li>\r\n</ul>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"text-align: left; margin: 0in 0in 0in 48px; font-size: 11pt; font-family: Arial, sans-serif;\">FortiSandbox version 4.4.6-build 4527 (interim)</li>\r\n<li style=\"text-align: left; margin: 0in 0in 6pt 48px; font-size: 11pt; font-family: Arial, sans-serif;\">Non-TOE hardware of Fortinet FortiAnalyzer (FAZ) for remote logging</li>\r\n</ul>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\">The FortiSandbox is put in CC mode by issuing the CLI command &ldquo;cc-mode-conf &ndash;e&rdquo;.</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\">HTTP GUI, Telnet, TFTP are disabled in CC mode by default.</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\">A signed certificate from a trusted CA is loaded to replace the default Fortinet CA signed certificate.</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\">SSH administrative access is enabled via the web based manager. Under system, interfaces, port1, double click on port1 and in the &ldquo;Access Rights&rdquo; box check the &ldquo;SSH&rdquo; box to enable.</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\">A pre-login banner is enabled via the administrative GUI. Select &ldquo;Login Disclaimer&rdquo; and click on the &ldquo;Show disclaimer on login&rdquo;.</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\">The FortiAnalyzer (FAZ) remote logging server is set up:</p>\r\n<ol style=\"list-style-type: lower-alpha; margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"text-align: left; margin: 0in 0in 0in 0px; font-size: 11pt; font-family: Arial, sans-serif;\">FAZ server certificate is generated with a 3<sup>rd</sup> party tool</li>\r\n<li style=\"text-align: left; margin: 0in 0in 0in 0px; font-size: 11pt; font-family: Arial, sans-serif;\">The root CA/subordinate CA certificates are imported into the FAZ and the root CA certificate is imported into the FortiSandbox</li>\r\n<li style=\"text-align: left; margin: 0in 0in 6pt 0px; font-size: 11pt; font-family: Arial, sans-serif;\">The OFTP setting on the FAZ is configured via CLI with &ldquo;config sys certificate local&rdquo;, &ldquo;edit oftp-server&rdquo;, &ldquo;set private-key&rdquo;, &ldquo;set certificate&rdquo;, &ldquo;end&rdquo;. &ldquo;configy sys certificate OFTP&rdquo;, &ldquo;set mode local&rdquo;, &ldquo;set local &lsquo;oftp-server&rsquo;&rdquo;</li>\r\n</ol>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\">The FortiAnalyzer local log setting is configured via CLI with &ldquo;config sys locallog fortianalyzer setting&rdquo;, &ldquo;set status disable&rdquo;, &ldquo;end&rdquo;.</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\">The FAZ root CA certificate is downloaded via the administrative GUI under System Settings &gt; Certificates &gt; CA Certificates.</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\">The CA certificate for the FAZ is imported to the FortiSandbox via the administrative GUI under Certificates &gt; Create New/Import &gt; CA Certificate</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\">The FAZ is enabled via the FortiSandbox administrative GUI under Log &amp; Report &gt; Log Servers &gt; Create New.</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\">On the FAZ, the FortiSandbox is added to the ADOM via the administrative GUI under Device Manager &gt; Add Device.</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\">&nbsp;</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\">Certificate Revocation Lists (CRL) are configured as:</p>\r\n<ol style=\"list-style-type: lower-alpha; margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"text-align: left; margin: 0in 0in 0in 0px; font-size: 11pt; font-family: Arial, sans-serif;\">Via the administrative GUI under System &gt; Certificates, a .crl file is added by selecting &ldquo;Create New/Import&rdquo;.</li>\r\n<li style=\"text-align: left; margin: 0in 0in 0in 0px; font-size: 11pt; font-family: Arial, sans-serif;\">At the CLI the below two commands are issued while substituting for the correct IP address and file names:\r\n<ol style=\"list-style-type: lower-alpha; margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"list-style: none; text-align: left; margin: 0in 0in 0in 0px; font-size: 11pt; font-family: Arial, sans-serif; text-indent: 120px;\">\r\n<ol style=\"list-style-type: lower-roman; margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"text-align: left; margin: 0in 0in 0in 12px; font-size: 11pt; font-family: Arial, sans-serif;\">cert-crl -nca-crl -ihttp://172.25.176.12/ca.crl.pem -t3</li>\r\n<li style=\"text-align: left; margin: 0in 0in 6pt 12px; font-size: 11pt; font-family: Arial, sans-serif;\">cert-crl -nint-crl -ihttp://172.25.176.12/intl.crl.pem -t3</li>\r\n</ol>\r\n</li>\r\n</ol>\r\n</li>\r\n</ol>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\">&nbsp;</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\"><u>Evaluated Configuration #2:</u></p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 48px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">FortiSandbox 500G, using an AMD EPYC 3251 CPU on the Zen microarchitecture</li>\r\n<li style=\"text-align: left; margin: 0in 0in 0in 48px; font-size: 11pt; font-family: Arial, sans-serif;\">FortiSandbox version 4.4.6-build 4527 (interim)</li>\r\n<li style=\"text-align: left; margin: 0in 0in 6pt 48px; font-size: 11pt; font-family: Arial, sans-serif;\">Non-TOE hardware of Fortinet FortiAnalyzer (FAZ) for remote logging</li>\r\n</ul>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">*** - All other configuration items identical to &ldquo;Evaluated Configuration #1&rdquo; shown above.</p>\r\n<p style=\"margin: 0in 0in 6pt 1in; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">&nbsp;</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\"><u>Evaluated Configuration #3:</u></p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 48px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">FortiSandbox 3000F, using an AMD EPYC 7402 CPU on the Zen 2 microarchitecture</li>\r\n<li style=\"text-align: left; margin: 0in 0in 0in 48px; font-size: 11pt; font-family: Arial, sans-serif;\">FortiSandbox version 4.4.6-build 4527 (interim)</li>\r\n<li style=\"text-align: left; margin: 0in 0in 0in 48px; font-size: 11pt; font-family: Arial, sans-serif;\">Non-TOE hardware of Fortinet FortiAnalyzer (FAZ) for remote logging</li>\r\n</ul>\r\n<p style=\"margin: 0in 0in 6pt 1in; text-align: left; font-size: 11pt; font-family: Arial, sans-serif;\">&nbsp;</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">*** - All other configuration items identical to &ldquo;Evaluated Configuration #1&rdquo; shown above.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">&nbsp;</p>\r\n<p style=\"text-align: left; margin: 0in 0in 6pt; font-size: 11pt; font-family: Arial, sans-serif;\"><u>Evaluated Configuration #4:</u></p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 48px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">FortiSandbox VM virtual appliance</li>\r\n<li style=\"text-align: left; margin: 0in 0in 0in 48px; font-size: 11pt; font-family: Arial, sans-serif;\">FortiSandbox version 4.4.6-build 4527 (interim) VM image for ESXi virtualization servers</li>\r\n<li style=\"margin: 0in 0in 8pt 48px; text-align: left; line-height: 107%; font-size: 11pt; font-family: Arial, sans-serif;\">Virtualized environment of VMware ESXi 8.0 on Intel Xeon E5-2630v3, 8 Cores, 2.10GHz processor (Broadwell)&nbsp; processor</li>\r\n<li style=\"text-align: left; margin: 0in 0in 6pt 48px; font-size: 11pt; font-family: Arial, sans-serif;\">Non-TOE hardware of Fortinet FortiAnalyzer (FAZ) for remote logging</li>\r\n</ul>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes and procedures. The TOE was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 5. The evaluation methodology used by the Evaluation Team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 5. &nbsp;The evaluation, completed in October 2025 was successful and provides a level of assurance that the TOE meets the Security Functional Requirements identified in the Security Target. This assurance comes from the performance of the work units associated with the Security Assurance Requirements. A detailed description of those Assurance Requirements as well as the details of how the product meets each of them can be found in the Security Target. A more detailed account of the evaluation assurance activities and the results obtained can be found in the Assurance Activity Report.</p>","environmental_strengths":"<div>&nbsp;</div>\r\n<div>\r\n<h4 style=\"margin: 10pt 0in 6pt 45pt; text-indent: -45pt; text-align: justify; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(192, 0, 0);\"><span style=\"font-family: Arial, sans-serif;\">Audit</span></h4>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 0px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE will audit all events and information defined in the ST Table 4: Auditable Events.</li>\r\n<li style=\"margin: 0in 0in 0in 0px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE will also include the identity of the user that caused the event (if applicable), date and time of the event, type of event, and the outcome of the event.</li>\r\n<li style=\"margin: 0in 0in 0in 0px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE protects storage of audit information from unauthorized deletion</li>\r\n<li style=\"margin: 0in 0in 0in 0px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE prevents unauthorized modifications to the stored audit records.</li>\r\n<li style=\"margin: 0in 0in 6pt 0px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE supports transmitting audit data to an external IT entity using TLS protocol.</li>\r\n</ul>\r\n</div>\r\n<h4 style=\"margin: 10pt 0in 6pt 45pt; text-indent: -45pt; text-align: justify; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(192, 0, 0);\"><span style=\"font-family: Arial, sans-serif;\">Cryptographic Operations</span></h4>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TSF performs cryptographic operations as defined in the TSS section 7.2. This includes:</p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">key generation for TLS and SSH using RSA, ECC, and FFC;\r\n<ul style=\"list-style-type: circle; margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">RSA with key sizes of 2048 bits or greater</li>\r\n<li style=\"margin: 0in 0in 0in 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">ECC over NIST curves P-256, P-384, and/or P-521</li>\r\n<li style=\"margin: 0in 0in 0in 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">FFC using 2048-bit or greater keys in accordance with FIPS PUB 186-4</li>\r\n<li style=\"margin: 0in 0in 0in 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">FFC using safe-primes according to NIST SP 800-56A r3</li>\r\n</ul>\r\n</li>\r\n<li style=\"margin: 0in 0in 0in 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">key establishment in SSH and TLS sessions using ECDSA or DH/ECDH;\r\n<ul style=\"list-style-type: circle; margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">ECC according to NIST SP 800-56A rev3</li>\r\n<li style=\"margin: 0in 0in 0in 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">FFC according to FIPS PUB 186-4 and NIST SP 800-56A rev3</li>\r\n<li style=\"margin: 0in 0in 0in 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">FFC using Safe Primes, according to NIST SP 800-56A</li>\r\n</ul>\r\n</li>\r\n<li style=\"margin: 0in 0in 0in 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">bulk encryption using AES in CBC or GCM modes with 128 or 256 bit keys.</li>\r\n<li style=\"margin: 0in 0in 0in 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">Cryptographic signature generation and verification using RSA or ECDSA\r\n<ul style=\"list-style-type: circle; margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">RSA with modulus 2048-bit or greater according to FIPS PUB 186-4 section 5.5</li>\r\n<li style=\"margin: 0in 0in 0in 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">ECDSA over curves NIST P-256, P-384, and/or P-521, according to FIPS PUB 186-4 section 6 and Appendix D</li>\r\n</ul>\r\n</li>\r\n<li style=\"margin: 0in 0in 0in 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">Cryptographic hashing operations using SHA-1, SHA-2-256, SHA-2-384, and/or SHA-2-512\r\n<ul style=\"list-style-type: circle; margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 6pt 4px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">Keyed Hashing operations using the same underlying hashes in an HMAC function: HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512</li>\r\n</ul>\r\n</li>\r\n</ul>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">For details on the cryptographic operations performed by the TOE and the certificates which govern those operations, please see [ST] section 7.2</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TSF zeroizes all plaintext secret and private cryptographic keys and CSPs once they are no longer required.</p>\r\n<h4 style=\"margin: 10pt 0in 6pt 45pt; text-indent: -45pt; text-align: justify; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(192, 0, 0);\"><span style=\"font-family: Arial, sans-serif;\">Identification and Authentication</span></h4>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TSF supports passwords consisting of alphanumeric and special characters. The TSF also allows administrators to set a minimum password length and support passwords with 15 characters or more.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TSF requires all administrative-users to authenticate before allowing the user to perform any actions other than viewing the warning banner.&nbsp; The TOE may take certain automatic actions prior to authenticating any user:</p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 0px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">generating ephemeral session keys for SSH or TLS sessions, when any user attempts to connect.</li>\r\n<li style=\"margin: 0in 0in 6pt 0px; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">displaying the configured advisory and consent message, in accordance with the &ldquo;Access Banner&rdquo; requirement.</li>\r\n</ul>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">These TSF operations occur before identification and authentication.</p>\r\n<h4 style=\"margin: 10pt 0in 6pt 45pt; text-indent: -45pt; text-align: justify; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(192, 0, 0);\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font: 7.0pt 'Times New Roman';\">&nbsp; </span></span><span style=\"font-family: Arial, sans-serif;\">Security Management</span></h4>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE provides management functionality over both local and remote interfaces.&nbsp;</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The local interface to a standalone hardware TOE is a dedicated physical port, which proxies direct console interface to the TOE&rsquo;s CLI.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">Local access to a virtual TOE is through the ESXi console via URL.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">For both standalone hardware TOEs and virtual TOEs, the remote interfaces are an SSH connection to the CLI and a web GUI accessed over TLS/HTTPS.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE supports one default fully privileged user account, Admin, which corresponds to the PP defined Security Administrator. The Admin account has full privileges to all administrative functions.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE supports an additional role: &ldquo;TOE Users&rdquo;, who may be configured with none, some, or all of the permissions of a &ldquo;Security Administrator&rdquo;.&nbsp; This enables administrators to delegate some or all of the tasks necessary to manage the TOE to roles with lesser permissions.&nbsp; Collectively, all user accounts with administrative permissions are &ldquo;administrators&rdquo;.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">&nbsp;</p>\r\n<h4 style=\"margin: 10pt 0in 6pt 45pt; text-indent: -45pt; text-align: justify; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(192, 0, 0);\"><span style=\"font-family: Arial, sans-serif;\">Protection of the TSF</span></h4>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TSF prevents the reading of all pre-shared keys, symmetric keys, private keys, and plaintext-passwords.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE provides reliable time stamps for itself.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE runs a suite of self-tests during initial start-up (on power on), and when cryptographic operations are performed to demonstrate the correct operation of the TSF.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE provides a means to verify firmware/software updates to the TOE using a digital signature mechanism prior to installing those updates.</p>\r\n<h4 style=\"margin: 10pt 0in 6pt 45pt; text-indent: -45pt; text-align: justify; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(192, 0, 0);\"><span style=\"font-family: Arial, sans-serif;\">TOE Access</span></h4>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE, for local interactive sessions, terminates the session after an Authorized Administrator-specified period of session inactivity.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE terminates a remote<strong> </strong>interactive session after an Authorized Administrator-configurable period of session inactivity.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE allows Administrator-initiated termination of the Administrator&rsquo;s own interactive session.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">Before establishing an administrative user<strong> </strong>session, the TOE displays a Security Administrator-specified advisory notice and consent warning message regarding use of the TOE.</p>\r\n<h4 style=\"margin: 10pt 0in 6pt 45pt; text-indent: -45pt; text-align: justify; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(192, 0, 0);\"><span style=\"font-family: Arial, sans-serif;\">Trusted Path/Channels</span></h4>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE is capable of using TLS to provide a trusted communication channel between itself and all authorized IT entities.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE permits the TSF, or the authorized IT entities to initiate communication via the trusted channel.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE is capable of using SSH or TLS/HTTPS to provide a communication path between itself and authorized remote Administrators.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE permits remote administrators to initiate communication via the trusted path.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE requires the use of the trusted path for initial administrator authentication and all remote administration actions.</p>","features":[{"id":1035,"feature_name":"Asymmetric Key Generation"},{"id":1029,"feature_name":"Auditing"},{"id":1040,"feature_name":"Certificate Validation"},{"id":1038,"feature_name":"Cryptograhic Hashing"},{"id":1036,"feature_name":"Cryptographic Key Establishment"},{"id":1037,"feature_name":"Cryptographic Signature Verification"},{"id":1034,"feature_name":"DRBG"},{"id":1028,"feature_name":"Flaw Remediation"},{"id":1031,"feature_name":"Key Destruction"},{"id":1039,"feature_name":"Keyed-hash message authentication"},{"id":1044,"feature_name":"SSH Client"},{"id":1032,"feature_name":"SSH Server"},{"id":1045,"feature_name":"TLS 1.2"},{"id":1046,"feature_name":"TLS 1.3"},{"id":1042,"feature_name":"TLS Client"},{"id":1043,"feature_name":"TLS Server without Mutual Authentication"}]}