{"product_id":11662,"v_id":11662,"product_name":"Cisco Embedded Services 9300 and 3300 Series Switches (ESS9300 & ESS3300) running IOS-XE 17.15","certification_status":"Certified","certification_date":"2026-04-11T00:00:00Z","tech_type":"Network Device,Network Encryption,Remote Access","vendor_id":{"name":"Cisco Systems, Inc.","website":"https://www.cisco.com"},"vendor_poc":"Petra Manche","vendor_phone":"408-526-4000","vendor_email":"certteam@cisco.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The TOE is comprised of both software and hardware. The hardware is comprised of an industry standard small form factor cards which provide a compact, module, and customizable solution. The hardware models included in the evaluation are: ESS-3300-NCP, ESS-3300-CON, ESS-3300-24T-NCP, ESS-3300-24T-CON and ESS-9300-10X-E. The software is comprised of the Cisco IOS-XE 17.15.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">The ESS9300 and ESS3300 models provide secure Layer 2 switching using Enterprise-grade Cisco IOS-XE switching security features to ensure highly secure data communication. The products feature a robust industrial design and support Power over Ethernet.</p>\r\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; font-family: Times, serif;\">Cisco IOS-XE is a Cisco-developed highly configurable proprietary operating system that provides for efficient and effective routing and switching.&nbsp; Although IOS-XE performs many networking functions, this TOE only addresses the functions that provide for the security of the TOE itself</p>","evaluation_configuration":"<p style=\"margin: 0in 0in 3pt; font-size: 10pt; font-family: Times, serif;\">Cisco Embedded Services 9300 and 3300 Series Switches (ESS9300 &amp; ESS3300) running IOS-XE 17.15 TOE includes the Cisco IOS-XE software image Release 17.15 and is composed of the following hardwa<span style=\"font-family: 'Times New Roman', serif;\">re:</span></p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 24px; font-size: 10pt; font-family: 'Times New Roman', serif;\">ESS-3300-NCP</li>\r\n<li style=\"margin: 0in 0in 0in 24px; font-size: 10pt; font-family: 'Times New Roman', serif;\">ESS-3300-CON</li>\r\n<li style=\"margin: 0in 0in 0in 24px; font-size: 10pt; font-family: 'Times New Roman', serif;\">ESS-3300-24T-NCP</li>\r\n<li style=\"margin: 0in 0in 0in 24px; font-size: 10pt; font-family: 'Times New Roman', serif;\">ESS-3300-24T-CON</li>\r\n<li style=\"margin: 0in 0in 6pt 24px; font-size: 10pt; font-family: 'Times New Roman', serif;\">ESS-9300-10X-E</li>\r\n</ul>\r\n<p style=\"margin: 0in 0in 3pt; font-size: 10pt; font-family: Times, serif;\">Deployment of the TOE in its evaluated configuration consists of at least one TOE switch model following the CC installation and configuration guidance document (AGD). The TOE consists of one or more physical devices and includes the Cisco IOS-XE software.&nbsp; The TOE has two or more network interfaces and is connected to at least one internal and one external network.&nbsp; The Cisco IOS-XE configuration determines how packets are handled to and from the TOE&rsquo;s network interfaces.&nbsp; The switch configuration will determine how traffic flows received on an interface will be handled. Typically, packet flows are passed through the internetworking device and forwarded to their configured destination.</p>","security_evaluation_summary":"<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.&nbsp; The evaluation demonstrated that the TOE<em> </em>meets the security requirements contained in the Security Target.&nbsp; The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.&nbsp; The product, when delivered and configured as identified in the Cisco Embedded Services 3300 and 9300 Series Switches (ESS3300 &amp; ESS9300) running IOS-XE 17.15 Common Criteria Configuration Guide, Version 0.2, February 2, 2026 document, satisfies all of the security functional requirements stated in the Cisco Embedded Services 9300 and 3300 Series Switches (ESS9300 &amp; ESS3300) running IOS-XE 17.15 Security Target, Version 1.0, March 13, 2026.&nbsp; The project underwent CCEVS Validator review.&nbsp; The evaluation was completed in March 2026.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11662-2026) prepared by CCEVS.</p>","environmental_strengths":"<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The logical boundaries of the Cisco Embedded Services 9300 and 3300 Series Switches (ESS9300 &amp; ESS3300) running IOS-XE 17.15 are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security audit:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">Auditing allows Security Administrators to discover intentional and unintentional issues with the TOE&rsquo;s configuration and/or operation.&nbsp; Auditing of administrative activities provides information that may be used to hasten corrective action should the system be configured incorrectly.&nbsp; Security audit data can also provide an indication of failure of critical portions of the TOE (e.g. a communication channel failure or anomalous activity (e.g. establishment of an administrative session at a suspicious time, repeated failures to establish sessions or authenticate to the TOE) of a suspicious nature.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE provides extensive capabilities to generate audit data targeted at detecting such activity.&nbsp; The TOE generates an audit record for each auditable event.&nbsp; Each security relevant audit event has the date, timestamp, event description, and subject identity.&nbsp; The TOE stores audit messages in a circular audit trail configurable by the Security Administrator.&nbsp; All audit logs are transmitted to an external audit server over a trusted channel protected with IPsec.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Cryptographic support:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE provides cryptographic functions to implement SSH, IPsec, and MACsec protocols.&nbsp; The cryptographic algorithm implementation has been validated for CAVP conformance.&nbsp; This includes key generation and random bit generation, key establishment methods, key destruction, and the various types of cryptographic operations to provide AES encryption/decryption, signature verification, hash generation, and keyed hash generation.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE provides cryptographic support for remote administrative management via SSHv2 and IPsec to secure the transmission of audit records to the remote syslog server. In addition, IPsec is used to secure the session between the TOE and the authentication servers. SSH and IPsec protocols are implemented using the IOS Common Cryptographic Module (IC2M) version Rel5a cryptographic modules.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE authenticates and encrypts packets between itself and a MACsec peer.&nbsp; The MACsec Key Agreement (MKA) Protocol provides the required session keys and manages the required encryption keys to protect data exchanged by the peers.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The ESS3300 supports MACsec using the Broadcom BCM54194 a fully integrated octal Gigabit transceiver with standard compliant IEEE 802.1AE 256bit MACsec functionality (Cert # AES 4544). The tested environment is AES ECB 128bit &amp; 256bit Encryption/Decryption Engine.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The ESS9300 supports MACsec using the proprietary Unified Access Data Plane (UADP) MSC version 1.1 (Cert. # AES 4848). The MACsec Controller (MSC) is embedded within the ASICs that are utilized within Cisco hardware platforms. The tested environment is&nbsp;Synopsys VCS v2011.12mx-SP1-3.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Identification and authentication:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE implements three types of authentications to provide a trusted means for Security Administrators and remote servers/endpoints to securely communicate:&nbsp; X.509v3 certificate-based authentication per RFC 5280 for IPSec connections to remote syslog or RADIUS AAA servers, password-based and public key based (SSH) authentication for Security Administrators, and pre-shared keys for MACsec endpoints.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">Security Administrators have the ability to compose strong passwords which are stored using a SHA-2 hash.&nbsp; Additionally, the TOE detects and tracks successive unsuccessful remote authentication attempts and provides an automatic lockout when a user attempts to authenticate and enters invalid information.&nbsp; After a defined number of authentication attempts exceeding the configured allowable attempts within a configured time interval, the user or administrators account is locked out until the configured amount of time has passed.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE provides authentication services for administrative users to connect to the TOE&rsquo;s secure CLI administrator interface.&nbsp; The TOE requires Authorized Administrators to authenticate prior to being granted access to any of the management functionality. The TOE provides administrator authentication against a local user database.&nbsp; The TOE supports the use of a RADIUS AAA server (part of the IT Environment) for authentication of administrative users attempting to connect to the TOE&rsquo;s CLI.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security management:</strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The TOE provides secure administrative services for management of general TOE configuration and the security functionality provided by the TOE.&nbsp; All TOE administration occurs either through a secure SSHv2 session or via a local console connection.&nbsp; The TOE provides the ability to securely:</p>\r\n<ul style=\"margin-bottom: 0in; margin-top: 0px;\">\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Administer of the TOE locally and remotely;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configure the access banner;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configure the session inactivity time before session termination or locking;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Update the TOE, and to verify the updates using [digital signature] capability prior to installing those updates;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configure the authentication failure parameters for FIA_AFL.1;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configure the number of failed administrator authentication attempts that will cause an account to be locked out;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configure audit behavior (e.g. changes to storage locations for audit; changes to behavior when local audit storage space is full);</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Manage the cryptographic keys;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configure the cryptographic functionality;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configure thresholds for SSH rekeying;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configure the lifetime for IPsec SAs;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Set the time which is used for time-stamps;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Configure the reference identifier for the peer;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Manage the TOE&rsquo;s trust store and designate X509.v3 certificates as trust anchors;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Import X509.v3 certificates to the TOE&rsquo;s trust store;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Manage the trusted public keys database;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Manage a PSK-based CAK and install it in the device;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Manage the Key Server to create, delete, and activate MKA participants [as specified in 802.1X, sections 9.13 and 9.16 (cf. MIB object ieee8021XkayMkaParticipantEntry) and section. 12.2 (cf. function createMKA())];</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Specify a lifetime of a CAK;</li>\r\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; font-family: 'Times New Roman', serif;\">Enable, disable, or delete a PSK-based CAK using CLI management commands.</li>\r\n</ul>\r\n<p style=\"margin: 0in 0in 0in 13.5pt; text-indent: -9pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE supports two separate administrator roles: non-privileged administrator and privileged administrator.&nbsp; Only the privileged administrator can perform the above security relevant management functions. Management of the TSF data is restricted to Security Administrators. The ability to enable, disable, determine and modify the behavior of all of the security functions of the TOE is restricted to authorized administrators.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Protection of the TSF:</strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The TOE protects critical security data including keys and passwords against tampering by untrusted subjects. The TOE prevents reading of cryptographic keys and passwords. The TOE provides reliable timestamps to support monitoring local and remote interactive administrative sessions for inactivity, validating X.509 certificates (to determine if a certificate has expired), and to support accurate audit records.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE provides self-tests to ensure it is operating correctly, including the ability to detect software integrity failures.&nbsp; Additionally, the TOE provides an ability to perform software updates and to verify those software updates are from Cisco Systems, Inc.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">Whenever a self-test failure occurs within the TOE, the TOE ceases operation (crashes). In the event of a crash appropriate information is displayed on the console screen and saved in the crashinfo file.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">Additionally, Cisco IOS-XE is not a general-purpose operating system and access to Cisco IOS-XE memory space is restricted to only Cisco IOS-XE functions.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>TOE access:</strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The TOE monitors both local and remote admin sessions for inactivity and terminates when a threshold time period is reached.&nbsp; Once a session has been terminated the TOE requires the user to re-authenticate.&nbsp; Sessions can also be terminated by an Authorized Administrator.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE also displays a Security Administrator specified advisory notice and consent warning message prior to initiating identification and authentication for each administrative user.</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Trusted path/channels:</strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The TOE provides encryption (protection from disclosure and detection of modification) for communication paths between itself and remote endpoints.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE allows trusted paths to be established to itself from remote administrators over SSHv2 and initiates outbound IPsec tunnels to transmit audit messages to remote syslog servers.&nbsp; In addition, IPsec is used to secure the session between the TOE and the authentication servers.&nbsp; The TOE also supports MACsec secured trusted channels between itself and MACsec peers.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">In addition, the TOE provides two-way authentication of each endpoint in a cryptographically secure manner, meaning that even if there was a malicious attacker between the two endpoints, any attempt to represent themselves to either endpoint of the communications path as the other communicating party would be detected.</p>","features":[]}