NIAP: Compliant Product
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - Klas Fastnet Series Switches KlasOS 5.3

Certificate Date:  2021.08.18

Validation Report Number:  CCEVS-VR-VID11188-2021

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 2.2e

CC Testing Lab:  Acumen Security

Maintenance Release:
CC Certificate [PDF] Security Target [PDF] * Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]

* This is the Security Target (ST) associated with the latest Maintenance Release.  To view previous STs for this TOE, click here.

Product Description

The TOE is the Klas Fastnet Series Switches KlasOS 5.3. It runs the KlasOS firmware, which provides connectivity to multiple devices contained within the same network segment. A real-time clock is present on all KlasOS devices. Authentication can be performed locally or over a trusted channel using SSH. All logs can be securely transferred to a syslog server. KlasOS provides a Command Line Interface (CLI) for device configuration. The Klas Fastnet switches range of products provide expandable, enterprise-grade, rugged mobility solutions.


The TOE also supports secure connectivity with several other IT environment devices, including:



Usage/Purpose Description for TOE performance

Management Workstation/SSH Client


This includes any IT Environment Management workstation with a SSH client installed that is used by the TOE administrator to support TOE administration through SSH protected channel. Any SSH client that supports SSHv2 may be used.

Syslog server


The syslog audit server is used for remote storage of audit records that have been generated by and transmitted from the TOE.

Table 1: IT Environment Components

Evaluated Configuration

Security Evaluation Summary

The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Klas Fastnet Series Switches KlasOS 5.3 was evaluated are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 5.  The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 5. The product, when delivered configured as identified in the Klas FastNet Series Switches Common Criteria Configuration Guide, satisfies all of the security functional requirements stated in the Klas Fastnet Series Switches Security Target. The project underwent CCEVS Validator review.  The evaluation was completed in August 2021.  Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.

Environmental Strengths

The TOE implements the following security functional requirements:

·        Security Audit

·        Cryptographic Support

·        Identification and Authentication

·        Security Management

·        Protection of the TSF

·        TOE Access

·        Trusted Path/Channels


Each of these security functionalities are covered in more detail below.

1.1        Security Audit

The TOE generates audit events for all start-up and shutdown functions as well as all auditable events specified in the Security Target. Audit events are also generated for management actions specified in FAU_GEN.1. The TOE can store audit records locally and export them to an external syslog server using SSHv2. Each audit record contains the date and time of the event, type of event, subject identity, and other relevant data of the event. Only a Security Administrator can enable logging to a syslog server.

1.2        Cryptographic Operations

The operating system used is Klas OS v5.3.5. The TOE leverages OpenSSL 1.0.1u for cryptographic algorithms and OpenSSH 7.7p1 for SSH.

1.3        Identification and Authentication

All users must be authenticated by the TOE prior to carrying out any administrative actions. The TOE supports password-based and public-key based authentication. An administrator can set a minimum password length on the TOE which can be a minimum of 15 characters.

1.4        Security Management

The TOE supports local and remote management of its security functions including:

·        Local console CLI administration

·        Remote CLI administration via SSHv2

·        Configurable banner displayable at login

·        Timeouts to terminate administrative sessions after a set period of inactivity

·        Timed user lockout after multiple failed authentication attempts

·        Configurable authentication failure parameters

·        Re-enabling locked accounts

·        Configurable cryptographic parameters

The administrative user can perform all the above security related management functions.

1.5        Protection of the TSF

The TOE protects all passwords, pre-shared keys, symmetric keys, and private keys from unauthorized disclosure. Passwords are stored as SHA 512 hashes. The TOE executes self-tests during initial start-up to ensure correct operation and enforcement of its security functions. The TOE internally maintains the date and time. An administrator can install software updates to the TOE after they are verified using a digital signature mechanism.

1.6        TOE Access

The TOE displays a customizable banner before any administrative session can be established with it. The TOE will terminate local or remote interactive sessions after a specified period of session inactivity configured by an administrator.  An administrator can terminate their own interactive local or remote sessions.

1.7        Trusted Path/Channels

The TOE supports SSH for secure communications with authorized IT entities such as syslog servers. The TOE supports SSHv2 (remote CLI) for secure remote administration.

Vendor Information

Klas Telecom Inc.
Toby Stidham
Site Map              Contact Us              Home