Cisco 5940 Series Embedded Services Router Security Target. Revision 1.0

Size: px
Start display at page:

Download "Cisco 5940 Series Embedded Services Router Security Target. Revision 1.0"

Transcription

1 Cisco 5940 Series Embedded Services Router Security Target Revision 1.0 May 2011

2 Table of Contents 1 SECURITY TARGET INTRODUCTION ST and TOE Reference Acronyms and Abbreviations TOE Overview TOE Product Type Supported non-toe Hardware/ Software/ Firmware TOE DESCRIPTION Physical Scope of the TOE Logical Scope of the TOE Identification and Authentication Secure Management Information Flow Control Intrusion Prevention Services Cryptography Secure Auditing TOE Evaluated Configuration Excluded Functionality Conformance Claims Common Criteria Conformance Claim Protection Profile Conformance Protection Profile Refinements Protection Profile Additions Protection Profile Conformance Claim Rationale TOE Appropriateness TOE Security Problem Definition Consistency Statement of Security Objectives Consistency Statement of Security Requirements Consistency SECURITY PROBLEM DEFINITION Assumptions Threats Organizational Security Policies SECURITY OBJECTIVES Security Objectives for the TOE Security Objectives for the Environment SECURITY REQUIREMENTS Conventions TOE Security Functional Requirements SFRs Drawn from pp_fw_tf_br_v Security audit (FAU) Cryptographic Support (FCS) User data protection (FDP) Identification and authentication (FIA) Security management (FMT) Protection of the TSF (FPT)

3 5.4 SFRs in addition to the SFRs found in pp_fw_tf_br_v Cryptographic Support (FCS) User data protection (FDP) Security management (FMT) Trusted Path/Channel (FTP) IDS Component Requirements (IDS) TOE SFR Dependencies Rationale for SFRs Found in pp_fw_tf_br_v TOE SFR Dependencies for SFRs in addition to the SFRs found in pp_fw_tf_br_v Security Assurance Requirements SAR Requirements Security Assurance Requirements Rationale Assurance Measures TOE Summary Specification TOE Security Functional Requirement Measures TOE Bypass and interference/logical tampering Protection Measures RATIONALE Rationale for TOE Security Objectives Rationale for the Security Objectives for the Environment Rationale for requirements/toe Objectives Annex A: References

4 List of Tables Table 1: ST and TOE Identification... 6 Table 2: Acronyms... 6 Table 3: IT Environment Components... 8 Table 4: TOE Provided Cryptography Table 5: Excluded Functionality Table 6: Protection Profiles Table 7: Protection Profile Refinements Table 8: Protection Profile Threat Additions Table 9: Protection Profile Security Objective Additions Table 10: Protection Profile Security Functional Requirement Additions and Refinements Table 11: TOE Assumptions Table 12: Threats Table 13: Security Objectives for the TOE Table 14: Security Objectives for the Environment Table 15: Security Functional Requirements Table 16: Security Functional Requirements Table 17: System Events Table 18: Dependency Rationale Table 19: Assurance Measures Table 20: Assurance Measures Table 21: How TOE SFRs Measures Table 22: Threat/Policies/Objectives Mappings Table 23: Threat/Policies/TOE Objectives Rationale Table 24: Threats/Environment Objectives Mappings Table 25: Assumptions/Threats/Objectives Rationale Table 26: Objective to Requirements Mappings Table 27: Objectives to Requirements Rationale Table 28: References

5 Prepared By: Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA DOCUMENT INTRODUCTION This document provides the basis for an evaluation of a specific Target of Evaluation (TOE), the Cisco 5940 Series Embedded Services Router. This Security Target (ST) defines a set of assumptions about the aspects of the environment, a list of threats that the product intends to counter, a set of security objectives, a set of security requirements, and the IT security functions provided by the TOE which meet the set of requirements. 5

6 1 SECURITY TARGET INTRODUCTION The Security Target contains the following sections: Security Target Introduction [Section 1] Conformance Claims [Section 2] Security Problem Definition [Section 3] Security Objectives [Section 4] IT Security Requirements [Section 5] TOE Summary Specification [Section 6] Rationale [Section 7] The structure and content of this ST comply with the requirements specified in the Common Criteria (CC), Part 1, Annex A, and Part 3, Chapter ST and TOE Reference This section provides information needed to identify and control this ST and its TOE. Table 1: ST and TOE Identification ST Title Cisco 5940 Series Embedded Services Router Security Target ST Version 1.0 Publication Date May 2011 Vendor and ST Author Cisco Systems, Inc. TOE Reference Cisco 5940 Series Embedded Services Router TOE Hardware Models conduction cooled processor module; air cooled processor module TOE Software Version IOS 15.1(2)GC1 ST Evaluation Status In Evaluation Keywords Switch, Data Protection, Authentication, Firewall, IDS 1.2 Acronyms and Abbreviations The following acronyms and abbreviations are used in this Security Target: Acronyms / Abbreviations AAA AES CC CEM CM cpci DHCP EAL HTTPS IPS ISR IT Table 2: Acronyms Definition Administration, Authorization, and Accounting Advanced Encryption Standard Common Criteria for Information Technology Security Evaluation Common Evaluation Methodology for Information Technology Security Configuration Management Compact Peripheral Component Interconnect Dynamic Host Configuration Protocol Evaluation Assurance Level Hyper-Text Transport Protocol Secure Intrusion Prevention System Integrated Service Router Information Technology 6

7 Acronyms / Abbreviations 7 Definition J2 A pin connection type for the backplanes of PCI cards. Not an acronym. JTAG Joint Test Action Group OS Operating System PCI Peripheral Component Interconnect PP Protection Profile pp_fw_tf_br_v1.1 U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments RJ-45 Registered Jack 45 SHS Secure Hash Standard SSH Secure Shell ST Security Target TCP Transport Control Protocol TOE Target of Evaluation TSC TSF Scope of Control TSF TOE Security Function TSP TOE Security Policy WAN Wide Area Network WIC WAN Interface Card 1.3 TOE Overview The Cisco 5940 Series Embedded Services Router TOE is a purpose-built, routing platform that includes firewall, Intrusion Prevention, and VPN functionality. The firewall functionality included within the TOE provides the functionality specified in the U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments. The TOE includes one router module that can operate in any CompactPCI (cpci) 3 unit (3U) chassis TOE Product Type The Cisco 5940 Series Embedded Services Router is a router platform that provides connectivity and security services onto a single, secure device. The flexible, compact form factor of these routers, complemented by Cisco IOS Software, provides highly secure data, voice, and video communications to stationary and mobile network nodes across wired links. In support of the routing capabilities, the Cisco 5940 Series Embedded Services Router provides IPSec connection capabilities for VPN enabled clients connecting through the Cisco 5940 Series Embedded Services Router. The Cisco 5940 Series Embedded Services Router is also compatible with the GET VPN (using GDOI). The Cisco 5940 Series Embedded Services Router also supports firewall capabilities consistent with the U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments. The Cisco 5940 Series Embedded Services Router is a 3U (cpci) router module solution for protecting the network. The firewall capabilities provided by the TOE are provided via a stateful packet filtering firewall. A stateful packet filtering firewall controls the flow of IP traffic by matching information contained in the headers of connection-oriented or connection-less IP packets against a set of rules

8 specified by the authorized administrator for firewalls. This header information includes source and destination host (IP) addresses, source and destination port numbers, and the transport service application protocol (TSAP) held within the data field of the IP packet. Depending upon the rule and the results of the match, the firewall either passes or drops the packet. The stateful firewall remembers the state of the connection from information gleaned from prior packets flowing on the connection and uses it to regulate current packets. The packet will be denied if the security policy is violated. In addition to IP header information, the TOE mediates information flows on the basis of other information, such as the direction (incoming or outgoing) of the packet on any given firewall network interface. For connection-oriented transport services, the firewall either permits connections and subsequent packets for the connection or denies the connection and subsequent packets associated with the connection. The TOE also includes on the 5940 Series Embedded Services Router modules a network-based Intrusion Prevention System that monitors traffic in real-time. It can analyze both the header and content of each packet. The TOE uses a rule-based expert system to interrogate the packet information to determine the type of attack, be it simple or complex Supported non-toe Hardware/ Software/ Firmware The TOE supports (in some cases optionally) the following hardware, software, and firmware in its environment: Table 3: IT Environment Components Component Required Usage/Purpose Description for TOE performance Router Chassis Yes The host chassis for the router provides the power to the module as well as directly connected Ethernet interfaces via a standard cpci backplane. The chassis selected can be any off the-shelf chassis that Rear Transition Module (RTM) Management Workstation with SSH Client Yes Yes supports 3U cpci cards. The RTM supports Input/Ouput connectors through standard RJ-45 connectors, or any other cpci compatible network connector. The RTM can be any off-the-shelf module that is a cpci form factor. It is installed in the chassis directly opposite the card with which it is to be used. This includes any IT Environment Management workstation with a SSH client installed that is used by the TOE administrator to support TOE administration through SSH protected channels. Any SSH client that supports SSH v2 may be used. AAA Server Yes This includes any IT environment AAA server that provides singleuse authentication mechanisms. This can be any AAA server that provides single-use authentication. The TOE correctly leverages the services provided by this AAA server to provide single-use authentication to administrators. VPN Peer No This includes any peer with which the TOE participates in VPN communications. VPN peers may be any device or software client that supports IPSec v3 communications. Both VPN clients and VPN gateways are considered VPN peers by the TOE. NTP Server No The TOE supports communications with an NTP server. A solution 8

9 Component Required Usage/Purpose Description for TOE performance must be used that supports MD5 hashing of communications with up to a 32 character key. Syslog Server Yes A syslog server with the capability to support TCP syslog communications over an IPSec tunnel is required for use with the Certificate Authority (CA) No 1.4 TOE DESCRIPTION TOE. This includes any IT Environment Certificate Authority on the TOE network. This can be used to provide the TOE with a valid certificate during certificate enrollment for IKE authentication. This section provides an overview of the Cisco 5940 Series Embedded Services Router Target of Evaluation (TOE). The TOE is comprised of a single cpci router module running IOS 15.1(2)GC Physical Scope of the TOE The TOE is a hardware solution obtained from General Dynamics under OEM contract running the IOS 15.1(2)GC1 software solution. The image name for the 5940 Series Embedded Services Router TOE is c59xx-adventerprisek9-mz.spa. The key components on the board are: Freescale MPC8548E processor Marvell 88E1145 quad Ethernet transceiver Spansion S29GL01GP flash or Numonyx flash chip Both an air-cooled and a conduction-cooled board exist. Aside from the differences outlined below, they differ only in cooling mechanism. The board provides the following external interfaces: Serial port. o Via a connection on the J2 connector on the cpci backplane on the conduction-cooled model and via direct access RJ-45 port or the J2 connector on the cpci backplane on the card on the air-cooled model. Four Gigabit Ethernet ports, via connections on the J2 connector on the cpci backplane. PCI interface connection to the backplane. This PCI interface is used to connect to the RTM PCI bus connection to the backplane. This PCI controller is disabled within the IOS running on the TOE. JTAG header. The JTAG will be connected to the J2 connector on the cpci backplane. It is to be disabled in the evaluated configuration and not re-enabled. 1.6 Logical Scope of the TOE The TOE is comprised of several security features. Each of the security features identified above consists of several security functionalities, as identified below. 9

10 1. Identification and Authentication 2. Secure Management 3. VPN and/or Firewall Information Flow Control 4. Intrusion Prevention Services 5. Cryptography 6. Secure Auditing These features are described in more detail in the subsections below Identification and Authentication The TOE performs two types of authentication: device-level authentication of the remote device (VPN peers) and user authentication for the administrators of the TOE. Devicelevel authentication allows the TOE to establish a secure channel with a trusted peer. The secure channel is established only after each device authenticates itself. Device-level authentication is performed via IKE v1/ipsec v3 mutual authentication. The TOE provides authentication services for all administrators wishing to connect to the TOEs secure CLI administrative interface. The TOE requires all administrators to authenticate prior to being granted access to any of the management functionality. The TOE facilitates single-use authentication for all administrators and external IT entities attempting to connect to the TOE by invoking an external RADIUS AAA (IT environment) to provide single-use authentication. The TOE provides single use authentication to external IT entities through the use of IKE/IPSec mutual authentication Secure Management The TOE provides secure administrative services for management of general TOE configuration and the security functionality provided by the TOE. All TOE administration occurs either through a secure SSH session, via terminal server (such as a Cisco 2811), or via a local console connection. The TOE provides the ability to securely manage all TOE administrators; all identification and authentication; all audit functionality of the TOE; all TOE cryptographic functionality; the timestamps maintained by the TOE (including settings for an NTP server, if used as the timestamp source); TOE configuration backup and recovery, and the information flow control policies enforced by the TOE. The TOE supports two separate administrative roles that make up the authorized administrator: non-privileged Administrator and privileged Administrator. The TOE also supports external IT entities. These external IT entities are peer routers that pass network control information (e.g., routing tables) to the TOE. Also included are any other VPN peers with which the TOE exchanges information, including VPN clients and VPN gateways. Once a configured threshold of consecutive authentication failures is reached, the TOE locks-out the administrator (either privileged or non-privileged) or external IT entity attempting to log into the TOE until another administrator unlocks their account. No 10

11 administrator can unlock their own account, therefore there should always be at least two privileged administrators configured on the device Information Flow Control Firewall Information Flow Control The Cisco 5940 Series Embedded Services Router mediate information flows through the TOE for unauthenticated information flows. The Information Control functionality of the TOE allows privileged administrators to set up rules between interfaces of the TOE. These rules control whether a packet is transferred from one interface to another and/or transferred encrypted based upon: 1. Presumed address of source subject 2. Presumed address of destination subject 3. Service used 4. Transport layer protocol 5. Network interface on which the connection request occurs and is to depart Packets will be dropped unless a specific rule or policy in an access control list (ACL) has been set up to allow the packet to pass. The order of Access Control Entries (ACEs) in an ACL is important. When the TOE decides whether to forward or drop a packet, the TOE tests the packet against the ACE in the order in which the entries are listed. After a match is found, no more ACEs are checked such that if the ACE at the beginning of the ACL explicitly permits all traffic, no further ACEs are checked. Interface ACLs are applied first before IPsec negotiations occur in the evaluated configuration. The TOE ensures that all information flows from the TOE do not contain residual information from previous traffic. Packets are padded with zeroes. Residual data is never transmitted from the TOE VPN Information Flow Control Cisco 5940 Series Embedded Services Router delivers VPN connections to remote entities. The VPN process includes remote device authentication, negotiation of specific cryptographic parameters for the session, and providing a secure connection to and from the remote device. For inbound or outbound connections with external IT entities that are capable of supporting VPN (e.g., a VPN Peer), the TOE will establish a secure connection. For other inbound or outbound traffic a secure connection will not be established VLAN Information Flow Control Cisco 5940 Series Embedded Services Router allows VLAN connections to/from remote entities. The TOE provides the ability to identify the VLAN the network traffic is associated with. The TOE then permits or denies the network traffic based on the VLANs 11

12 configured on the interface the network traffic is received /destined. This policy is applied after the Firewall policy Intrusion Prevention Services The Cisco 5940 Series Embedded Services Router IOS software Intrusion Prevention System (IPS) operates as an in-line intrusion detection sensor, watching packets and sessions as they flow through the router and scanning each packet to match any of the Cisco IOS IPS signatures. When Cisco IOS IPS detects suspicious activity, it responds before network security can be compromised and logs the event through Cisco IOS syslog messages stored in the local buffer and then offloaded to an external syslog server. The privileged administrator can configure Cisco IOS IPS to choose the appropriate response to various threats. When packets in a session match a signature, Cisco IOS IPS can take any of the following actions, as appropriate: Send an audit record to a syslog server or a management interface Drop the packet Reset the connection Deny traffic from the source IP address of the attacker for a specified amount of time Deny traffic on the connection for which the signature was seen for a specified amount of time For inbound packets the IDS processing is done after firewall policies and then VPN policies have been applied Cryptography The TOE provides cryptography in support of other Cisco 5940 Series Embedded Services Router security functionality. This cryptography has been validated for conformance to the requirements of FIPS Level 1. Further details regarding the FIPS validation can be found in Certificate #1639. The TOE provides cryptography in support of VPN connections and remote administrative management via SSH. The cryptographic services provided by the TOE include Cryptographic Method Internet Key Exchange ANSI 9.31 PRNG AES Group Domain of Interpretation RSA DSA SHA256 Table 4: TOE Provided Cryptography Use within the TOE Used to establish initial IPSec session. Used in IPSec session establishment. Used to encrypt IPSec session traffic. Used to encrypt SSH session traffic. Used in IPSec session establishment. IKE RSA authentication SSH host authentication, SSH client authentication IKE 12

13 1.6.6 Secure Auditing The Cisco 5940 Series Embedded Services Router provides extensive auditing capabilities. The TOE can audit events related to cryptographic functionality, information flow control enforcement, intrusion prevention, identification and authentication, and administrative actions. The Cisco 5940 Series Embedded Services Router generates an audit record for each auditable event. These events include a timestamp that can be provided by the TOE or an optional NTP server in the operational environment. The Cisco 5940 Series Embedded Services Router provides the privileged administrator with a sorting and searching capability to improve audit analysis. The privileged administrator configures auditable events, backs-up and manages audit data storage. The TOE provides the privileged administrator with a local circular audit trail, also referred to as the Event Store,and allows for configuration of offload of audit data via TCP syslog to a syslog server in the operational environment so that audit events are not lost when the Event Store reaches capacity and begins to overwrite old events. 1.7 TOE Evaluated Configuration The following figure provides a visual depiction of an example TOE deployment. The TOE boundary is surrounded with a dashed red line. The previous figure includes the following: The 5940 TOE Model (both the conduction-cooled and air-cooled models are pictured.) 13

14 IT Environment: Chassis and RTM IT Environment: (2) VPN Peers IT Environment: Management Workstation IT Environment: AAA Server IT Environment: NTP Server IT Environment: Syslog Server Excluded Functionality The following functional is excluded from the evaluation. Excluded Functionality Non-FIPS mode of operation on the router. Telnet for management purposes. Table 5: Excluded Functionality Exclusion Rationale This mode of operation includes non-fips allowed operations. Telnet passes authentication credentials in clear text. SSHv2 is to be used instead. The exclusion of this functionality does not affect compliance to the U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments. 14

15 2 CONFORMANCE CLAIMS 2.1 Common Criteria Conformance Claim The TOE and ST are compliant with the Common Criteria (CC) Version 3.1, Revision 3, dated: July The TOE and ST are EAL2 Augmented with ALC_FLR.2 Part 3 conformant. The TOE and ST are CC Part 2 extended. 2.2 Protection Profile Conformance This ST claims compliance to the following Common Criteria validated Protection Profiles: Table 6: Protection Profiles Protection Profile Version Date U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments (pp_fw_tf_br_v1.1) Protection Profile Refinements July 25, 2007 The following table identifies the refinements made to the Protection Profile and provides rationale for the refinement: FAU_GEN.1 FAU_SAR.1 FMT_SMR.1 FIA_ATD.1 FMT_MSA.3(1) FMT_MOF.1 Refinement Table 7: Protection Profile Refinements Rationale Refined to refer to the correct table number and to add an additional event to the audit table. Refined to clarify that privileged administrators are affected. Refined to also address External IT entities and to clarify that both privileged and non-privileged administrators are included. Refined to also address External IT entities Refined to specify the privileged administrator. Refined to specify the privileged administrator and what a nonprivileged administrator is able to access. The names of all of the Objectives on the Environment were changed from O. to OE. in this ST Protection Profile Additions The following threats were added to the TOE: T.UNAUTHORIZED_PEER T.EAVESDROP T.VPNMEDIAT T.VLAN T.NOHALT T.FALACT T.FALREC

16 T.FALASC T.MISUSE T.INADVE T.MISACT T.INTEGRITY The following objectives were added to the TOE: O.CRYPTOGRAPHIC_ FUNCTIONS O.PEER_AUTHENTICATION O.INTEGRITY O.VPNMEDIAT O.VLAN O.IDSENS O.IDANLZ O.RESPON The following requirements were added to the set of SFRs on the TOE: FCS_CKM.4 FCS_COP_(ET).1 FCS_GDOI_(ET).1 FCS_IKE_(ET).1 FDP_IFC.1(2) FDP_IFF.1(2) FDP_IFC.1(3) FDP_IFF.1(3) FMT_MSA.3(2) FMT_MSA.3(3) FMT_SMF.1 FTP_ITC.1 FTP_TRP.1 IDS_SDC_(ET).1 IDS_ANL_(ET).1 IDS_RCT_(ET).1 IDS_RDR_(ET).1 IDS_STG_(ET).1 IDS_STG_(ET) Protection Profile Conformance Claim Rationale TOE Appropriateness The TOE provides all of the Traffic Filter Firewall functionality at a level of security commensurate with that identified in the U.S. Government Protection Profile: U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments (pp_fw_tf_br_v1.1) 16

17 2.3.2 TOE Security Problem Definition Consistency The Assumptions, Threats, and Organization Security Policies included in the Security Target represent the Assumptions, Threats, and Organization Security Policies specified in the U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments for which conformance is claimed verbatim. Several additional Threats are also included. All concepts covered in the Protection Profile Security Problem Definition are included in the Security Target. None of the additional Threats contradicts the functionality specified in the Protection Profile. The additional Threats augment the firewall functionality specified in the Protection Profiles and discuss additional TOE functionality that is not addressed in the Protection Profile. The following table identifies each additional Threat included in the ST and provides rationale for its inclusion in the Security Target with regards to the claims Protection Profiles. Threat/OSP T.UNAUTHORIZED_PEER T.EAVESDROP T.VPNMEDIAT T.VLAN T.NOHALT T.FALACT T.FALREC T.FALASC T.MISUSE Table 8: Protection Profile Threat Additions Rationale This threat is associated with VPN functionality. The PP addresses firewall functionality and not VPN functionality. This VPN functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This threat is associated with VPN functionality. The PP addresses firewall functionality and not VPN functionality. This VPN functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This threat is associated with VPN functionality. The PP addresses firewall functionality and not VPN functionality. This VPN functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This threat is associated with VLAN functionality. The PP addresses firewall functionality and not VLAN functionality. This VLAN functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This threat is associated with IDS functionality. The PP addresses firewall functionality and not IDS functionality. This IDS functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This threat is associated with IDS functionality. The PP addresses firewall functionality and not IDS functionality. This IDS functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This threat is associated with IDS functionality. The PP addresses firewall functionality and not IDS functionality. This IDS functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This threat is associated with IDS functionality. The PP addresses firewall functionality and not IDS functionality. This IDS functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This threat is associated with IDS functionality. The PP addresses firewall functionality and not IDS functionality. This IDS functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. 17

18 T.INADVE T.MISACT T.INTEGRITY Threat/OSP Rationale This threat is associated with IDS functionality. The PP addresses firewall functionality and not IDS functionality. This IDS functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This threat is associated with IDS functionality. The PP addresses firewall functionality and not IDS functionality. This IDS functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This threat is associated with VPN functionality. The PP addresses firewall functionality and not VPN functionality. This VPN functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed Statement of Security Objectives Consistency The Security Objectives included in the Security Target represent the Security Objectives specified in the U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments for which conformance is claimed verbatim. Several additional Security Objectives are also included. All concepts covered in the Protection Profile s Statement of Security Objectives are included in the Security Target. None of the additional Security Objectives contradicts the functionality specified in the Protection Profile. The additional Security Objectives augment the firewall functionality specified in the Protection Profiles and discuss additional TOE functionality that is not addressed in the Protection Profile. The following table identifies each additional Security Objective included in the ST and provides rationale for its inclusion in the Security Target with regards to the claims Protection Profiles. Security Objective O.CRYPTOGRAPHIC_ FUNCTIONS O.PEER_AUTHENTICATION O.INTEGRITY O.VPNMEDIAT O.VLAN Table 9: Protection Profile Security Objective Additions Rationale This Security Objective augments the cryptographic functionality discussed in the PP for which conformance is claimed. This policy does not introduce any functionality that is inconsistent with the cryptography specified in the PP for which conformance is claimed. This Security Objective is associated with VPN functionality. The PP addresses firewall functionality and not VPN functionality. This VPN functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This Security Objective is associated with VPN functionality. The PP addresses firewall functionality and not VPN functionality. This VPN functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This Security Objective is associated with VPN functionality. The PP addresses firewall functionality and not VPN functionality. This VPN functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This Security Objective is associated with VLAN functionality. The PP addresses firewall functionality and not VLAN functionality. This VLAN functionality provided to counter this threat does not contradict 18

19 O.IDSENS O.IDANLZ O.RESPON Security Objective Rationale any of the functionality required by the PP for which conformance is claimed. This Security Objective is associated with IPS functionality. The PP addresses firewall functionality and not IPS functionality. This IPS functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This Security Objective is associated with IPS functionality. The PP addresses firewall functionality and not IPS functionality. This IPS functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed. This Security Objective is associated with IPS functionality. The PP addresses firewall functionality and not IPS functionality. This IPS functionality provided to counter this threat does not contradict any of the functionality required by the PP for which conformance is claimed Statement of Security Requirements Consistency The Security Functional Requirements included in the Security Target represent the Security Functional Requirements specified in the U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments for which conformance is claimed verbatim. Several additional Security Functional Requirements are also included. All concepts covered the Protection Profile s Statement of Security Requirements are included in the Security Target. Additionally, the Security Assurance Requirements included in the Security Target are identical to the Security Assurance Requirements included in each of the Protection Profiles. None of the additional Security Functional Requirements contradicts the functionality specified in the Protection Profile. The additional Security Functional Requirements augment the firewall functionality specified in the Protection Profiles and discuss additional TOE functionality that is not addressed in the Protection Profile. The following table identifies each additional Security Functional Requirement included in the ST and provides rationale for its inclusion in the Security Target with regards to the claims Protection Profiles. FAU_GEN.1 FAU_SAR.1 FMT_SMR.1 FIA_ATD.1 Table 10: Protection Profile Security Functional Requirement Additions and Refinements SFR FMT_MSA.3(1) 19 Rationale This SFR was refined to add an additional event type to be audited and to refer to the correct table within the requirement wording. This does not contradict any claims in the PP or weaken the claimed security functionality. This SFR was refined to clarify that this instance of authorized administrators applies to privileged administrators. This does not contradict any claims in the PP or weaken the claimed security functionality. This SFR was refined to add a role used elsewhere in the PP SFRS: external IT entities. This does not contradict any claims in the PP or weaken the claimed security functionality. This SFR was refined to add the authentication attributes for external IT entities. This does not contradict any claims in the PP or weaken the claimed security functionality. This SFR was refined to clarify that this instance of authorized administrators applies to only privileged administrators. This does not

20 SFR FMT_MOF.1 FCS_CKM.4 FCS_COP_(ET).1 FCS_GDOI_(ET).1 FCS_IKE_(ET).1 FDP_IFC.1(2) FDP_IFF.1(2) FDP_IFC.1(3) FDP_IFF.1(3) FMT_MSA.3(2) FMT_SMF.1 FTP_ITC.1 FTP_TRP.1 IDS_SDC_(ET).1 Rationale contradict any claims in the PP or weaken the claimed security functionality. This SFR was refined to clarify that this instance of authorized administrators applies to privileged administrators. This does not contradict any claims in the PP or weaken the claimed security functionality. This SFR discusses the cryptographic key destruction. This functionality is not discussed in the Protection Profile for which conformance is claimed. Cryptographic key destruction does not contradict any of the cryptographic functionality included in the PP. This SFR discusses random number generation. This functionality is not discussed in the Protection Profile for which conformance is claimed. Random number generation does not contradict any of the cryptographic functionality included in the PP. This SFR discusses Group Domain of Interpretation. This functionality is not discussed in the Protection Profile for which conformance is claimed. Group Domain of Interpretation does not contradict any of the cryptographic functionality included in the PP. This SFR discusses IKE Key establishment. This functionality is not discussed in the Protection Profile for which conformance is claimed. IKE Key Establishment does not contradict any of the cryptographic functionality included in the PP. This SFR discusses VPN functionality. This functionality is not discussed in the Protection Profile for which conformance is claimed. VPN functionality does not contradict any of the information flow control included in the PP. This SFR discusses VPN functionality. This functionality is not discussed in the Protection Profile for which conformance is claimed. VPN functionality does not contradict any of the information flow control included in the PP. This SFR discusses VLAN functionality. This functionality is not discussed in the Protection Profile for which conformance is claimed. VLAN functionality does not contradict any of the information flow control included in the PP. This SFR discusses VLAN functionality. This functionality is not discussed in the Protection Profile for which conformance is claimed. VLAN functionality does not contradict any of the information flow control included in the PP. This SFR discusses the required security attribute management associated with VPN controls. The PP for which conformance is claimed does not address VPN information flow. Therefore it does not address the management of the security attributes associated with VPNs. This management functionality does not contradict any of the functionality described in the PP for which conformance is claimed. This SFR discusses the overall security functions associated with secure management of the TOE. While the PP does not include this SFR, the CCTL requested its inclusion for consistency with other Security Target. This SFR discusses protected communications between a remote syslog and the TOE. This SFR complements the cryptographic requirements already included in the SFR for management communications with the TOE. This SFR does not introduce any functionality that is conflicting with the functionality required by the PP for which conformance is claimed. This SFR discusses trusted paths between a remote workstation and the TOE. This SFR complements the cryptographic requirements already included in the SFR for management communications with the TOE. This SFR does not introduce any functionality that is conflicting with the functionality required by the PP for which conformance is claimed. This SFR discusses IDS functionality on the TOE. This SFR does not introduce any functionality that is conflicting with the functionality required by the PP for which conformance is claimed. 20

21 SFR IDS_ANL_(ET).1 IDS_RCT_(ET).1 IDS_RDR_(ET).1 IDS_STG_(ET).1 IDS_STG_(ET).2 Rationale This SFR discusses IDS functionality on the TOE. This SFR does not introduce any functionality that is conflicting with the functionality required by the PP for which conformance is claimed. This SFR discusses IDS functionality on the TOE. This SFR does not introduce any functionality that is conflicting with the functionality required by the PP for which conformance is claimed. This SFR discusses IDS functionality on the TOE. This SFR does not introduce any functionality that is conflicting with the functionality required by the PP for which conformance is claimed. This SFR discusses IDS functionality on the TOE. This SFR does not introduce any functionality that is conflicting with the functionality required by the PP for which conformance is claimed. This SFR discusses IDS functionality on the TOE. This SFR does not introduce any functionality that is conflicting with the functionality required by the PP for which conformance is claimed. 21

22 3 SECURITY PROBLEM DEFINITION This chapter identifies the following: Significant assumptions about the TOE s operational environment IT related threats to the organization countered by the TOE Environmental threats requiring controls to provide sufficient protection Organizational security policies for the TOE as appropriate. This document identifies assumptions as A.assumption with assumption specifying a unique name. Threats are identified as T.threat with threat specifying a unique name. 3.1 Assumptions The specific conditions listed in the following subsections are assumed to exist in the TOE s environment. These assumptions include both practical realities in the development of the TOE security requirements and the essential environmental conditions on the use of the TOE. Assumption Table 11: TOE Assumptions Assumption Definition Reproduced from the U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments A.PHYSEC The TOE is physically secure. A.LOWEP The threat of malicious attacks aimed at discovering exploitable vulnerabilities is considered low. A.GENPUR There are no general-purpose computing capabilities (e.g., the ability to execute arbitrary code or applications) and storage repository capabilities on the TOE. A.PUBLIC The TOE does not host public data. A.NOEVIL Authorized administrators are non-hostile and follow all administrator guidance; however, they are capable of error. A.SINGEN Information can not flow among the internal and external networks unless it passes through the TOE. A.DIRECT Human users within the physically secure boundary protecting the TOE may attempt to access the TOE from some direct connection (e.g., a console port) if the connection is part of the TOE. A.NOREMO Human users who are not authorized administrators can not access the TOE remotely from the internal or external networks. A.REMACC Authorized administrators may access the TOE remotely from the internal and external networks. 3.2 Threats The following table lists the threats addressed by the TOE and the IT Environment. The assumed level of expertise of the attacker for all the threats identified below is unsophisticated. Threat Threats addressed by the TOE Table 12: Threats 22 Threat Definition

23 Threat Threat Definition Reproduced from the U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments T.NOAUTH An unauthorized person may attempt to bypass the security of the TOE so as to access and use security functions and/or non-security functions provided by the TOE. T.REPEAT An unauthorized person may repeatedly try to guess authentication data in order to use this information to launch attacks on the TOE. T.REPLAY An unauthorized person may use valid identification and authentication data obtained to access functions provided by the TOE. T.ASPOOF An unauthorized person may carry out spoofing in which information flow through the TOE into a connected network by using a spoofed source address. T.MEDIAT An unauthorized person may send impermissible information through the TOE which results in the exploitation of resources on the internal network. T.OLDINF Because of a flaw in the TOE functioning, an unauthorized person may gather residual information from a previous information flow or internal TOE data by monitoring the padding of the information flows from the TOE. T.PROCOM An unauthorized person or unauthorized external IT entity may be able to view, modify, and/or delete security related information that is sent between a remotely located authorized administrator and the TOE T.AUDACC Persons may not be accountable for the actions that they conduct because the audit records are not reviewed, thus allowing an attacker to escape detection. T.SELPRO An unauthorized person may read, modify, or destroy security critical TOE configuration data. T.AUDFUL An unauthorized person may cause audit records to be lost or prevent future records from being recorded by taking actions to exhaust audit storage capacity, thus masking an attackers actions. In addition to what is included in the U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments T.UNAUTHORIZED_PEER An unauthorized IT entity may attempt to establish a security association with the TOE. T.EAVESDROP A malicious user or process may observe or modify user or TSF data transmitted to and from the TOE. T.VPNMEDIAT An unauthorized person may send or receive unauthorized IPSec traffic through the TOE which results in the exploitation of resources on the internal network. T.VLAN An attacker may force a packet destined for one VLAN to cross into another VLAN for which it is not authorized compromising the confidentiality and integrity of information. T.NOHALT An unauthorized user may attempt to compromise the continuity of the System's collection and analysis functions by halting execution of the TOE. T.FALACT The TOE may fail to react to identified or suspected vulnerabilities or inappropriate activity. T.FALREC The TOE may fail to recognize vulnerabilities or inappropriate activity based on IDS data received from each data source. T.FALASC The TOE may fail to identify vulnerabilities or inappropriate activity based on association of IDS data received from all data sources. T.MISUSE Unauthorized accesses and activity indicative of misuse may occur on an IT System the TOE monitors. T.INADVE Inadvertent activity and access may occur on an IT System the TOE monitors. T.MISACT Malicious activity, such as introductions of Trojan horses and viruses, may occur on an IT System the TOE monitors. T.INTEGRITY An attacker may compromise the integrity of IPSec traffic sent to/from the TOE. Threats addressed by the environment 23

24 Threat Threat Definition Reproduced from the U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments T.TUSAGE The TOE may be inadvertently configured, used and administered in an insecure manner by either authorized or unauthorized persons. 3.3 Organizational Security Policies An organizational security policy is a set of rules, practices, and procedures imposed by an organization to address its security needs. This ST contains no claims for organizational security policies. 24

25 4 SECURITY OBJECTIVES This Chapter identifies the security objectives of the TOE and the IT Environment. The security objectives identify the responsibilities of the TOE and the TOE s IT environment in meeting the security needs. This document identifies objectives of the TOE as O.objective with objective specifying a unique name. Objectives that apply to the IT environment are designated as OE.objective with objective specifying a unique name. 4.1 Security Objectives for the TOE The following table, Security Objectives for the TOE, identifies the security objectives of the TOE. These security objectives reflect the stated intent to counter identified threats and/or comply with any security policies identified. An explanation of the relationship between the objectives and the threats/policies is provided in the rationale section of this document. TOE Objective Table 13: Security Objectives for the TOE TOE Security Objective Definition Reproduced from the U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments O.IDAUTH The TOE must uniquely identify and authenticate the claimed identity of all users, before granting a user access to TOE functions. O.SINUSE The TOE must prevent the reuse of authentication data for users attempting to authenticate at the TOE from a connected network. O.MEDIAT The TOE must mediate the flow of all information from users on a connected network to users on another connected network, and must ensure that residual information from a previous information flow is not transmitted in any way. O.SECSTA Upon initial start-up of the TOE or recovery from an interruption in TOE service, the TOE must not compromise its resources or those of any connected network. O.ENCRYP The TOE must protect the confidentiality of its dialogue with an authorized administrator through encryption, if the TOE allows administration to occur remotely from a connected network. O.SELPRO The TOE must protect itself against attempts by unauthorized users to bypass, deactivate, or tamper with TOE security functions. O.AUDREC The TOE must provide a means to record a readable audit trail of securityrelated events, with accurate dates and times, and a means to search and sort the audit trail based on relevant attributes. O.ACCOUN The TOE must provide user accountability for information flows through the TOE and for authorized administrator use of security functions related to audit. O.SECFUN The TOE must provide functionality that enables an authorized administrator to use the TOE security functions, and must ensure that only authorized administrators are able to access such functionality. O.LIMET The TOE must provide the means for an authorized administrator to control and limit access to TOE security functions by an authorized external IT entity. In addition to what is included in the U.S. Government Protection Profile for Traffic Filter Firewall in Basic Robustness Environments O.CRYPTOGRAPHIC_ The TOE shall provide cryptographic functions to provide confidentiality for FUNCTIONS TSF data that is transmitted to and from the TOE. 25

Security Target for Symantec Gateway Security Version Series (Firewall Engine Only)

Security Target for Symantec Gateway Security Version Series (Firewall Engine Only) . Security Target for Symantec Gateway Security Version 2.0 5400 Series (Firewall Engine Only) Reference: T423\ST April 2004 Issue: 3.3 Symantec Corporation 266 Second Avenue Waltham, MA 02451 USA Copyright

More information

Security Target for Symantec Gateway Security 400 Series version 2.1 (Firewall Engine Only)

Security Target for Symantec Gateway Security 400 Series version 2.1 (Firewall Engine Only) Security Target for Symantec Gateway Security 400 Series version 2.1 (Firewall Engine Only) Reference: T466\ST May 2005 Issue: 2.0 Symantec Corporation 275 Second Avenue Waltham, MA 02451 USA Copyright

More information

Cisco 5915 Embedded Services Router Security Target. Revision 1.0

Cisco 5915 Embedded Services Router Security Target. Revision 1.0 Cisco 5915 Embedded Services Router Security Target Revision 1.0 10 January 2013 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms and Abbreviations... 6

More information

Security Target. Juniper Networks vgw Series Version 5.5. Document Version 0.5. March 22, 2013

Security Target. Juniper Networks vgw Series Version 5.5. Document Version 0.5. March 22, 2013 Security Target Juniper Networks vgw Series Version 5.5 Document Version 0.5 March 22, 2013 Document Version 0.5 Juniper Networks Page 1 of 42 Prepared For: Prepared By: Juniper Networks, Inc. 1194 North

More information

McAfee Web Gateway Version EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.4.2.5 EAL 2 + ALC_FLR.2 Release Date: 19 November 2014 Version: 1.4 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document

More information

Security Target for Symantec Enterprise Firewall Version 7.0 For Windows NT

Security Target for Symantec Enterprise Firewall Version 7.0 For Windows NT . Security Target for Symantec Enterprise Firewall Version 7.0 For Windows NT Reference: T349\ST Version: 2.0 Europe: USA: Symantec (UK) Ltd Symantec Corporation Apex House 266 Second Avenue 4A-10 West

More information

Security Target for Symantec Enterprise Firewall Version 8.0

Security Target for Symantec Enterprise Firewall Version 8.0 . Security Target for Symantec Enterprise Firewall Version 8.0 Reference: T462\ST July 2004 Issue: 1.0 Symantec Corporation 266 Second Avenue Waltham, MA 02451 USA Copyright notice Copyright 1998-2004

More information

Juniper Networks JUNOS-FIPS 10.4R4 for SRX Series

Juniper Networks JUNOS-FIPS 10.4R4 for SRX Series Security Target Juniper Networks JUNOS-FIPS 10.4R4 for SRX Series Document Version 1.5 Rev A December 22, 2011 Document Version 1.5 2011 Juniper Networks Page 1 of 81 Prepared For: Prepared By: Juniper

More information

Security Target for the Fortinet FortiGate B Unified Threat Management Solution and FortiOS 4.0 CC Compliant Firmware: EAL2+

Security Target for the Fortinet FortiGate B Unified Threat Management Solution and FortiOS 4.0 CC Compliant Firmware: EAL2+ Security Target for the Fortinet FortiGate - 1240B Unified Threat Management Solution and FortiOS 4.0 CC Compliant Firmware: EAL2+ EWA Document No. 1701-001-D002 Fortinet Document No. ST0006 Version 1.2,

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of Firewall Enterprise v8.2.0 and Firewall Enterprise Control Center v5.2.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common

More information

Certification Report

Certification Report Certification Report Curtiss-Wright Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications

More information

Sidewinder G2 Security Appliance Model 2150D and Sidewinder G2 Software v SECURITY TARGET

Sidewinder G2 Security Appliance Model 2150D and Sidewinder G2 Software v SECURITY TARGET Part Number 00-0946372-D Version Date 29 March 2007 Sidewinder G2 Security Appliance Model 2150D and Sidewinder G2 Software v 6.1.2 SECURITY TARGET Prepared by: Secure Computing Corporation 2340 Energy

More information

Symantec Data Loss Prevention 14.5

Symantec Data Loss Prevention 14.5 Symantec Data Loss Prevention 14.5 Evaluation Assurance Level (EAL): EAL2+ Doc No: 1943-000-D102 Version: 1.2 15 November 2016 Symantec Corporation 303 2 nd Street 1000N San Francisco, CA 94107 United

More information

Cisco IoT Industrial Ethernet and Connected Grid Switches running IOS

Cisco IoT Industrial Ethernet and Connected Grid Switches running IOS National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA 95134-1706 Cisco IoT Industrial Ethernet

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA 95134-1706 Cisco Catalyst 2K/3K

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of JUNOS-FIPS for SRX Series version 10.4R4 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

WatchGuard Technologies WatchGuard LiveSecurity System with Firebox II 4.1 Security Target

WatchGuard Technologies WatchGuard LiveSecurity System with Firebox II 4.1 Security Target WatchGuard Technologies WatchGuard LiveSecurity System with Firebox II 4.1 Security Target Version 1.0 Final August 3, 2000 Prepared for: WatchGuard Technologies 316 Occidental Ave S, Suite 200 Seattle,

More information

ISAServer2004CommonCriteria Evaluation Security Target Internet Security and Acceleration Server Team

ISAServer2004CommonCriteria Evaluation Security Target Internet Security and Acceleration Server Team Microsoft Internet Security and Acceleration Server ISAServer2004CommonCriteria Evaluation Security Target Internet Security and Acceleration Server Team Author: Category: Status: Stephan Slabihoud, TÜVIT

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2012/8282 11 Oct 2012 Version 1.0 Commonwealth of Australia 2012 Reproduction is authorised provided that the

More information

December 17, Revision Document Number: E2-ST

December 17, Revision Document Number: E2-ST Security Target For Blue Ridge Networks BorderGuard Centrally Managed Embedded PKI Virtual Private Network (VPN) Firmware Release 6.2 and VPN Manager Application Software Release 2.2 Revision 1.10 December

More information

Dell SonicWALL, Inc. SonicOS Enhanced v5.9.0 on NSA Series and TZ Series Appliances

Dell SonicWALL, Inc. SonicOS Enhanced v5.9.0 on NSA Series and TZ Series Appliances Dell SonicWALL, Inc. SonicOS Enhanced v5.9.0 on NSA Series and TZ Series Appliances Security Target Evaluation Assurance Level (EAL): EAL4+ Document Version: 1.1 Prepared for: Prepared by: Dell SonicWALL,

More information

Network Intrusion Prevention System Protection Profile V1.1 Certification Report

Network Intrusion Prevention System Protection Profile V1.1 Certification Report KECS-CR-2005-04 Network Intrusion Prevention System Protection Profile V1.1 Certification Report Certification No. : CC-20-2005.12 12, 2005 National Intelligence Service This document is the certification

More information

Cisco Catalyst 3K/4K Wired Access Switches

Cisco Catalyst 3K/4K Wired Access Switches National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA 95134-1706 Cisco Catalyst 3K/4K

More information

Certification Report

Certification Report Certification Report EAL 3+ Evaluation of Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches running JUNOS 11.4R2

More information

Cisco ASA with FirePOWER Services

Cisco ASA with FirePOWER Services Cisco ASA with FirePOWER Services Security Target ST Version 1.0 January 8, 2018 Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA 2018 Cisco Systems, Inc.

More information

IBM Proventia G 1.3 and SiteProtector 2.0 Service Pack 6.1 with Reporting Module Security Target. Security Target. Version 1.19.

IBM Proventia G 1.3 and SiteProtector 2.0 Service Pack 6.1 with Reporting Module Security Target. Security Target. Version 1.19. IBM Proventia G 1.3 and SiteProtector 2.0 Service Pack 6.1 with Reporting Module Security Target Version 1.19 May 10, 2010 Internet Security Systems, Inc. 6303 Barfield Road Atlanta, GA 30328 Table of

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Fortinet FortiMail V3.0 MR5 Secure Messaging Platform Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Protection Profile for IPsec Virtual Private Network (VPN) Clients, Version 1.1 Report Number:

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Cisco Systems, Inc. Catalyst 4500 Series Wired Access Switches running IOS-XE 3.10 Report Number:

More information

Firewall Protection Profile V2.0 Certification Report

Firewall Protection Profile V2.0 Certification Report KECS-CR-08-10 Firewall Protection Profile V2.0 Certification Report Certification No. : KECS-PP-0093-2008 Apr, 2008 National Intelligence Service IT Security Certification Center This document is the certification

More information

Version: National Information Assurance Partnership

Version: National Information Assurance Partnership Network Device Collaborative Protection Profile (NDcPP)/Application Software Protection Profile (App PP) Extended Package Voice/Video over IP (VVoIP) Endpoint Version: 1.0 2016-09-28 National Information

More information

Brocade MLXe Family Devices with Multi- Service IronWare R

Brocade MLXe Family Devices with Multi- Service IronWare R National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Brocade Communication Systems, Inc 130 Holger Way San Jose, CA 95134 Brocade MLXe Family

More information

Brocade FastIron SX, ICX, and FCX Series Switch/Router

Brocade FastIron SX, ICX, and FCX Series Switch/Router National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 Brocade FastIron

More information

Sterling Commerce, Inc. Connect:Direct with Secure+ Option. v4.5 on IBM OS/390 and z/os

Sterling Commerce, Inc. Connect:Direct with Secure+ Option. v4.5 on IBM OS/390 and z/os Connect:Direct with Secure+ Option v4.5 on IBM OS/390 and z/os Document Version 0.1 Prepared for: 750 W. John Carpenter Freeway Irving, TX 75039 Prepared by: Corsec Security, Inc. 10340 Democracy Lane,

More information

Cisco Network Admission Control Security Target. Table of Contents

Cisco Network Admission Control Security Target. Table of Contents This document provides the basis for an evaluation of a specific Target of Evaluation (TOE), the Cisco Network Admission Control solutions. This Security Target (ST) defines a set of assumptions about

More information

VMware. Security Target

VMware. Security Target NS v6.3 for vsphere MARCH 2017 Document prepared by Document History Version Date Author Description 0.1 29 Jan 2016 A Boulton Initial draft ST. 0.2 03 Feb 2016 A Boulton Incorporate discussion/comments

More information

Security Target. packet filter 3.0.3

Security Target. packet filter 3.0.3 Version 1.0 packet filter 3.0.3 Authors: Christian Koob, Jörg Marx, secunet Security Networks AG Certification-ID: BSI-DSZ-CC-0595 HISTORY Version Date Change(s) Author(s) 1.0 16/08/2010 Version for evaluation

More information

Security Target For Cisco IOS IPSec

Security Target For Cisco IOS IPSec March 2007 Version: 1.0 Conventions The notation, formatting, and conventions used in this Security Target document are consistent with the conventions used in Version 2.3 of the Common Criteria (CC) document.

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Cisco Systems, Inc. Catalyst 2960 and 3560 Series Wired Access Switches running IOS 15.2 Report

More information

Certification Report

Certification Report Certification Report EMC NetWorker v8.0.1.4 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada,

More information

Hewlett-Packard Company A-Series Switches/w Security Blades Security Target

Hewlett-Packard Company A-Series Switches/w Security Blades Security Target Hewlett-Packard Proprietary Hewlett-Packard Company A-Series Switches/w Security Blades Security Target Version 1.0 3/20/2013 Prepared for: Hewlett-Packard Development Company, L.P. 11445 Compaq Center

More information

Cisco Aggregation Services Router (ASR) 1000 Series. Security Target. Version 0.7

Cisco Aggregation Services Router (ASR) 1000 Series. Security Target. Version 0.7 Cisco Aggregation Services Router (ASR) 1000 Series Security Target Version 0.7 17 October 2017 1 Table of Contents 1 SECURITY TARGET INTRODUCTION...8 1.1 ST AND TOE REFERENCE... 8 1.2 TOE OVERVIEW...

More information

Electronic Health Card Terminal (ehct)

Electronic Health Card Terminal (ehct) Common Criteria Protection Profile Electronic Health Card Terminal (ehct) BSI-CC-PP-0032 Approved by the Federal Ministry of Health Foreword This Protection Profile - Protection Profile electronic Health

More information

3Com Embedded Firewall Version Security Target

3Com Embedded Firewall Version Security Target 1 of 1 Part Number: 00-0937467-B Version Date: 5 March 2003 3Com Embedded Firewall Version 1.5.1 Security Target Secure Computing Corporation 2675 Long Lake Road Saint Paul, Minnesota 55113 Prepared by:

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Network Device collaborative Protection Profile (NDcPP) Extended Package VPN Gateway Version

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Cisco Systems, Inc., 170 West Tasman Dr., San Jose, CA 95134 TM Cisco Wide Area Application

More information

Sterling Commerce, Inc. Connect:Direct with Secure+ Option. v3.7 running on UNIX and v4.2 on Windows

Sterling Commerce, Inc. Connect:Direct with Secure+ Option. v3.7 running on UNIX and v4.2 on Windows Connect:Direct with Secure+ Option v3.7 running on UNIX and v4.2 on Windows Document Version 0.6 Prepared for: 750 W. John Carpenter Freeway Irving, TX 75039 Prepared by: Corsec Security, Inc. 10340 Democracy

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Tactical Network-layer Gateway (2E2 IA): a GD Canada MESHnet G2 Gateway product Issued by: Communications Security Establishment Canada Certification Body Canadian

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report. Cisco Systems, Inc.

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report. Cisco Systems, Inc. National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 94002, USA Cisco Adaptive Security

More information

Intel SOA Expressway v and Intel SOA Expressway v for Healthcare Security Target

Intel SOA Expressway v and Intel SOA Expressway v for Healthcare Security Target Intel SOA Expressway v2.7.0.4 and Intel SOA Expressway v2.7.0.4 for Healthcare Security Target EAL 4+ Document No. 1627-006 Version 1.9, August 30, 2011 Prepared for: Intel Corporation 1815 South Meyers

More information

Cisco AnyConnect Secure Mobility Desktop Client

Cisco AnyConnect Secure Mobility Desktop Client Cisco AnyConnect Secure Mobility Desktop Client Security Target Version 1.1 March 24, 2016 Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA 2015 Cisco Systems,

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme NetScreen Technologies, Incorporated Report Number: CCEVS-VR-02-0027 Version 1.0 Dated: 30 November 2002 National

More information

Q1 Labs. QRadar V5.1.2 Security Target V 2.0.4

Q1 Labs. QRadar V5.1.2 Security Target V 2.0.4 Q1 Labs QRadar V5.1.2 Security Target V 2.0.4 Prepared By: Suite 5200 West 7925 Jones Branch Drive McLean, VA 22102-3321 703 848-0883 Fax 703 848-0960 SECTION TABLE OF CONTENTS Security Target Version

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Blue Ridge Networks BorderGuard Centrally Managed Embedded PKI Virtual Private Network (VPN)

More information

Certification Report

Certification Report Certification Report EMC VNX OE for Block v05.33 and File v8.1 with Unisphere v1.3 running on VNX Series Hardware Models VNX5200, VNX5400, VNX5600, VNX5800, VNX7600, and VNX8000 Issued by: Communications

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT WorkCentre 7525/7530/7535/7545/7556 with FIPS 140-2 Compliance over SNMPv3 25 July 2016 v1.0 383-4-371 Government of Canada. This document is the property of the Government

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Sidewinder G2 Security Appliance Models EAL4+ with Basic and Medium PP Compliance Report

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Verdasys Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of

More information

Brocade MLXe and NetIron Family Devices with Multi-Service IronWare R

Brocade MLXe and NetIron Family Devices with Multi-Service IronWare R National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Brocade Communications Systems, Inc. Brocade MLXe and NetIron Family Devices with Multi-Service

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,

More information

Cisco Catalyst 9400 Series Switches running IOS-XE 16.6

Cisco Catalyst 9400 Series Switches running IOS-XE 16.6 running IOS-XE 16.6 Common Criteria Security Target Version 1.0 10 April 2018 Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA 2018 Cisco Systems, Inc. All

More information

Assurance Activity Report (AAR) for a Target of Evaluation

Assurance Activity Report (AAR) for a Target of Evaluation Assurance Activity Report (AAR) for a Target of Evaluation Apple IOS 10.2 VPN Client on iphone and ipad Apple IOS 10.2 VPN Client Security Target Version 1.0, July 2017 Protection Profile for IPsec Virtual

More information

Dell EMC NetWorker 9.1

Dell EMC NetWorker 9.1 Dell EMC NetWorker 9.1 Evaluation Assurance Level (EAL): EAL2+ Doc No: 1986-000-D102 Version: 1.2 10 July 2017 EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada 1223 Michael

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report for the FireEye VX Series Appliance, Version 1.0 Report Number: CCEVS-VR-10835-2017 Dated:

More information

Dell EMC Unity OE v4.2

Dell EMC Unity OE v4.2 Dell EMC Unity OE v4.2 Evaluation Assurance Level (EAL): EAL2+ Doc No: 2009-000-D102 Version: 1.4 20 July 2017 EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada 1223 Michael

More information

AnyConnect Secure Mobility Client for Windows 10

AnyConnect Secure Mobility Client for Windows 10 National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 AnyConnect Secure Mobility Client

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report U.S. Government Router Protection Profile for Medium Robustness Environments Report Number:

More information

EMC VNXe1600 OE v3.1.3

EMC VNXe1600 OE v3.1.3 EMC VNXe1600 OE v3.1.3 Evaluation Assurance Level (EAL): EAL2+ Doc No: 1950-000-D102 Version: 0.7 18 March 2016 EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada 1223 Michael

More information

Fuji Xerox ApeosPort-II 5010/4000/3000 Series Controller Software for Asia Pacific. Security Target

Fuji Xerox ApeosPort-II 5010/4000/3000 Series Controller Software for Asia Pacific. Security Target Fuji Xerox ApeosPort-II 5010/4000/3000 Series Controller Software for Asia Pacific Security Target Version 1.0.5 This document is a translation of the evaluated and certified security target written in

More information

CREDANT Mobile Guardian (CMG) Enterprise Edition Version SP4 Security Target

CREDANT Mobile Guardian (CMG) Enterprise Edition Version SP4 Security Target CREDANT Mobile Guardian (CMG) Enterprise Edition Version 5.2.1 SP4 Security Target Version 1.7 March 24, 2008 CREDANT Technologies, Inc. 15303 Dallas Parkway Suite 1420 Addison, Texas 75001 CREDANT, CREDANT

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Lexmark CX920, CX921, CX922, CX923, CX924, XC9235, XC9245, XC9255, and XC9265 Multi-Function Printers 7 February 2018 383-4-434 V1.0 Government of Canada. This document

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. For. Imperva SecureSphere 9.

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. For. Imperva SecureSphere 9. National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report For Report Number: CCEVS-VR-10466-2012 Dated: 28 December 2012 Version: 0.2 National Institute

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Network Device collaborative Protection Profile Extended Package SIP Server 383-6-4 9 August 2017 Version 1.0 Government of Canada. This document is the property of

More information

Cisco Jabber for Windows Security Target. Cisco Jabber for Windows. Security Target. Version March 2016 EDCS

Cisco Jabber for Windows Security Target. Cisco Jabber for Windows. Security Target. Version March 2016 EDCS Cisco Jabber for Windows Security Target Version 1.1 22 March 2016 EDCS - 1502603 Page 1 of 41 Table of Contents 1 SECURITY TARGET INTRODUCTION... 8 1.1 ST and TOE Reference... 8 1.2 TOE Overview... 8

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Cisco ASA 9.4(1.13), ASAv 9.4(1.240) and ASDM 7.4 Certification Report 2016/102 10-11-2016 Version 1.0 Commonwealth of Australia 2016 Reproduction is

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Vormetric Data Security Manager V6000, Version 5.3 Report Number: CCEVS-VR-VID10737-2016 Dated:

More information

- Table of Contents -

- Table of Contents - - Table of Contents - 1 INTRODUCTION... 1 1.1 OBJECTIVES OF THIS GUIDE... 1 1.2 ORGANIZATION OF THIS GUIDE... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 5 2 BASIC KNOWLEDGE

More information

Certification Report

Certification Report Certification Report EAL 3+ Evaluation of Xerox WorkCentre 5632/5638/5645/5655/5665/5675/5687 Multifunction Systems Issued by: Communications Security Establishment Canada Certification Body Canadian Common

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT McAfee Policy Auditor 6.4 with epolicy Orchestrator 5.10 5 November 2018 383-4-455 V1.0 Government of Canada. This document is the property of the Government of Canada.

More information

Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific. Security Target

Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific. Security Target あ Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific Security Target Version 1.0.9 This document is a translation of the evaluated and certified security target written in Japanese

More information

Check Point Software Technologies LTD

Check Point Software Technologies LTD National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Check Point Software Technologies LTD Check Point VPN-1 NGX Report Number: CCEVS-VR-VID10352-2012

More information

Cisco Systems, Inc. ACE XML Gateway and Manager Version Security Target

Cisco Systems, Inc. ACE XML Gateway and Manager Version Security Target Cisco Systems, Inc. ACE ML Gateway and Manager Version 5.0.3 Security Target Version 1.0 07/25/08 Prepared for: Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 Prepared By: Cisco Systems,

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. for

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. for National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report for Report Number: CCEVS-VR-10746-2016 Dated: November 10, 2016 Version: 1.0 National Institute

More information

Certification Report

Certification Report Certification Report McAfee Management for Optimized Virtual Environments Antivirus 3.0.0 with epolicy Orchestrator 5.1.1 Issued by: Communications Security Establishment Certification Body Canadian Common

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. Cisco Systems, Inc.

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. Cisco Systems, Inc. National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 94002, USA Cisco Adaptive Security Appliances

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM QRadar V5.1.2 Report Number: Dated: January 26, 2007 Version: 1.1 National Institute of

More information

Brocade FastIron Switch/Router with IPsec VPN Module

Brocade FastIron Switch/Router with IPsec VPN Module National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA Brocade FastIron

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Protection Profile for Voice over IP (VoIP) Applications, Version 1.3, November 3, 2014 TM

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. for

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. for National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report for Microsoft Windows 10 Anniversary Update IPsec VPN Client TM Report Number: CCEVS-VR-VID10753-2016

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. Tripp Lite Secure KVM Switch Series

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. Tripp Lite Secure KVM Switch Series National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Report Number: CCEVS-VR-VID10481-2011 Dated: October 31, 2011 Version: 2.0 National Institute

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Ixia NTO 7303 and Vision ONE v4.5.0.29 30 October 2017 383-4-409 1.0 Government of Canada. This document is the property of the Government of Canada. It shall not be

More information

Imperva SecureSphere 6 Security Target

Imperva SecureSphere 6 Security Target Imperva SecureSphere 6 Security Target Version 1.6 February 5, 2009 Prepared for: Imperva Inc. 950 Tower Lane, Suite 1550 Foster City, CA 94404 Prepared by: Metatron Security Services Metatron Security

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Report Number: CCEVS-VR-07-0045 Dated: 7 June 2007 Version: 0.4 National Institute of Standards

More information

Brocade Directors and Switches using Fabric OS v8.1.0

Brocade Directors and Switches using Fabric OS v8.1.0 National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Brocade Communications Systems, Inc. 130 Holger Way San Jose, CA 95134 USA Brocade Directors

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Dell EMC Unity OE 4.2 383-4-421 22 September 2017 Version 1.0 Government of Canada. This document is the property of the Government of Canada. It shall not be altered,

More information

Certification Report

Certification Report Certification Report HP 3PAR StoreServ Storage Systems Version 3.2.1 MU3 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Dell EMC Elastic Cloud Storage v3.2 15 May 2018 383-4-439 V1.0 Government of Canada. This document is the property of the Government of Canada. It shall not be altered,

More information