Cisco CISCO881W-GN-A-K9 Specifications

Browse online or download Specifications for Networking Cisco CISCO881W-GN-A-K9. Cisco CISCO881W-GN-A-K9 Specifications User Manual

  • Download
  • Add to my manuals
  • Print

Summary of Contents

Page 1 - November 13, 2014

Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA © 2014 Cisco Systems, Inc. All rights reserved.

Page 2 - Table of Contents

Cisco ISR-800 Security Target 10 Figure 1 TOE Example Deployment = TOE Boundary

Page 3

Cisco ISR-800 Security Target 11 The previous figure includes the following: • Several examples of TOE Models o Cisco ISR-819 o Cisco ISR-89

Page 4 - List of Figures

Cisco ISR-800 Security Target 12 web site. The TOE is comprised of the following physical specifications as described in Table 4 below: Table 4 Har

Page 5 - List of Acronyms

Cisco ISR-800 Security Target 13 Hardware Picture Size Power Specifications Interfaces Cisco ISR-C819HG-4G-G-K9 Architecture Generation – 880-

Page 6 - DOCUMENT INTRODUCTION

Cisco ISR-800 Security Target 14 Hardware Picture Size Power Specifications Interfaces Cisco ISR-C819G-4G-V-K9 Architecture Generation – 880-B Onb

Page 7 - 1.1 ST and TOE Reference

Cisco ISR-800 Security Target 15 Hardware Picture Size Power Specifications Interfaces Cisco ISR-C819HGW-V-A-K9 Architecture Generation – 880-

Page 8 - 1.2 TOE Overview

Cisco ISR-800 Security Target 16 Hardware Picture Size Power Specifications Interfaces Cisco ISR-C881WD-A-K9 Architecture Generation – 880-B Onbo

Page 9 - 1.3 TOE DESCRIPTION

Cisco ISR-800 Security Target 17 Hardware Picture Size Power Specifications Interfaces Cisco ISR-C881W-A-K9 Architecture Generation – 880-B O

Page 10 - Cisco ISR-800 Series

Cisco ISR-800 Security Target 18 Hardware Picture Size Power Specifications Interfaces CISCO891W-AGN-A-K9 Architecture Generation – 890-A Onboard

Page 11

Cisco ISR-800 Security Target 19 1.6.2 Cryptographic Support The TOE provides cryptography in support of other Cisco ISR-800 security functiona

Page 12

Cisco ISR-800 Security Target 2 Table of Contents 1 SECURITY TARGET INTRODUCTION ...

Page 13

Cisco ISR-800 Security Target 20 The TOE can act as a certification authority thus signing and issuing certificates to other devices. The TOE can al

Page 14

Cisco ISR-800 Security Target 21 • All identification and authentication; • All audit functionality of the TOE; • All TOE cryptographic fun

Page 15

Cisco ISR-800 Security Target 22 1.6.8 TOE Access The TOE can terminate inactive sessions after an Authorized Administrator configurable time-period

Page 16

Cisco ISR-800 Security Target 23 2 CONFORMANCE CLAIMS 2.1 Common Criteria Conformance Claim The TOE and ST are compliant with the Common Crite

Page 17

Cisco ISR-800 Security Target 24 All concepts covered in the Protection Profile’s Statement of Security Objectives are included in the Security Targe

Page 18 - Security Audit

Cisco ISR-800 Security Target 25 3 SECURITY PROBLEM DEFINITION This chapter identifies the following: • Significant assumptions about the TOE

Page 19 - Cryptographic Support

Cisco ISR-800 Security Target 26 Threat Threat Definition T.ADMIN_ERROR An administrator may unintentionally install or configure the TOE incorrec

Page 20 - Security Management

Cisco ISR-800 Security Target 27 Policy Name Policy Definition P.ACCESS_BANNER The TOE shall display an initial banner describing restrictions

Page 21 - 1.6.7 Protection of the TSF

Cisco ISR-800 Security Target 28 4 SECURITY OBJECTIVES This Chapter identifies the security objectives of the TOE and the IT Environment. The secur

Page 22 - 1.7 Excluded Functionality

Cisco ISR-800 Security Target 29 TOE Objective TOE Security Objective Definition O.ADDRESS_FILTERING The TOE will provide the means to filter

Page 23 - 2 CONFORMANCE CLAIMS

Cisco ISR-800 Security Target 3 5.3.7 Protection of the TSF (FPT) ...

Page 24

Cisco ISR-800 Security Target 30 5 SECURITY REQUIREMENTS This section identifies the Security Functional Requirements for the TOE. The Security Fun

Page 25 - 3.2 Threats

Cisco ISR-800 Security Target 31 Class Name Component Identification Component Name FCS: Cryptographic support FCS_CKM.1(1) Cryptographic Key

Page 26

Cisco ISR-800 Security Target 32 Class Name Component Identification Component Name FPT_SKP_EXT.1 Extended: Protection of TSF Data (for reading of

Page 27

Cisco ISR-800 Security Target 33 Table 15 Auditable Events SFR Auditable Event Additional Audit Record Contents FAU_GEN.1 None. None. FAU_GEN.

Page 28 - 4 SECURITY OBJECTIVES

Cisco ISR-800 Security Target 34 SFR Auditable Event Additional Audit Record Contents FIA_X509_EXT.1 Establishing session with CA Source and destina

Page 29

Cisco ISR-800 Security Target 35 SFR Auditable Event Additional Audit Record Contents Failure of the trusted channel functions. FTP_TRP.1 Init

Page 30 - 5 SECURITY REQUIREMENTS

Cisco ISR-800 Security Target 36 • FIPS PUB 186-3, “Digital Signature Standard (DSS)”, Appendix B.4 for ECDSA schemes and implementing “NIST curves

Page 31

Cisco ISR-800 Security Target 37 5.3.2.7 FCS_COP.1(4) Cryptographic Operation (for keyed-hash message authentication) FCS_COP.1.1(4) Refinement

Page 32 - 5.3.1 Security audit (FAU)

Cisco ISR-800 Security Target 38 FCS_IPSEC_EXT.1.10 The TSF shall generate nonces used in IKE exchanges in a manner such that the probability that a

Page 33

Cisco ISR-800 Security Target 39 FCS_SSH_EXT.1.6 The TSF shall ensure that data integrity algorithms used in SSH transport connection is [hmac-s

Page 34

Cisco ISR-800 Security Target 4 List of Tables TABLE 1 ACRONYMS...

Page 35

Cisco ISR-800 Security Target 40 • composed of any combination of upper and lower case letters, numbers, and special characters (that include: “!”,

Page 36 - GCM, CBC, [no other

Cisco ISR-800 Security Target 41 RFC 5759]. FIA_X509_EXT.1.6 The TSF shall validate a certificate path by ensuring the presence of the basicCo

Page 37

Cisco ISR-800 Security Target 42 5.3.5.4 FMT_SMR.2 Restrictions on Security Roles FMT_SMR.2.1 The TSF shall maintain the roles: • Authorized Admin

Page 38

Cisco ISR-800 Security Target 43 o Source Port o Destination Port • UDP o Source Port o Destination Port and distinct interface. FPF_

Page 39

Cisco ISR-800 Security Target 44 5.3.7.5 FPT_TST_EXT.1: Extended: TSF Testing FPT_TST_EXT.1.1 The TSF shall run a suite of self tests during initial

Page 40

Cisco ISR-800 Security Target 45 5.3.9 Trusted Path/Channels (FTP) 5.3.9.1 FTP_ITC.1 Inter-TSF trusted channel FTP_ITC.1.1 Refinement: Th

Page 41

Cisco ISR-800 Security Target 46 5.5 Security Assurance Requirements 5.5.1 SAR Requirements The TOE assurance requirements for this ST are taken di

Page 42

Cisco ISR-800 Security Target 47 5.6 Assurance Measures The TOE satisfies the identified assurance requirements. This section identifies the A

Page 43

Cisco ISR-800 Security Target 48 6 TOE SUMMARY SPECIFICATION 6.1 TOE Security Functional Requirement Measures This chapter identifies and describes

Page 44 - 5.3.8 TOE Access (FTA)

Cisco ISR-800 Security Target 49 TOE SFRs How the SFR is Met Session Establishment with peer. Source and destination ports TOE Interface Es

Page 45

Cisco ISR-800 Security Target 5 List of Acronyms The following acronyms and abbreviations are common and may be used in this Security Target:

Page 46 - 5.5.1 SAR Requirements

Cisco ISR-800 Security Target 50 TOE SFRs How the SFR is Met The termination of an interactive session. An audit event is generated by an authorize

Page 47 - 5.6 Assurance Measures

Cisco ISR-800 Security Target 51 TOE SFRs How the SFR is Met the buffer contents when connectivity to the syslog server is restored. This store

Page 48 - 6 TOE SUMMARY SPECIFICATION

Cisco ISR-800 Security Target 52 TOE SFRs How the SFR is Met 384, and SHA-512 with message digest sizes 160, 256, 384 and 512 bits respectively, as

Page 49

Cisco ISR-800 Security Target 53 TOE SFRs How the SFR is Met lets two peers agree on how to build an IPsec Security Association (SA). The stren

Page 50

Cisco ISR-800 Security Target 54 TOE SFRs How the SFR is Met confidentiality of the session. • The TOE’s implementation of SSHv2 supports hashing a

Page 51

Cisco ISR-800 Security Target 55 TOE SFRs How the SFR is Met the Authorized Administrator. New passwords must contain a minimum of 4 character

Page 52

Cisco ISR-800 Security Target 56 TOE SFRs How the SFR is Met screen so that the user password is obscured. For remote session authentication, the TO

Page 53

Cisco ISR-800 Security Target 57 TOE SFRs How the SFR is Met • Ability to configure the cryptographic functionality, • Ability to configure t

Page 54

Cisco ISR-800 Security Target 58 TOE SFRs How the SFR is Met action associated with the rule is to pass traffic). Rules are enforced on a first matc

Page 55

Cisco ISR-800 Security Target 59 TOE SFRs How the SFR is Met timestamps. The clock function is reliant on the system clock provided by the und

Page 56

Cisco ISR-800 Security Target 6 DOCUMENT INTRODUCTION Prepared By: Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134 This document provide

Page 57

Cisco ISR-800 Security Target 60 TOE SFRs How the SFR is Met self-test. The integrity of stored TSF executable code when it is loaded for execution

Page 58

Cisco ISR-800 Security Target 61 TOE SFRs How the SFR is Met FTP_TRP.1 All remote administrative communications take place over a secure encryp

Page 59

Cisco ISR-800 Security Target 62 7 ANNEX A: KEY ZEROIZATION 7.1 Key Zeroization The following table describes the key zeroization referenced by FCS

Page 60

Cisco ISR-800 Security Target 63 Name Description Zeroization key encryption and authentication keys. The entire object is overwritten by 0’s u

Page 61

Cisco ISR-800 Security Target 64 8 ANNEX B: REFERENCES The following documentation was used to prepare this ST: Table 20 References Identifier Des

Page 62 - 7 ANNEX A: KEY ZEROIZATION

Cisco ISR-800 Security Target 7 1 SECURITY TARGET INTRODUCTION The Security Target contains the following sections: • Security Target Introd

Page 63

Cisco ISR-800 Security Target 8 1.2 TOE Overview The Cisco ISR-800 is a purpose-built, routing platform that combines data, security, unified commun

Page 64 - 8 ANNEX B: REFERENCES

Cisco ISR-800 Security Target 9 Component Required Usage/Purpose Description for TOE performance of the TOE configuration, and likely administer

Comments to this Manuals

No comments