ebook img

Nokia Firewall/VPN Appliances with Check Point - Common Criteria PDF

164 Pages·2009·1.37 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Nokia Firewall/VPN Appliances with Check Point - Common Criteria

Nokia Firewall/VPN Appliances with Check Point VPN-1 NGX R65 Security Target Version 1.0 March 4, 2009 Prepared for: Nokia Inc. 313 Fairchild Dr. – Bldg. B Mountain View, CA 94043 Prepared by: MMMMeeeettttaaaattttrrrroooonnnn SSSSeeeeccccuuuurrrriiiittttyyyy SSSSeeeerrrrvvvviiiicccceeeessss Metatron Security Services Ltd. 66 Yosef St., Modiin, Israel 71724 All marks, trademarks, and logos mentioned in this material are the property of their respective owners. Nokia Firewall/VPN Appliances with Check Point VPN-1 NGX R65 Security Target Version 1.0 Prologue 3/4/2008 Document Version Control Log Version Date Author Description Version 0.1 September 4, 2007 Nir Naaman Extracted from Check Point NGX R65 ST. Version 0.3 November 1, 2007 Nir Naaman Added SecureClient Mobile support. Version 0.5 August 11, 2008 Nir Naaman Added reference to SmartConsole HFA 01. Added Windows Vista to the list of supported platforms for SmartConsole. Added IP1280 as supported platform. Updated supported Check Point appliances. Version 1.0 March 4, 2009 Nir Naaman Added IP150 as supported platform. EAL4 + ALC_FLR.3 ST approved for public release. ©2009 Nokia Inc. All Rights Reserved. 2 Nokia Firewall/VPN Appliances with Check Point VPN-1 NGX R65 Security Target Version 1.0 Prologue 3/4/2008 Table of Contents 1. Introduction.................................................................................................................................9 1.1. ST Identification.............................................................................................................9 1.2. ST Overview................................................................................................................10 1.3. Conformance Claims....................................................................................................11 1.3.1. CC Conformance......................................................................................................11 1.3.2. Assurance Package Conformance.............................................................................11 1.3.3. PP Conformance.......................................................................................................11 1.4. Document Organization...............................................................................................12 1.5. References....................................................................................................................13 1.6. Conventions..................................................................................................................15 1.6.1. Security Environment Considerations and Objectives.............................................15 1.6.2. Security Functional Requirements............................................................................15 1.6.3. Other Notations.........................................................................................................17 1.6.4. Highlighting Conventions.........................................................................................18 1.7. Terminology.................................................................................................................20 1.7.1. Glossary....................................................................................................................20 1.7.2. Abbreviations............................................................................................................24 2. TOE Description.......................................................................................................................27 2.1. Overview......................................................................................................................27 2.2. Product Types...............................................................................................................28 2.3. Physical Scope and Boundaries of the TOE.................................................................29 2.3.1. Definition..................................................................................................................29 2.3.2. TOE Hardware Platforms.........................................................................................30 2.3.3. TOE Software...........................................................................................................31 2.3.4. TOE Guidance..........................................................................................................31 2.3.5. SmartCenter Server...................................................................................................32 2.3.6. Management GUI......................................................................................................32 2.3.7. VPN Clients..............................................................................................................34 2.4. Logical Scope and Boundaries of the TOE..................................................................36 ©2009 Nokia Inc. All Rights Reserved. 3 Nokia Firewall/VPN Appliances with Check Point VPN-1 NGX R65 Security Target Version 1.0 Prologue 3/4/2008 2.4.1. TOE Logical Interactions with its Operational Environment...................................36 2.4.2. Information Flow Control.........................................................................................37 2.4.3. VPN...........................................................................................................................39 2.4.4. Connectivity queries.................................................................................................40 2.4.5. Management..............................................................................................................40 2.4.6. Time Synchronization...............................................................................................41 2.4.7. Functionality Excluded from the TOE Evaluated Configuration.............................42 2.5. TOE Security Functionality.........................................................................................45 2.5.1. Summary of TOE Security Functionality.................................................................45 2.5.2. Firewall Functionality and Stateful Inspection.........................................................46 2.5.3. Security Rule Base....................................................................................................48 2.5.4. Traffic filtering and Intrusion Detection/Prevention................................................48 2.5.5. Security Servers........................................................................................................48 2.5.6. Virtual Private Networking (VPN)...........................................................................49 2.5.7. Secure Internal Communications (SIC)....................................................................51 2.6. Customer Support Services..........................................................................................52 2.6.1. Nokia Service Contracts...........................................................................................52 2.6.2. Nokia TAC................................................................................................................52 2.6.3. Check Point Enterprise Software Subscription.........................................................52 2.6.4. Check Point User Center...........................................................................................52 3. TOE Security Environment.......................................................................................................54 3.1. Assumptions.................................................................................................................54 3.2. Threats to Security.......................................................................................................54 3.2.1. Firewall-related Threats............................................................................................54 3.2.2. IDS-related Threats...................................................................................................55 3.2.3. VPN-related Threats.................................................................................................56 3.3. Organizational Security Policies..................................................................................56 4. Security Objectives...................................................................................................................57 4.1. Information Technology (IT) Security Objectives.......................................................57 4.1.1. Firewall PP Objectives..............................................................................................57 4.1.2. IDS PP Objectives.....................................................................................................58 4.1.3. VPN Objectives........................................................................................................58 ©2009 Nokia Inc. All Rights Reserved. 4 Nokia Firewall/VPN Appliances with Check Point VPN-1 NGX R65 Security Target Version 1.0 Prologue 3/4/2008 4.2. Security Objectives for the Environment.....................................................................59 4.2.1. Firewall PP Non-IT Security Objectives for the Environment.................................59 4.2.2. IDS PP Non-IT Objectives for the Environment......................................................60 4.2.3. Firewall PP Security Objectives for the IT Environment.........................................60 4.2.4. VPN Security Objectives for the IT Environment....................................................61 5. IT Security Requirements.........................................................................................................62 5.1. TOE Security Functional Requirements......................................................................62 5.1.1. Security Audit (FAU)...............................................................................................67 5.1.2. Cryptographic support (FCS)....................................................................................71 5.1.3. User data protection (FDP).......................................................................................74 5.1.4. Identification and authentication (FIA)....................................................................82 5.1.5. Security Management (FMT)...................................................................................85 5.1.6. Protection of the TSF (FPT).....................................................................................89 5.1.7. Trusted path/channels (FTP).....................................................................................90 5.1.8. IDS Component Requirements (IDS).......................................................................91 5.2. TOE Security Assurance Requirements.......................................................................93 5.3. Security Functional Requirements for the IT Environment.........................................95 5.3.1. User Data Protection (FDP)......................................................................................95 5.3.2. Identification and Authentication (FIA)...................................................................95 5.3.3. Trusted path/channels (FTP).....................................................................................96 6. TOE Summary Specification....................................................................................................97 6.1. TOE Security Functions...............................................................................................97 6.1.1. Stateful Inspection....................................................................................................97 6.1.2. Security Servers......................................................................................................100 6.1.3. VPN.........................................................................................................................102 6.1.4. Audit.......................................................................................................................104 6.1.5. Security Management.............................................................................................111 6.1.6. SIC..........................................................................................................................117 6.1.7. Identification and Authentication (I&A)................................................................118 6.1.8. TSF Protection........................................................................................................120 6.2. TOE Security Assurance Measures............................................................................123 6.2.1. Security Target........................................................................................................123 ©2009 Nokia Inc. All Rights Reserved. 5 Nokia Firewall/VPN Appliances with Check Point VPN-1 NGX R65 Security Target Version 1.0 Prologue 3/4/2008 6.2.2. Process Assurance Documentation.........................................................................123 6.2.3. Development Documentation.................................................................................124 6.2.4. The TOE..................................................................................................................125 6.2.5. Test Plan and Procedures........................................................................................125 6.2.6. Guidance Documentation........................................................................................125 6.2.7. Analysis of Guidance Documentation....................................................................125 6.2.8. Vulnerability Analysis............................................................................................125 6.2.9. SAR Mapping.........................................................................................................126 6.3. Identification of Standards.........................................................................................127 7. PP Claims................................................................................................................................128 7.1. PP Reference..............................................................................................................128 7.2. PP Tailoring................................................................................................................128 7.3. PP Additions...............................................................................................................128 8. TOE Rationale........................................................................................................................129 8.1. Security Objectives Rationale....................................................................................129 8.1.1. IT Security Objectives Rationale............................................................................129 8.1.2. Non-IT Security Objectives Rationale....................................................................134 8.2. Security Requirements Rationale...............................................................................136 8.2.1. Security Functional Requirements Rationale..........................................................136 8.2.2. SFRs for the IT Environment Rationale.................................................................146 8.2.3. Security Assurance Requirements Rationale..........................................................147 8.2.4. Extended Requirements Rationale..........................................................................148 8.2.5. Dependency Rationale............................................................................................149 8.2.6. Internal Consistency and Mutual Support...............................................................154 8.2.7. Strength of Function (SOF) Rationale....................................................................156 8.3. TOE Summary Specification Rationale.....................................................................157 8.3.1. TOE Security Functions Rationale.........................................................................157 8.3.2. Assurance Measures Rationale...............................................................................159 8.3.3. Strength of Function Rationale...............................................................................160 8.4. PP Claims Rationale...................................................................................................161 Appendix A - SmartCenter Server H/W Platforms.....................................................................163 ©2009 Nokia Inc. All Rights Reserved. 6 Nokia Firewall/VPN Appliances with Check Point VPN-1 NGX R65 Security Target Version 1.0 Prologue 3/4/2008 List of Tables Table 1-1- SFR Highlighting Conventions...................................................................................18 Table 2 -1 – Nokia Firewall/VPN Appliances Product Types.......................................................28 Table 2-2 - TOE Hardware Platforms...........................................................................................30 Table 5-1 –Security functional requirement components............................................................63 Table 5 -2 - Auditable Events........................................................................................................67 Table 5 -3- Specification of Management Functions.....................................................................87 Table 5 -4 - System Events............................................................................................................91 Table 5-5- TOE Security Assurance Requirements......................................................................93 Table 6 -1- HTTP Security Server Protocol Validation...............................................................101 Table 6 -2- Audit SF Mapping to FAU_GEN.1..........................................................................107 Table 6-3- Management GUI Management Functions...............................................................112 Table 6 -4 - Security-relevantAdministrator Permissions...........................................................115 Table 6 -5- Mapping of Evaluation Evidence to Assurance Requirements.................................126 Table 6 -6- Cryptographic Standards and Method of Determining Compliance.........................127 Table 8-1- Tracing of IT security objectives to the TOE security environment.........................129 Table 8 -2 - Omitted [IDSSPP] IT Security Objectives...............................................................130 Table 8-3- Tracing of non-IT security objectives to the TOE security environment.................134 Table 8-4 – TOE Security Objective to Functional Component Mapping.................................136 Table 8-5 – IT Environment Security Objective to Functional Component Mapping...............146 Table 8 -6- Assurance Requirements for Claimed PPs................................................................147 Table 8 -7- Explicitly Stated Security Functional Requirements................................................148 Table 8-8- Security Requirements Dependency Mapping..........................................................149 Table 8 -9 – Additional supporting SFRs introduced in this ST..................................................156 Table 8 -10- TOE Summary Specification Rationale Mapping...................................................157 Table 8 -11- References to Guidance on the Interpretation of Claimed PPs...............................161 List of Figures Figure 2 -1- Physical Scope and Boundaries of the TOE..............................................................29 Figure 2 -2 - Local administration of the TOE..............................................................................33 ©2009 Nokia Inc. All Rights Reserved. 7 Nokia Firewall/VPN Appliances with Check Point VPN-1 NGX R65 Security Target Version 1.0 Prologue 3/4/2008 Figure 2 -3 - Remote administration of the TOE...........................................................................33 Figure 2-4 - SSL Network Extender running in standard Web browser.......................................34 Figure 2 -5 - SecureClient Mobile running on a PDA...................................................................35 Figure 2 -6 – SmartDefense Update...............................................................................................41 Figure 2 -7- Traffic filtering (left) vs. Application-level Proxies..................................................46 Figure 2 -8 - Stateful Inspection....................................................................................................47 Figure 2 -9- Example Rule.............................................................................................................48 Figure 2-10- Security Servers.......................................................................................................48 Figure 2 -11- Virtual Private Network...........................................................................................49 Figure 2-12- Example of a Meshed VPN Community.................................................................50 Figure 2-13- Example of a Star VPN Community........................................................................50 Figure 2-14- VPN community used as a Rule Base security attribute.........................................51 ©2009 Nokia Inc. All Rights Reserved. 8 Nokia Firewall/VPN Appliances with Check Point VPN-1 NGX R65 Security Target Version 1.0 Chapter 1. Introduction 3/4/2008 1. Introduction 1.1. ST Identification Title: Nokia Firewall/VPN Appliances with Check Point VPN-1 NGX R65 Security Target ST Version: 1.0 ST Date: March 4, 2009 Author: Nir Naaman TOE Software Identification: Nokia IPSO 4.2 Build 051c05 with Check Point VPN-1 Power/UTM NGX R65 HFA 30 TOE Hardware Identification: The TOE consists of the Nokia IPSO 4.2 operating system running Check Point VPN-1 Power/UTM security policy enforcement software, on any of the hardware platforms listed in Section 2.3.2 - TOE Hardware Platforms. Management software included in the TOE is always installed on a separate plat- form running the Check Point SecurePlatform NGX R65 operating system, se- lected from the list given in Appendix A. The platform selected for this purpose is not used in the identification of the TOE. TOE software also includes a Management GUI product (SmartConsole) that is installed on a standard PC (outside the TOE) running a Microsoft Windows oper- ating system. The evaluated version is: SmartConsole NGX R65 with HFA 01. TOE Support Program Identification: • Nokia service contract1 • Check Point Enterprise Software Subscription2 CC Version: Common Criteria for Information Technology Security Evaluation, Version 2.2 Revision 256, January 2004, CCIMB-2004-01-001 Evaluation Assurance Level (EAL): EAL 4, augmented with ALC_FLR.3 (systematic flaw remediation). Keywords: Information flow control, firewall, proxy server, traffic filter, VPN, TLS, IPSec, IDS/IPS, intrusion detection, Medium Robustness Environments 1 A valid Nokia service contract is required for receiving software upgrades, as part of Nokia’s flaw remediation procedures. 2 A Check Point Enterprise Software Subscription is required for receiving software upgrades, as part of Check Point’s flaw remediation procedures. Note that Enterprise Software Subscription is a prerequisite to purchasing all Check Point Enterprise Support Programs. ©2009 Nokia Inc. All Rights Reserved. 9 Nokia Firewall/VPN Appliances with Check Point VPN-1 NGX R65 Security Target Version 1.0 Chapter 1. Introduction 3/4/2008 1.2. ST Overview Nokia Firewall/VPN Appliances are network perimeter security devices that provide controlled connectivity between two or more network environments. They mediate information flows between clients and servers located on internal and external networks governed by the firewall. Nokia Firewall/VPN Appliances combine the security-hardened operating system, IPSO, with the market-leading Check Point VPN-1 Power/UTM firmware suite on a purpose- built FIPS 140-2 Level 2 compliant hardware platform. IPSO appliances ensure high availability through features such as clustering, hard disk mirroring, redundant and hot swap components, and solid state storage. As network devices, Nokia Firewall/VPN Appliances support a comprehensive suite of IP-routing functions and protocols, including RIPv1/RIPv2, IGRP, OSPF and BGP4 for unicast traffic and DVMRP for multicast traffic3. The Check Point VPN-1 Power/UTM software provides a broad set of information flow controls, including traffic filtering, application-level proxies and intrusion detection and prevention capabilities. IPSec and SSL VPN functionality encrypts and authenticates network traffic to and from selected peers, in order to protect the traffic from disclosure or modification over untrusted networks. Management can be performed either locally or remotely using management interfaces that are included in the Target of Evaluation (TOE). Nokia Firewall/VPN Appliances meet and exceed4 the functional requirements of two U.S. DoD Medium Robustness Protection Profiles, for proxy and traffic filtering firewalls, respectively. These PPs require the product to provide appropriate security to process unclassified or sensitive but unclassified information in the Mission-Critical Categories. Mission-Critical Categories refer to DoD systems that handle information vital to the operational readiness or mission effectiveness of deployed and contingency forces in terms of both content and timeliness. In addition, the product meets the requirements of the NSA System Protection Profile for an Intrusion Detection System (IDSSPP). The IDSSPP provides for a level of protection which is appropriate for IT environments that require detection of malicious and inadvertent attempts to gain inappropriate access to IT resources. The evaluation assurance level claimed in this Security Target was augmented in relationship to the assurance requirements specified in the claimed PPs in order to provide additional assurance that the TOE is resistant to attacks performed by attackers possessing a moderate (greater than low) attack potential. 3 Note: IP routing protocols are not enabled in the evaluated configuration. 4 Because the AVA_VLA.3 evaluation revalidation had not completed at the time of the publication of this Security Target, this Security Target does not claim conformance to the two medium robustness protection profiles identified here. ©2009 Nokia Inc. All Rights Reserved. 10

Description:
Nokia Firewall/VPN Appliances with. Check Point VPN-1 NGX R65. Security Target. Version 1.0. March 4, 2009. Prepared for: Nokia Inc. 313 Fairchild Dr.
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.