Cisco Cat4K NDPP ST
EDCS-1228241
Component
Required
Syslog server
NTP Server
1.4 TOE Description
The TOE description explains the TOE in more detail than was provided in the TOE
overview.
1.4.1 TOE Architecture and Security Capabilities
The Cisco Catalyst 4500 Series are network devices that protect themselves by offering
only a minimal logical interface to the network and control of that interface. The Switch
IOS subsystem is special purpose software that runs on the Cisco Catalyst 4500 Series
Switch hardware. The Catalyst Switches have been designed so that all locally
maintained security relevant data can only be manipulated via the secured management
interface, a CLI and provides no general purpose programming capability. There are no
undocumented interfaces for managing the Catalyst switches.
All network traffic to the TOE protected (internal) network passes through Catalyst
Switches. There are no unmediated traffic flows into or out of the TOE. Once network
traffic is received on one of the network ports, it is always subject to the security policy
rules as applied to each traffic flow. Traffic flows characterized as unauthorized are
discarded and not permitted to circumvent the Catalyst Switch. Configuration and
management of the Catalyst Switch is through an SSHv2 session via Management
workstation or via a local console connection. The management interfaces require user
identification and authentication prior to allowing management operations. As described
in Section 6, all management functions are restricted to the authorized administrator of
the TOE. The term "authorized administrator"
administrative user which has been assigned to a privilege level that is permitted to
perform the relevant action; therefore has the appropriate privileges to perform the
requested functions.
2
Note, the term 'authorized administrator' as used in this ST is synonymous with the 'Security
Administrator' referenced in the NDPP.
Usage/Purpose Description for TOE performance
SSHv2 and a key size of 2048 bits or greater may be used.
Yes
The syslog audit server is used for remote storage of audit
records that have been generated by and transmitted from
the TOE.
encrypted within an IPsec tunnel as they leave the TOE.
The syslog server needs to be able of acting as an IPsec
peer or as an IPsec endpoint.
No
The TOE supports communications with an NTP server to
receive clock updates. Any server that supports NTPv1
(RFC 1059), NTPv2 (RFC 1119), or NTP v3 (RFC 1305)
may be used.
10
The TOE would ensure that messages are
2
is used in this ST to refer to any
11 March 2014