TopLayerNetworks_IPS5500E
TopLayerNetworks_IPS5500E
Version 1.1
April 10, 2009
Prepared For:
Prepared By:
CygnaCom Solutions
Security Evaluations Laboratory
7925 Jones Branch Drive, Suite 5200
Mclean, VA 22031
Table of Contents
1 INTRODUCTION.............................................................................................................................................. 1
1.1 IDENTIFICATION .......................................................................................................................................... 1
1.2 CC CONFORMANCE CLAIM ......................................................................................................................... 1
1.3 OVERVIEW .................................................................................................................................................. 1
1.4 ORGANIZATION ........................................................................................................................................... 2
1.5 DOCUMENT CONVENTIONS ......................................................................................................................... 2
1.6 DOCUMENT TERMINOLOGY ......................................................................................................................... 3
1.6.1 ST Specific Terminology ........................................................................................................................ 3
1.6.2 Acronyms ............................................................................................................................................... 5
2 TOE DESCRIPTION ........................................................................................................................................ 7
2.1 TOE OVERVIEW .......................................................................................................................................... 7
2.1.1 Categories of Deployment ..................................................................................................................... 8
2.2 ARCHITECTURE DESCRIPTION ................................................................................................................... 12
2.3 PHYSICAL BOUNDARIES ............................................................................................................................ 14
2.3.1 Physical Interfaces .............................................................................................................................. 15
2.3.2 Evaluated Configuration ..................................................................................................................... 19
2.3.3 Security Functionality in the IT Environment ...................................................................................... 20
2.3.4 Management Interfaces ....................................................................................................................... 21
2.4 LOGICAL BOUNDARIES.............................................................................................................................. 21
2.4.1 Security Audit ...................................................................................................................................... 22
2.4.2 User Data Protection ........................................................................................................................... 22
2.4.3 Identification and Authentication ........................................................................................................ 22
2.4.4 Security Management .......................................................................................................................... 22
2.4.5 Protection of TOE Security Functions ................................................................................................. 22
2.4.6 Trusted Path/Channels ........................................................................................................................ 23
2.5 FUNCTIONALITY NOT INCLUDED IN THE TOE SCOPE ................................................................................ 23
3 TOE SECURITY ENVIRONMENT .............................................................................................................. 24
3.1 ASSUMPTIONS ........................................................................................................................................... 24
3.1.1 Usage Assumptions .............................................................................................................................. 24
3.1.2 Personnel Assumptions ........................................................................................................................ 24
3.1.3 Physical Environment Assumptions ..................................................................................................... 24
3.2 THREATS ................................................................................................................................................... 24
3.2.1 Threats Addressed by the TOE ............................................................................................................ 25
3.3 ORGANISATIONAL SECURITY POLICIES ..................................................................................................... 25
4 SECURITY OBJECTIVES ............................................................................................................................. 26
4.1 SECURITY OBJECTIVES FOR THE TOE ...................................................................................................... 26
4.2 SECURITY OBJECTIVES FOR THE ENVIRONMENT ...................................................................................... 27
5 IT SECURITY REQUIREMENTS ................................................................................................................ 29
5.1 TOE SECURITY FUNCTIONAL REQUIREMENTS .......................................................................................... 30
5.1.1 Security Audit (FAU) ........................................................................................................................... 30
5.1.1.1 FAU_GEN.1 Audit data generation ........................................................................................................... 30
5.1.1.2 FAU_GEN.2 User identity association ...................................................................................................... 31
5.1.1.3 FAU_SAA.1 Potential violation analysis ................................................................................................... 31
5.1.1.4 FAU_ARP.1 Security alarms ..................................................................................................................... 32
5.1.1.5 FAU_SAR.1 Audit review ......................................................................................................................... 32
5.1.1.6 FAU_SAR.3 Selectable audit review ......................................................................................................... 33
5.1.1.7 FAU_SEL.1 Selective audit ....................................................................................................................... 33
5.1.1.8 FAU_STG.1 Protected audit trail storage .................................................................................................. 33
8 RATIONALE ................................................................................................................................................... 70
8.1 SECURITY OBJECTIVES RATIONALE .......................................................................................................... 70
8.1.1 Rationale For Threat Coverage ........................................................................................................... 70
8.1.2 Rationale For Organizational Policy Coverage .................................................................................. 73
8.1.3 Rationale For Assumption Coverage ................................................................................................... 73
8.2 SECURITY REQUIREMENTS RATIONALE .................................................................................................... 74
8.2.1 Security Functional Requirements for the TOE ................................................................................... 74
8.2.2 Security Functional Requirements for the IT Environment ................................................................. 77
8.2.3 Explicitly Stated Requirements Rationale ............................................................................................ 78
8.2.4 Rationale for TOE Security Assurance Requirements ......................................................................... 78
8.2.5 Rationale For IT Security Requirement Dependencies ........................................................................ 78
8.3 TOE SUMMARY SPECIFICATION RATIONALE ............................................................................................ 79
8.3.1 Rationale for TOE Security Functions................................................................................................. 79
8.4 RATIONALE FOR STRENGTH OF FUNCTION CLAIM .................................................................................... 81
8.5 PROTECTION PROFILE CLAIMS RATIONALE ............................................................................................... 81
9 REFERENCES ................................................................................................................................................. 82
List of Tables
Table 1-1: ST Organization and Description .................................................................................. 2
Table 2-1 Hardware Models ......................................................................................................... 15
Table 2-2 Port Types ..................................................................................................................... 16
Table 2-3 Port Information ........................................................................................................... 16
Table 2-4 Port Roles ..................................................................................................................... 18
Table 5-1: Security Functional Requirements for the TOE .......................................................... 29
Table 5-2: Auditable Events ......................................................................................................... 30
Table 5-3: Management of security functions behaviour ............................................................. 43
Table 5-4 Management of TSF Data ............................................................................................ 44
Table 5-5: Security Functional Requirements for the IT Environment ........................................ 49
Table 5-6 - Assurance Requirements: EAL4 ................................................................................ 50
Table 6-1: TSF Description .......................................................................................................... 52
Table 6-2 - Assurance Measures & Rationale: EAL4 .................................................................. 65
Table 8-1 -All Threats to Security Countered............................................................................... 70
Table 8-2 - All Objectives for the TOE Met by Functional Requirements for the TOE .............. 74
Table 8-3 - All Objectives for the IT Environment Met by SFRs for IT Environment ................ 77
Table 8-4 – SFR Dependencies..................................................................................................... 78
Table 8-5 – TOE Security Function to SFR Mapping .................................................................. 79
Table 9-1 References .................................................................................................................... 82
List of Figures
Figure 2-1 IPS Unit‘s Security........................................................................................................ 8
Figure 2-2 Network Perimeter Protection ....................................................................................... 8
Figure 2-3 Protection for a Hosting Center..................................................................................... 9
Figure 2-4 Protect Critical Online Assets ..................................................................................... 10
Figure 2-5 High Volume Single Inline with Peer ......................................................................... 11
Figure 2-6 Two Unit Protection Cluster ....................................................................................... 12
1 Introduction
This section identifies the Security Target, Target of Evaluation (TOE), conformance claims, ST
organization, document conventions, and terminology. It also includes an overview of the
evaluated product.
1.1 Identification
TOE Identification: Top Layer Networks IPS 5500 E Version 5.21 software running on an IPS
5500 E series hardware platform.
The IPS 5500 series product line includes the following hardware models:
- IPS 5500-150E,
- IPS 5500-500E and
- IPS 5500-1000E
1.3 Overview
The Top Layer IPS 5500 E is a single-appliance security gateway Intrusion Protection System.
The IPS Unit provides network-level and application-level protection to a network from good,
bad and suspicious traffic. It is a hardware-based, multi-processor system that has an onboard
application level stateful firewall that works in conjunction with the Intrusion Prevention
subsystems to provide security. The IPS 5500 provides a 3-Dimensional approach to secure
networks of interest to:
- Stop Resource Abuse
1
Common Criteria (CC) for Information Technology Security Evaluation – August 2005, Version 2.3, CCMB-
2005-08-001.
1.4 Organization
Table 1-1: ST Organization and Description
This ST indicates which text is affected by each of these operations in the following manner:
Iterations are identified with a number in brackets "(#)" right after the short name.
Assignments and Selections specified by the ST author are in [italicized bold text].
Refinements to the CC text are specified bold and underlined text.
Explicitly Stated TOE Security Functional Requirements are specified with a ―_EXP‖ added
to the component name.
IT Environment Requirements are specified with a ―_ENV‖ added to the component name.
Application notes provide additional information for the reader, but do not specify
requirements. Application notes are denoted by Application Note: italicized text.
CCIMB Interpretations have been reviewed. The original CC text modified by the interpretation
is neither denoted nor explained.
Host Groups (Client and Servers) - A host group is a named set of IP address ranges. A
host group can define a group of clients or a group of servers. A given host group may act
as both clients and servers.
Connection Limits — Limits the number of simultaneous connections allowed for a
group of clients or a group of servers, and for individual members of the group.
Request Limits — Limits the number of requests a client within a host group can make
per minute for specified services.
SYN Flood Limits — Provides limits for the number of incomplete SYN requests for
servers and for various categories of clients (trusted, suspicious, malicious, etc.).
IP Address--Internet Protocol Address, a 32-bit numeric identifier for a computer or a
device on the network. The TOE does not support IPv6 packets.
Segments – A pair of physical ports that handle internal and external network traffic
(mission ports) is called a Segment. When configured to do so, the IPS Unit forwards all
packets received on either of the ports in the pair to the other port in the pair, subject to
the defined security policy filtering
Threat - Capabilities, intentions and attack methods of adversaries, or any circumstance
or event, with the potential to violate the TOE security policy.
Threat Agent - Any human user or Information Technology (IT) product or system,
which may attempt to violate the TSP and perform an unauthorized operation with the
TOE.
TOE Security Function (TSF) Data - Information used by the TSF in making TOE
security policy (TSP) decisions. TSF data may be influenced by users if allowed by the
TSP. Security attributes, authentication data and information flow control policy‘s subject
and object security attributes are examples of TSF data.
Audit Data - The logs generated based on the actions of the TOE itself. This includes the
authentication of users accessing the TOE, actions taken directly on the TOE, and actions
of the TOE itself. Audit data is a type of TSF data.
User - Any entity (human user or external IT entity) outside the TOE that interacts with
the TOE.
User Data - Data created by external IT entities that does not affect the operation of the
TSP. User data is separate from the TSF data. The information flows created by Clients
and Servers is an example of user Data.
VPN-Virtual Private Network, a network constructed using public wires to connect
nodes. For example, there are a number of systems that enable the administrator to create
networks using the Internet as the medium for transporting data; these systems use
encryption and other security mechanisms to ensure that only authorized users can access
the network and that the data cannot be intercepted
Vulnerability - A weakness that can be exploited to violate the TOE security policy.
Protocol Validation - Examining the payload of application datagrams and application
streams for specific network protocols (DNS, FTP, HTTP, MSNET, SIP, SSH and
Telnet) to ensure that the traffic conforms to the rules for a given protocol as well as the
IPS Unit‘s rules for reasonable usage. The protocol validation rules are specific to the
Top Layer IPS. These rules enable configuration of protocol specific parameters for
application protocols to stop attackers who abuse weaknesses in a protocol‘s defined
structure.
1.6.2 Acronyms
The acronyms used within this Security Target:
Table 1-2 Acronyms
Acronym Definition
ACM Configuration Management
ADO Delivery and Operation
ADV Development
AGD Guidance Documents
ALC Life cycle support
ASIC Application-Specific Integrated Circuit
ATE Tests
AVA Vulnerability assessment
CC Common Criteria [for IT Security Evaluation]
CIFS Common Internet File System
DNS Domain Name System
EAL Evaluation Assurance Level
FAU Security Audit
FDP User Data Protection
FIA Identification and Authentication
FMT Security Management
FPT Protection of the TSF
FTP Trusted Path/Channels
Acronym Definition
GUI Graphical User Interface
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol over SSL
ICMP Internet Control Message Protocol
ID Identifier
IP Internet Protocol
IPS Intrusion Protection System
IT Information Technology
LAN Local Area Network
MAC Media Access Control
MSNET Microsoft NETworks
NIC Network Interface Card
OS Operating System
SF Security Function
SIP Session Initiation Protocol
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SFP Security Function Policy
SSH Secure Shell
SSL Secure Socket Layer
ST Security Target
TCP Transmission Control Protocol
TOE Target of Evaluation
TSC TSF Scope of Control
TSF TOE Security Functions
TSFI TOE Security Functions Interface
TSP TOE Security Policy
TSS TOE Summary Specification
UDP User Datagram Protocol
VPN Virtual Private Network
2 TOE Description
2.1 TOE Overview
The TOE is an IPS 5500 E Hardware appliance with Version 5.21 software. The IPS Unit is
managed using a Graphical User Interface (GUI), which is a Java Web Start™ application that
runs as a stand-alone application on the Management Station. The Java Web Start application is
also included in the TOE. The TOE acts as an inline single-appliance security gateway providing
three-dimensional protection to stop resource abuse prohibit access to unauthorized clients and
stop malicious content from entering the protected network. Top Layer‘s s ASIC technology and
algorithms integrate stateful analysis techniques with deep packet inspection chip set and DoS
(Denial of Service) attack protection to provide protection from Internet-based and internal
threats. The difference between the TOE and a typical IDS is that the TOE (IPS Unit) is
deployed inline and not in an offline or a passive mode.
The primary design goal of the TOE is reliable protection of the customer‘s critical on-line
assets. The IPS aspect of the TOE security policy may be configured based on the following
three types of rules. The rules guide the following types of security checks:
Firewall Rules — Provide classic firewall blocking for traffic, based on IP addresses,
Layer 4 ports, and segments (port pairs).
IPS Rules — Provide the following types of checks:
• Protocol validation
• Attack Signatures
• Acceptable use of network application
Rate Based Rules — Protect resources from overuse by legitimate users, as well as
abusive denial-of-service attackers. Provide limits for:
• Client requests
• Connections for both clients and servers
• SYN Flood controls
• Application rate limiting
To install and deploy the TOE in a secure evaluated configuration please see section 2.3.2
Evaluated Configuration. Also, please see section 2.3.3 Security Functionality in the IT
Environment for a description of the security functionality provided by the IT Environment.
The IPS Unit can be deployed in the following ways in a prospective customer‘s network:
ProtectionCluster Configuration
Provides active redundancy to the current configuration. ProtectionCluster refers to a network
configuration option that provides higher bandwidth and redundancy. This configuration
connects multiple IPS Units together using a special pair of GbE links. These links, called R1
and R2, provide higher bandwidth for flow rebalancing in redundant configurations. A
ProtectionCluster configuration also enables the IPS Units to share the intense processing
required for deep and stateful protocol analysis necessary to detect attempted exploits
of application-level vulnerabilities in both server and client groups. In this configuration, both
sides of the configuration receive and pass the network traffic, unless there is a failure. This
solution provides a redundant solution that offers maximum protection of the network resources.
This solution, using a combination of IPS Units, protects up to two full duplex Gigabit input
ports: stopping the "bad" traffic, while permitting the ―good‖ traffic to pass to its destination.
The TOE uses a packet inspection chip set to provide application-level protection against
exploits of critical vulnerabilities, including worms and application-level attacks.
- L2 Filters
- DDos Filters
- Resource Limit Filters
- Stateful Analysis
- Firewall Filters
- Protocol Validation
- Content Inspection
Each subsystem performs a set of specific checks.
These specific checks, or rules, and their associated actions, make up the subsystem‘s security
policy. The IPS unit organizes the subsystems in a particular order so that traffic that is filtered
by an earlier subsystem is never seen by the later subsystems. The various subsystems work
together to provide the three-dimensional security protection
The figure below depicts the TOE as a device with multiple stages of security filtering performed
by the subsystems mentioned above.
Please see the table below for more details on the hardware models:
Table 2-1 Hardware Models
Ports NIC Chipsets Used
Model CPU Memory Power Supply
Each hardware model has 12 physical ports numbered 1 to 12 and two high availability ports
numbered R1 and R2. Most of the ports on the IPS Unit can have several possible roles. A port
can only be configured for one role at any given time and some ports have fixed roles.
In addition to port roles, the IPS unit supports the concept of Mission, Management, and
Maintenance ports to further classify ports based on their role type.
Mission ports are ports that handle internal and external network traffic. Two matched ports, one
with the role Internal and another port with the role External, are known as a Mission port-pair.
Management ports on the IPS unit are ports used to manage the IPS unit itself. By default, Port 8
on the IPS Unit is always configured to be a Management access port. All configured
Management ports are bridged together and flooding occurs between these ports. An internal
bridge logically connects Management ports. Packets received on Management ports are bridged
to other Management ports. Packets received on Mission ports can be bridged to other Mission
ports, but will never be forwarded to any Management port or to the management entity (e.g.
management station).
Maintenance ports are ports on the IPS unit that are used to manage events and mirror traffic on
the IPS unit. These ports can have the role of Capture, Mirror, or Discard. Traffic on
maintenance ports is handled using the Management Bridge.
The IPS Unit uses these roles and port types to determine how traffic passes through the IPS
Unit. The table below presents details of Roles, Port Types and traffic isolation.
The table below presents details of each port speed, possible roles, and the default role for each
Port on the hardware models. Please note that the Port # in the first column in the table below
represents the physical port number and not the number of ports.
Default Role
Port Possible IPS 5500-150
Speed
# Roles IPS 5500-500
IPS 5500-1000
Unused
4 10/100 Internal, Discard
Mirror,
Capture,
Discard,
Unused
5 10/100 Management, Unused
Mirror,
Capture,
Discard,
Unused
6 10/100 Management, Unused
Mirror,
Capture,
Discard,
Unused
7 10/100 Management, Unused
Capture,
Discard,
Unused
8 10/100 Management Management
9 1000 External External
Unused
10 1000 Internal Internal
Unused
11 1000 External, Unused
Capture,
Unused
12 1000 Internal, Unused
Capture,
Unused
R1 1000 HA HA
R2 1000 HA HA
The following table explains the port roles. Please note that the # of Ports in the second column
represents the number of ports, not the physical port number.
Management 1,2,3,or 4 10/100 Use a port with the port role Management to manage
the IPS Unit and as an output port for reporting traffic
(using standard Syslog and SNMP traps).
Mirror 0,1,2,3,4,5, 10/100 Identify one or more Mirror ports to create a mirror
or 6 (copy) group. The IPS Unit copies all packets from
specific traffic applications to the ports in the mirror
group. It uses the Round Robin algorithm to balance
traffic among the Mirror ports.
All ports in the mirror group must be set to the same
speed.
No packets are received on a port with this role.
Discard 0 or 1 10/100 Use a port with the role Discard to send the dropped
packets that caused events to a collecting system in
the environment. Configure which packets go through
the Discard port to the collecting system in the
environment by configuring Policies
Capture 0 or 1 10/100/1000 Use a port with the role Capture as a single, mirroring
output port. One of the Mission ports can be chosen
to have all of its received and transmitted packets
mirrored to this port.
External 1,2,3, or 4 10/100/1000 Use a port with the role External to connect to the
(Outside) external network. The External port does not allow
management access. The External port receives
packets and forwards them (subject to policy checks)
to its paired Internal port (known as Port-pair
forwarding mode),
Internal 1,2,3, or 4 10/100/1000 Use a port with the role Internal to connect to the
(Inside) internal network. The Internal port does not allow
management access. The Internal port receives
packets and, either forwards them (subject to policy
checks) to its paired External port (known as Port-pair
forwarding mode), or bridges them according to their
destination MAC addresses.
High 0,1, or 2 1000 Use a port with the role High Availability (HA) as a
Availability Gigabit port that is directly connected to a redundant
IPS Unit. The HA port is used to balance traffic
between redundant IPS Units.
Unused Not 10/100/1000 A port with the role Unused is a port that is not
Applicable configured. The Unused port does not accept traffic
nor send any traffic. The IPS Unit will not recognize a
link to this port.
The IPS Unit is managed using a Graphical User Interface (GUI), which is a Java Web Start™
application that runs as a stand-alone application on the Management Station. The Java Web
Start application is also included in the TOE.
In addition to the evaluated configuration shown above where a single IPS unit is used between
networks, an additional configuration which includes two IPS units was used to test the
Protection Cluster capability. This configuration ensures that if the IPS unit fails or is taken off-
line, the second IPS unit takes the entire load, ensuring continued network operation.
Figure below depicts the TOE in the evaluated configuration with two IPS units.
Note: Customers who install only one IPS box (i.e., operating in the ―single IPS box‖ mode of
operation as shown in Figure 2-8 Evaluated Configuration) are also in the evaluated
configuration.
The TOE depends on the IT Environment for the following security functions:
- Web browser – Used to access TOE administrative interfaces and displays alerts, reports,
statistics, diagnostics and security logs
- SMTP, SNMP, Syslog servers – Used to receive audit events generated by the TOE
- NTP server – Used to set TOE hardware clock
The external IT entities send and receive network traffic through the TOE. Packet Capture
Systems receive packets from Capture, Discard and Mirror Ports.
Serial Console — The CONSOLE port on the front of the IPS Unit provides access to a limited
Command Line Interface that can be used to perform basic setup.
Command Line Interface over Telnet —An extended CLI can be accessed using a Telnet
session. The CLI provides access to nearly all the IPS Unit‘s configuration and management
commands.
Graphical User Interface Access using HTTP and HTTPS — The Graphical User Interface
(GUI) runs as a Java Web Start™ program over the World Wide Web. The GUI provides
interface windows for configuring and managing the IPS Unit and provides access to context
sensitive online help. The Java Web Start™ application, which communicates with the TOE to
manage the TOE, is also included in the TOE. The application is loaded from the IPS 5500 E
onto the client host and allows the administrator to affect the IPS 5500 E configuration and load
audit information off the IPS 5500 E.
SNMP — The IPS Unit‘s Simple Network Management Protocol interface provides read-only
access to many of the IPS Unit‘s settings.
IPS Controller — The IPS Controller is a separate product from Top Layer that allows for
central management of multiple IPS Units.
All of the management interfaces described above, except the serial console, can be used to
manage the TOE through a network interface port with management role.
In the evaluated configuration, management of the TOE, apart from the basic setup using the
serial console, is done using the Graphical User Interface (GUI), which connects to the TOE over
HTTPS.
See the corresponding section in the TSS for more detailed information.
See the corresponding section in the TSS for more detailed information.
See the corresponding section in the TSS for more detailed information.
See the corresponding section in the TSS for more detailed information.
The TOE restricts management access to its interfaces by requiring users to log into the TOE
using its GUI. HTTPS is used to protect the connection between the web browser in the IT
Environment and the appliance. The TOE relies on Top Layer appliance hardware to ensure the
TSP is enforced and to provide for domain separation. The TOE hardware appliance includes its
own hardware clock, which provides reliable time stamps for use in audit and collected data
records.
See the corresponding section in the TSS for more detailed information
See the corresponding section in the TSS for more detailed information.
- VLAN Support
- Management of the IPS with an IPS Controller, Command Line Interface over Telnet
and SNMP (Get function)
- Usage of the TOE with other Top Layer supporting products (Network Security
Analyzer, IPS Controller, TopResponse Software)
- Note: The functionality/protocol used by the TopResponse product to automatically
update signatures is included in the scope of the evaluation. The TSFI for this
functionality is included in the scope of the evaluation, documented in the FSP and is
verified during testing. Hence the capability of the TOE to download latest set of
“TopLayer Protection Packs” is included in the Scope of the evaluation.
- Usage of Graphs, Reports and Statistics
3.1 Assumptions
The assumptions are ordered into three categories: usage assumptions, personnel assumptions
and physical environment assumptions.
3.2 Threats
The TOE addresses the threats identified in this section. The threat agents are authorized
persons/processes, unauthorized persons/processes, or external IT entities not authorized to use
the TOE itself. The threats identified assume that the threat agent is a person with a low attack
potential who possesses an average expertise, few resources, and low to moderate motivation.
The assumed level of expertise of the attacker is unsophisticated, with access to only standard
equipment and public information about the product.
T.UNDESIREDACCESS
An External IT Entity may send impermissible information through the TOE,
which results in the exploitation of resources.
T.CONTENTBASED
An External IT Entity may attack or tamper resources by sending information
flows through the TOE, which contain malicious data or malicious inclusion of
payloads that is otherwise well formed
4 Security Objectives
This chapter describes the security objectives for the TOE and the TOE‘s operating environment.
The security objectives are divided between TOE Security Objectives (i.e., security objectives
addressed directly by the TOE) and Security Objectives for the Operating Environment (i.e.,
security objectives addressed by the IT domain or by non-technical or procedural means).
The TOE must filter the content in the information flows through the TOE to
prevent malicious intruders from exploiting system vulnerabilities or network
based protocol weaknesses, as well as more direct attacks through e-mail based
worms and viruses.
O.TIME The TOE must provide a reliable clock to maintain the system time.
O.TRANSMISSION
The TOE must provide a HTTPS session for communication between the User
Management GUI on the Management Station and the TOE.
Application Note: A Management Station is a workstation on the management network that the
TOE administrator uses to access the TOE using an HTTPS enabled web browser. There can
be one or more Management stations.
ON.PHYSICAL Those responsible for the TOE must ensure that the TOE hardware and software
critical to security policy enforcement will be protected from unauthorized
physical modification and the processing resources of the TOE will be located
within controlled access facilities, which will prevent unauthorized physical
access.
5 IT Security Requirements
The security requirements that are levied on the TOE are specified in this section of the ST. This
ST does not define any security functional requirements to be levied on the IT environment. The
security requirements levied on the TOE are defined in Sections 5.1 - 5.2.
Table 5-1: Security Functional Requirements for the TOE
Item SFR ID SFR Title
1 FAU_GEN.1 Audit data generation
2 FAU_GEN.2 User identity association
3 FAU_SAA.1 Potential violation analysis
4 FAU_ARP.1 Security alarms
5 FAU_SAR.1 Audit review
6 FAU_SAR.3 Selectable Audit Review
7 FAU_SEL.1 Selective Audit
8 FAU_STG.1 Protected Audit Trail Storage
9 FDP_IFC.1(1) Subset information flow control (1)
10 FDP_IFF.1(1) Simple security attributes (1)
11 FDP_IFC.1(2) Subset information flow control (2)
12 FDP_IFF.1(2) Simple security attributes (2)
13 FIA_AFL.1 Authentication failure handling
14 FIA_ATD.1 User attribute definition
15 FIA_UAU.1 Timing of Authentication
16 FIA_UAU.7 Protected authentication feedback
17 FIA_UID.2 User identification before any action
18 FMT_MOF.1 Management of security functions behaviour
19 FMT_MSA.3 Static attribute initialisation
20 FMT_MSA.1 Management of security attributes
21 FMT_SMF.1 Specification of Management Functions
22 FMT_MTD.1 Management of TSF data
23 FMT_SMR.1 Security roles
24 FPT_TST.1 TSF Self-Testing
25 FPT_FLS.1 Failure with preservation of secure state
26 FPT_RVM_EXP.1 Partial Non-bypassability of the TSP
27 FPT_SEP_EXP.1 Partial TSF domain separation
28 FPT_STM_EXP.1 Reliable time stamps
29 FTP_TRP.1 Trusted Path
FAU_GEN.1.2 The TSF shall record within each audit record at least the following information:
a) Date and time of the event, type of event, subject identity, and the outcome (success or
failure) of the event; and
b) For each audit event type, based on the auditable event definitions of the functional
components included in the PP/ST, [information specified in table below ]
Dependencies: FPT_STM.1 Reliable time stamps
FMT_MTD.1 All modifications to the TSF data Modified TSF data – values
before modification and after
modification
FPT_TRP.1 Failures of the trusted path functions.
FAU_SAA.1.2 The TSF shall enforce the following rules for monitoring audited events:
a) Accumulation or combination of [
All Hardware and Software failures detected by the TSF
IPS Unit operational events crossing Event Thresholds
Other rules for the events defined in FAU_GEN.1, added by an authorized
administrator
] known to indicate a potential security violation
b) [none]
Dependencies: FAU_GEN.1 Audit data generation
FAU_SAR.1.2 The TSF shall provide the audit records in a manner suitable for the user to
interpret the information.
Dependencies: FAU_GEN.1 Audit data generation
Application Note: Only Audit data that resides on the TOE can be reviewed by Administrators
and Monitors. Audit data collected by Syslog servers and SNMP servers can not be reviewed
b) [
FAU_STG.1.1 The TSF shall protect the stored records from unauthorized deletion.
FAU_STG.1.2 The TSF shall be able to [ prevent ] unauthorized modifications to the audit
records in the audit trail.
Dependencies: FAU_GEN.1 Audit data generation
Application Note: Audit data resides on the TOE hardware appliance and can only be accessed
using the management GUI. The TOE does not allow unauthorized modifications to the audit
data residing on it through any of its management GUIs. The management GUI does not
provide an option for administrators and monitors to delete audit data. The TOE automatically
deletes old audit data when audit storage is exhausted.
Client ( IP address)
Client Group ( IP address range of a group of Clients)
Server (IP address)
Server Group ( IP address range of Server Group)
Service requested by each Client
Request Limit
Connection Limit
SYN flood Limit
]
FDP_IFF.1.2 The TSF shall permit an information flow between a controlled subject
and another controlled subject via a controlled operation if the following rules hold:
[
All the three rules (a), (b) and (c) must be satisfied:
].
FDP_IFF.1.5 The TSF shall explicitly authorize an information flow based on the
following rules:
[ unidirectional information flow where the source is the TOE ].
FDP_IFF.1.6 The TSF shall explicitly deny an information flow based on the following rules:
[
None
]
Dependencies: FDP_IFC.1 Subset information flow control
FMT_MSA.3 Static attribute initialisation
a) Information :
b) Operation :
Pass information
]
[
a) Subject security attributes:
Source Subjects: set of source subject IP addresses;
]
FDP_IFF.1.2 The TSF shall permit an information flow between a controlled subject and
another controlled subject via a controlled operation if the following rules hold:
[
a) The Firewall Traffic Treatment information security attribute values are
unambiguously permitted by the information flow rules configured by the
administrator
The rules are based on the following types of IPS traffic treatment checks:
IP:
- IP option value
ICMP:
- Max Ping Length, Max ICMP Length, ICMP Rate
TCP:
- All non-SYN packets must be part of an established connection
DNS:
- DNS Protocol Settings
FTP:
- FTP authentication settings
- FTP command setting
- FTP Path Settings
HTTP:
- HTTP Start Line Length
- HTTP Request Settings
- HTTP Method Settings
- HTTP URI Settings
- HTTP Header Length settings
- HTTP Host Filter name
-
MSNET (RPC and CIFS)
- CIFS Settings ( Protocol Version, Length of Account name)
- RPC Services (UUID, Stub length)
SSH
- SSH Protocol Version
- Client Message Length
- SSH Plain text message length
SMTP
- SMTP Command
- Attachment
Telnet
- Environment Variables
- Telnet Options
- Telnet User Account name
Attack Signatures:
- ASCII printable character strings
- Sequence of binary bytes
]
Application Note: The IPS Unit records critical information about each packet in a flow record
stored in its Flow Table, an internal memory structure. Recording this information enables the
IPS Unit to statefully inspect each packet and to reorder packets for proper analysis. At the start
of each transaction, the IPS Unit creates or "sets up" the appropriate Flow Table entries. The
IPS Unit checks these entries when it receives subsequent packets of that transaction.
Block IP Fragments
Copy the associated traffic of an information flow to the ports in the mirror group.
Bypass the application of the information policy rule set during System Reset of
the TOE (Bypass During System Reset Mode)
Application notes:
IP Fragments:
When an incoming network packet is too large for the network equipment to handle, the
following may occur:
The packet can be fragmented and sent on to its destination within the network.
An ICMP error indication (MTU Exceeded) can be returned to the source and the source
can then send the information as smaller packets.
Because fragments are often used as sources of attacks, it is preferable to block fragments for
all applications. Instead of allowing fragments (since most networks support Path Max
Transmission Unit Discovery [MTU discovery]), send the packet back to the source for
repackaging. If an application must use fragments, it can be configured as an exception.
Mid-flows:
Many types of attacks use common scanning techniques, which create incomplete TCP
connections to locate vulnerabilities. Examples of such attacks include the FIN ACK Sweep,
Xmas Tree, and Null scans. The IPS Unit watches for proper TCP connection setup and tear-
down processes and when it identifies incomplete TCP connections, it categorizes this traffic as
mid-session (midflow) traffic. When configured, , the IPS Unit drops midflows, and, therefore,
prevents attacks that use incomplete TCP connections. If the IPS Unit is configured to drop
traffic when it does not detect a proper session setup, in most cases, the dropped traffic simply
causes the clients to retry the connection, often without any noticeable effect on end users.
Top Layer strongly recommends that the customer implement a security policy to drop TCP mid-
session traffic. Failing to do so can allow attacks to circumvent the mitigation features of the IPS
Unit.
Mirror Flow:
The mirror group uses the Round Robin algorithm to balance traffic among the Mirror ports.
The IPS Unit starts out performing in Never Bypass mode, checking and mitigating all
traffic, but performs in Always Bypass mode (passes all traffic) if there is a software failure
and the IPS Unit needs to reboot. Once the IPS Unit resumes normal operation, it returns to full
mitigation behavior. Bypass during System Reset mode is useful once the customer has
completed testing the IPS Unit and wants to mitigate traffic, but also wants to pass unchecked
traffic during a software failure rather than block unchecked traffic.
FDP_IFF.1.5 The TSF shall explicitly authorize an information flow based on the following rules:
[ unidirectional information flow where the source is the TOE ]
FDP_IFF.1.6 The TSF shall explicitly deny an information flow based on the following
Rules:
[
The rules described in FDP_IFF.1.2 do not exist.
]
Dependencies: FDP_IFC.1 Subset information flow control
FMT_MSA.3 Static attribute initialisation
FIA_UAU.7.1 The TSF shall provide only [ user ID, “*” for each password character
provided, success or deny message ] to the administrator while the authentication is in
progress.
FMT_MOF.1.1 The TSF shall restrict the ability to [ behaviour specified in table below ] the
functions [specified in table below ] to [ specified in table below ].
Reboot
Enable Administrator
Auditing
determine the behaviour of Monitor
Identification and
Authentication
Administrator/
Security Function Operation TSF data
Monitor
Security Audit View and Configure Security Logs and Administrator
Report settings
View Security Logs and Monitor
Report settings
Identification and Create, Modify and Users with User Administrator
Authentication Delete attributes defined in
FIA_ATD.1
View Users with User Monitor
attributes defined in
FIA_ATD.1 except
password
View, Modify Global User account Administrator
Security Settings:
Password Length,
Allowed Characters,
Expiration time
frame, History
Depth, Number of
allowed
unsuccessful login
attempts
View Global User account Monitor
Security Settings
View, Unlock Locked accounts Administrator
View Locked accounts Monitor
Security Configure HTTP Service, Administrator
Management HTTPS Service,
SNMP,
Telnet Service,
IPS Controller
View HTTP Service, Monitor
HTTPS Service,
SNMP,
Telnet Service,
IPS Controller
View and Configure Rate Based Security Administrator
Policy
View Rate Based Security Monitor
Policy
View and Configure FW + IPS Security Administrator
Policy
View FW + IPS Security Monitor
Policy
View, Configure Port Settings Administrator
View Port Settings Monitor
View, Configure Time Settings Administrator
Time Zone Settings
Administrator/
Security Function Operation TSF data
Monitor
View Monitor
Time Settings
Time Zone Settings
Application Note: Any logged on user will have at a minimum the Monitor Role privileges and
can perform all the Monitor functions.
]
Dependencies: ADV_SPM.1 Informal TOE security policy model
Application Note:
Secure State for this product is defined as the state when the TOE (IPS Unit) inspects all traffic,
mitigates problem traffic, and records all information. All traffic flows through the IPS Unit’s
functions. If power fails, the IPS Unit acts as an open wire and does not forward any traffic. This
provides the most protection and ensures that, in case of failure, unchecked traffic will not pass.
This state is also known as “Fail Close” in firewall terminology (closes the door to all traffic).
The IPS Unit can support dual power supplies and will continue to function when its primary
power supply fails. However, the IPS Unit does not pass traffic if there is a failure of all power
to the unit, or other hardware-based failure.
Dependencies: No dependencies
Dependencies: No dependencies
FAU_STG_ENV.1.1 The remote log servers in the IT Environment shall protect the stored audit
records from unauthorized deletion.
FAU_STG_ENV.1.2 The remote log servers in the IT Environment shall be able to prevent
unauthorized modifications to stored audit records.
Sub- Sub-function
TSF function description SFR
SM-3 Management of security FMT_MSA.1
attributes
SM-4 Specification of FMT_SMF.1
Management Functions
each log, however, are kept on the IPS allowing for some degree of history and storage of audit
information locally. These three versions of a log file are identified as the Latest File,
<logtype>.LOG and <logtype>1.LO1, etc., where <logtype> is AUDIT, EVENT, and ALERT
for Administrative Events, System Events, and Alert Events respectively.
For all logs, the Detail section of the log message can be searched using the System Log Viewer
Search feature, which is present on the View Log File screen. This feature allows an
administrator to drill down into a selective view.
Auditing Administrative Events
Administrative Events can be audited by using the System Log Viewer to view, sort, or search
the Audit logs. Using the IPS GUI, navigate to Monitor System ->System Log Viewer. In the
View Log File dialog box, select the Log Type of Audit Log and then select the version of the
Audit log to be viewed.
All Audit logs can be sorted by Day, Time, Event ID, Device, Action, User, Table, or Details.
The Event ID is a Top Layer assigned Event ID associated with the Administrative
Event.
The User is the user that performed the action logged.
The Action is ADD, DELETE, POWER_ON, or UPDATE.
The Table is the MDB database table that was modified by the user.
The Details contain details about the actual modification that took place.
sorting of Audit data can be based on Severity, IP address of the IT identity, Protocol, Rule
Name, Date and Time, Physical port that received this traffic and Type of event.
Rules also have "treatments" associated with them that tell the IPS Unit what should happen
when a rule is triggered. Treatments include the action the IPS Unit should apply to the
traffic that triggers the rule (allow, drop, reject), and the type of logging that should be
performed. An administrator can modify the treatments for individual rules in these two sets. For
IPS rules, there are multiple copies of the IPS rules, called "rule sets," and new copies can be
created. An administrator can configure the treatment for the same rule differently in different
rule sets.
- Protocol validation
- Attack Signatures
- Acceptable use of network application
The figure below shows how the subsystem policies together make up the overall FW + IPS
security policy that the IPS Unit follows when deciding how to handle the network traffic.
The IPS Unit‘s Security system is partitioned into logical subsystems to perform various security
checks. Each subsystem performs a set of specific checks. These specific checks, or rules, and
their associated actions, make up the subsystem‘s security policy. The IPS Unit organizes the
subsystems in a particular order so that traffic that is filtered by an earlier subsystem is never
seen by the later subsystems.
L2 Filters Subsystem:
Focuses on the MAC headers of network packets. Some of the checks look for malformed or
abused fields in the MAC headers.
The IPS Unit records information about each packet in a flow record stored in its Flow Table
(connection table), an internal memory structure. Recording this information enables the IPS
Unit to statefully inspect each packet and to reorder packets for proper analysis. At the start of
each transaction, the IPS Unit creates or "sets up" the appropriate Flow Table entries. The IPS
Unit checks these entries when it receives subsequent packets of that transaction. This subsystem
provides this information to other subsystems of the IPS Unit.
The IPS Unit provides several management services. For added security, the following services
can be enabled and disabled:
HTTP or HTTPS – The IPS Unit provides persistent management sessions using HTTP (port
80) or HTTPS (port 443) allowing full management access through the firewall. The Graphical
User Interface is not dependant on a Web browser. Instead, it uses the Java Web Start technology
to provide a self-updating application that operates over the Web. The GUI is a Java WebStart
application, downloaded from the IPS 5500 E as a set of jar files and cached by the Java
WebStart application on the client host machine. After that, the GUI runs in a Java sandbox on
the client host. Before accessing any of the IPS 5500 E functionality, the GUI must be
authenticated by the IPS 5500 E. There is no authentication information in the IPS 5500 E GUI
code and the authentication relies on authentication over HTTP(S).
Using the Management Port Control window, an authorized administrator can allow, deny, or
restrict access to each management form. The Telnet Session and HTTP are disabled in the
evaluated configuration.
The IPS Unit creates a management session whenever a successfully authenticated user connects
to the IPS Unit. The session continues until the user ends the session or there is a network
disruption that causes the session to time out. Any given user can have multiple simultaneous
management sessions over any management service. The CONSOLE port supports only one
management session.
The TSF maintains and reports all relevant information for each management session, which
includes:
User name
Session privileges
Login time (start of session)
Management access method (HTTP, HTTPS, Telnet, Console, etc.)
IP address of user
MAC address of user
Unique session ID
Logout time (end of session)
In addition to the Management session information, the TSF uses the following user account
information to grant or deny access to a particular security function:
The TOE resides as a network perimeter device thus physically separating the external networks
from the protected networks. IPS Unit determines the list of ports to which the packet may be
forwarded. The IPS Unit never forwards a packet to the port on which the packet arrived.
The TSF creates a management session whenever a successfully authenticated user connects to
the IPS Unit. The session continues until the user ends the session or the session times out. The
IPS Unit enforces the concept of isolated management traffic. It does this by separating traffic
using two logical bridges, the Mission Bridge and the Management Bridge. Each bridge is a
logical device within the IPS Unit that enables traffic to flow between its source and destination.
The IPS Unit can bridge management traffic from one management port to another management
port, but does not forward management traffic to any other IPS Unit port, nor does it forward
non-management traffic to any management port. Separate bridges also help avoid the problem
of the IPS Unit itself being attacked by external entities. Packets received on Management ports
are bridged to other Management ports or terminated to the Management entity (if destined to the
management entity‘s IP address). Packets received on Mission ports can be bridged to another
Mission port, but will never be forwarded to any Management port or to the management entity.
The GUI software on the Management Station is a software only TOE component. It relies upon
the protection mechanisms of the underlying operating system platform to protect itself against
untrusted subjects tampering with TSF code or data through OS interfaces. The GUI is designed
to ensure that TSF policies are enforced when accessed through its own interfaces.
8 Rationale
This Security Target does not claim conformance to any Protection Profiles.
Sub- Sub-function
SFR TSF function description
FAU_GEN.1 Security Audit AU-1 Audit data
generation
FAU_GEN.2 AU-2 User identity
association
FAU_SAA.1 AU-3 Potential
violation analysis
FAU_ARP.1 AU-4 Security alarms
FAU_SAR.1 AU-5 Audit review
FAU_SAR.3 AU-6 Selectable Audit
Review
FAU_SEL.1 AU-7 Selective Audit
FAU_STG.1 AU-8 Protected Audit
Trail Storage
FDP_IFC.1(1) User Data IFC-1 Rate Based
Protection information flow
control
FDP_IFF.1(1)
FDP_IFC.1(2) IFC-2 Intrusion
FDP_IFF.1(2) Prevention
FIA_AFL.1 Identification IA-1 Authentication
and failure handling
Authentication
FIA_ATD.1 IA-2 User attribute
definition
FIA_UAU.1 IA-3 Timing of
Authentication
FIA_UAU.7 IA-4 Protected
authentication
feedback
FIA_UID.2 IA-5 User
identification
before any action
FMT_MOF.1 Security SM-1 Management of
FMT_MSA.3 Management security
functions
behaviour
Sub- Sub-function
SFR TSF function description
SM-5 Management of
TSF Data
FMT_SMR.1 SM-6 Security roles
FPT_TST.1 Protection of SP-1 TSF self testing
FPT_FLS.1 TSF SP-2 Failure with
preservation of
secure state
FPT_RVM_EXP. SP-3 Partial Non-
1 bypassability of
the TSP
FPT_SEP_EXP.1 SP-4 Partial TSF
domain
separation
FPT_STM_EXP.1 SP-5 Reliable time
stamps
FTP_TRP.1 Trusted TC-1 Trusted Path
Path/Channels
9 References
This section contains descriptions of documents pertaining to this ST and or subject TOE.
Table 9-1 References
Document Title ID
Common Criteria for Information Technology Security Evaluation, CCMB-2005-08-002, [CC]
Version 2.3, August 2005.
IPS 5500 E-Series: Functional Specification For Common Criteria EAL4 Evaluation Version [FSP]
1.2
IPS 5500 E-Series:High Level Design Low Level Design For Common Criteria EAL4 [HLD]
Evaluation Version 1.6
IPS 5500 E-Series:High Level Design Low Level Design For Common Criteria EAL4 [LLD]
Evaluation Version 1.6
Source Code Implementation [IMP]
IPS 5500 E-Series:High Level Design Low Level Design For Common Criteria EAL4 [RCR]
Evaluation Version 1.6
Top Layer Networks IPS 5500 E Security Target, Version 1.1 [SPM]
IPS 5500 E Configuration and Management Guide Part number 990-0188-09 [AGD]
IPS Hardware Installation Guide Part Number 990-0183-07
IPS 5500 E-Series: Configuration Management For Common Criteria EAL4 Evaluation Version [ACM]
0.8
IPS 5500 E-Series: Delivery and Modification Detection For Common Criteria EAL4 [ADO]
Evaluation Version 0.7
IPS 5500 E-Series: Development Security Procedures For Common Criteria EAL4 Evaluation [DVS]
Version 0.6
IPS 5500 E-Series: Developer Life Cycle Model For Common Criteria EAL4 Evaluation [LCD]
Version 0.6
IPS 5500 E-Series: Development Tools For Common Criteria EAL4 Evaluation Version 0.2 [TAT]
IPS 5500 E-Series: Test Coverage (ATE_COV.2) And Depth of Coverage (ATE_DPT.1) For [COV]
Common Criteria EAL4 Evaluation Version 0.7
IPS 5500 E-Series: Test Coverage (ATE_COV.2) And Depth of Coverage (ATE_DPT.1) For [DPT]
Common Criteria EAL4 Evaluation Version 0.7
IPS 5500 E-Series: Test Plan For Common Criteria EAL4 Evaluation Version 1.0 [FUN]
IPS 5500 E-Series: Common Criteria Analysis Guidance For Common Criteria EAL4 [MSU]
Evaluation Version 0.4
IPS 5500 E-Series: Strength of Function For Common Criteria EAL4 Evaluation Version 0.2 [SOF]
IPS 5500 E-Series: Vulnerability Analysis For Common Criteria EAL4 Evaluation Version 0.5 [VLA]