ST organization. The Targets of Evaluation are models 600, 1010, 1050, 1100, 1750, 2750, and 5000 of the Nortel VPN Router v7.05 and Client Workstation v7.11. These devices are functionally identical and will hereafter be referred to, collectively, as “the TOE” throughout this document. The TOE is a Virtual Private Network (VPN) Router that ensures end-to-end network security by establishing a fully encrypted and authenticated VPN connection across the Internet between a Nortel VPN Router and either a user’s remote...
Term Explanation Technology Contivity Refers to the marketing name of the Nortel VPN Router. User Types The Primary Admin account has the ability to conduct all administrative privileges and Primary Admin rights of the TOE. The Primary Admin also has the ability to create and assign various rights to additional administrators.
Page 7
Explanation Manage Nortel VPN Router Grants administrative rights to view (monitor) and manage (configure) Nortel VPN Router configuration settings or user rights settings. This is the highest level of administrative privilege. The only permission not granted to this level is access to the Primary Admin password.
IP networks (including the Internet). The Nortel VPN Router and the Nortel VPN Client are the two components that compose the TOE. Figure 1 below shows a typical deployment configuration of the TOE:...
Security Target, Version 3.9 March 18, 2008 mode, a Nortel VPN Router on one Enterprise network segment will establish a VPN tunnel with another Nortel VPN Router on another Enterprise network segment. All communications between the two network segments are protected by the VPN tunnel.
Nortel-hardened version of the VxWorks OS. All non-essential OS processes have been removed and direct access to the OS is impossible. The Nortel VPN Router is produced at seven performance levels (models 600, 1010, 1050, 1100, 1750, 2750, and 5000) which provide identical functionality; they differ only in network throughput and performance.
Page 13
VxWorks OS Contivity Hardware Appliance. Nortel VPN Client Workstation: The Nortel VPN Client software is part of the TOE but the underlying OS and hardware are excluded from the TOE boundary. The TOE’s logical boundary includes all of the TOE Security Functions (TSFs).
Page 14
The architecture of the TOE and of the IPSec protocol ensures that the trusted paths between the Nortel VPN Router and the Nortel VPN Clients are logically distinct and secure.
It is assumed that the TOE has access to all of the Information Technology (IT) System data it needs to perform its functions. A.DOMSEP It is assumed that the IT environment will maintain a security domain for the Nortel VPN software that protects it from interference and tampering by untrusted subjects. 3.2 Threats to Security This section identifies the threats to the IT assets (private networks) against which protection is required by the TOE or by the security environment.
An attacker may successfully intercept and decrypt, then recover and modify the encrypted T. HACK-CRYPTO data that is in transit between the Nortel VPN Router and VPN Client, and/or between two Nortel VPN Routers. An attacker may use malformed IP packets or similar attack methods against the TSF or T.HACK...
The TOE must use the IPSec tunneling protocol to ensure integrity of data transmitted O.INTEGRITY between the Nortel VPN Client and the Nortel VPN Router, and/or between two Nortel VPN Routers. The TOE must filter all incoming and outgoing packets that pass through it, and accept or O.FILTER...
The certificate infrastructure must be properly and securely maintained so that the status of certificates is accurately provided to the TOE. The environment must maintain a security domain for the Nortel VPN Client software that OE.DOMSEP protects it from interference and tampering by untrusted subjects.
Page 28
March 18, 2008 The TSF shall enforce the [VPN Information Flow Control SFP] on [remote authenticated VPN Clients connecting to a Nortel VPN Router] and all operations that cause that information to flow to and from subjects covered by the SFP.
Page 44
TOE administrators interact with the TOE through the management GUI [or CLI], but unprivileged TOE users are restricted to establishing VPN sessions with the TOE via the Nortel VPN Client. All of the user actions (detailed above) performed through either of these interfaces are recorded in the appropriate audit log. The TOE creates an audit record when a TOE user causes any of the events in “Table 4 - Auditable Events”...
The connection attributes configured in the Nortel VPN Router enable the remote user to create a tunnel into the Nortel VPN Router. The actual connection to the Nortel VPN Router is a tunnel that is started from the remote user’s PC, through the public network, and ends at the Nortel VPN Router on the private network. The Nortel VPN Router associates all remote users with a group which dictates the attributes (and privileges) that are assigned to a remote user session.
6.1.4 Identification and Authentication Users of the TOE can access it in three ways: via the Nortel VPN Client, the CLI, or the GUI. Users are processed and authorized by the TOE’s identification and authentication mechanism whenever they access any of these interfaces.
Security Target, Version 3.9 March 18, 2008 functions. The VPN User has no access to administrative functions and may only authenticate to the Nortel VPN Router through the Nortel VPN Client in order to access the private network. These roles determine a user’s level of access to security management functions provided by the TOE. These security management functions include management of all audit and event records, management of access control, and management of VPN and firewall functions.
6.1.7 Trusted Path/Channels Connections from the Nortel VPN Client to the Nortel VPN Router are initiated by the VPN users. IPSec is required to ensure that the communication is via trusted path. Because of this, trusted path connections between components of the TOE are logically distinct, and secure.
Page 50
March 18, 2008 Assurance Assurance Measure Component ALC_DVS.1 Nortel Networks Virtual Private Network Router v7.05 Life Cycle Support ALC_FLR.2 Nortel Networks Virtual Private Network Router v7.05 Life Cycle Support ALC_LCD.1 Nortel Networks Virtual Private Network Router v7.05 Life Cycle Support ALC_TAT.1...
Page 53
O.ADMIN, O.TEST, and OE.TRAINED combined ensure that this threat is removed. T.DATA-MOD An attacker may intercept and alter the data transmitted between the Nortel VPN Client and the Nortel VPN Router, and/or between two Nortel VPN Routers, in order to deceive the intended recipient.
OE.DELIVERY satisfies this assumption. A.DOMSEP It is assumed that the IT environment will maintain a security domain for the Nortel VPN software that protects it from interference and tampering by untrusted subjects. The environment ensures that a security domain for the Nortel VPN Client software that protects it from interference and tampering by untrusted subjects is maintained (OE.DOMSEP).
Page 58
FCS_CKM.4, and FCS_COP.1(a,b,c,d,e,f)]. O.CONFIDENT The TOE must use the IPSec tunneling protocol to ensure confidentiality of data transmitted between the Nortel VPN Client and the Nortel VPN Router, and/or between two Nortel VPN Routers. The TOE is required to use the specified tunneling protocol to better protect the confidentiality of the data transmitted between its different parts.
Page 59
TOE [FMT_SMR.1]. O.INTEGRITY The TOE must use the IPSec tunneling protocol to ensure integrity of data transmitted between the Nortel VPN Client and the Nortel VPN Router, and/or between two Nortel VPN Routers. The TSF is required to enforce the information flow control SFP on connections and all operations that cause information to flow to and from subjects covered by the SFP [FDP_IFC.2(a,b)].
The Configuration Management documentation provides a description of tools used to control the configuration items and how they are used by Nortel. The documentation provides a complete configuration item list and a unique reference for each item. Additionally, the configuration management system is described including procedures that are used by developers to control and track changes that are made to the TOE.
Page 64
The flaw remediation guidance addressed to TOE users is provided. The description also contains the procedures used by Nortel to track all reported security flaws in each release of the TOE. The established life-cycle model to be used in the development and maintenance of the TOE is documented and explanation on why the model is used is also documented.
Need help?
Do you have a question about the VPN Router v7.05 and is the answer not in the manual?
Questions and answers