Brocade Communications Systems NetIron CER Series Manual Page 38

  • Download
  • Add to my manuals
  • Print
  • Page
    / 56
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 37
Version 1.1, 03/31/2015
GSS CCT Evaluation Technical Report Page 38 of 56 © 2015 Gossamer Security Solutions, Inc.
Document: AAR-BrocadeNetIron5.8 All rights reserved.
performed on the client for remote administration. In the course of performing the testing activities for the
evaluation, the evaluator shall use all supported interfaces, although it is not necessary to repeat each test
involving an administrative action with each interface. The evaluator shall ensure, however, that each supported
method of administering the TOE that conforms to the requirements of this PP be tested; for instance, if the TOE
can be administered through a local hardware interface; SSH; and TLS/HTTPS; then all three methods of
administration must be exercised during the evaluation team’s test activities.
The FIPS Guide refers to instructions to configure both SSHv2 and HTTPS (w/TLS) (on the MLX platform). It suggests
that in FIPS mode telnet and HTTP are disallowed. The CLI seems to be the default initial interface and no
configuration is needed.
The Security Configuration Guide, section 1 Securing Access Methods, indicates that Serial CLI, telnet, SSH, SNMP,
and TFTP. Of these telnet and TFTP are disabled in FIPS mode and SNMP access to critical security parameters is
also disabled (but not tested). Instructions are provided specifically to manage access to the available management
interfaces including CLI, SSHv2, and HTTPS.
Note that the local CI and remote SSH interfaces are identical in that the same commands can be issued in each
case.
The evaluator performed administration using the console as well as the SSH connection. Both resulted in a
command line interface so both were addressed thoroughly. The HTTPS interface on the MLX platform was tested
as well through sampling to ensure it produced the same results.
2.6 PROTECTION OF THE TSF (FPT)
2.6.1 EXTENDED: PROTECTION OF ADMINISTRATOR PASSWORDS (FPT_APW_EXT.1)
2.6.1.1 FPT_APW_EXT.1.1
TSS Assurance Activities: None Defined
Guidance Assurance Activities: None Defined
Testing Assurance Activities: None Defined
Page view 37
1 2 ... 33 34 35 36 37 38 39 40 41 42 43 ... 55 56

Comments to this Manuals

No comments