Keysight Network Packet Broker v5.3.0 CC Guide 1.0
Keysight Network Packet Broker v5.3.0 CC Guide 1.0
Keysight Network Packet Broker v5.3.0 CC Guide 1.0
Version 1.0
June 2020
Document prepared by
www.lightshipsec.com
Page 1 of 20
Ixia, A Keysight Business Common Criteria Guide
Table of Contents
1 About this Guide .................................................................................................................... 3
1.1 Overview ......................................................................................................................... 3
1.2 Audience ......................................................................................................................... 3
1.3 Terminology .................................................................................................................... 3
1.4 About the Common Criteria Evaluation .......................................................................... 3
1.5 Conventions .................................................................................................................... 5
1.6 Related Documents ........................................................................................................ 6
2 Secure Acceptance and Update ........................................................................................... 7
2.1 Obtaining the TOE .......................................................................................................... 7
2.2 Verifying the TOE ............................................................................................................ 7
2.3 Power-on Self-Tests ....................................................................................................... 7
2.4 Updating the TOE ........................................................................................................... 8
3 Configuration Guidance ...................................................................................................... 10
3.1 Installation ..................................................................................................................... 10
3.2 Administration Interfaces .............................................................................................. 10
3.3 Cryptography................................................................................................................. 10
3.4 Default Passwords ........................................................................................................ 10
3.5 Setting Time .................................................................................................................. 11
3.6 Audit Logging ................................................................................................................ 11
3.7 Administrator Authentication ......................................................................................... 11
3.8 TLS Communication ..................................................................................................... 11
Annex A: Log Reference.............................................................................................................. 13
3.9 Format ........................................................................................................................... 13
3.10 Events ........................................................................................................................... 13
List of Tables
Table 1: Terminology ........................................................................................................................ 3
Table 2: Evaluation Assumptions ..................................................................................................... 5
Table 3: Related Documents ............................................................................................................ 6
Table 4: Audit Events ..................................................................................................................... 13
Page 2 of 20
Ixia, A Keysight Business Common Criteria Guide
1.2 Audience
2 This guide is intended for system administrators and the various stakeholders
involved in the Common Criteria evaluation. It is assumed that readers will use this
guide in conjunction with the related documents listed in Table 3.
1.3 Terminology
Table 1: Terminology
Term Definition
Page 3 of 20
Ixia, A Keysight Business Common Criteria Guide
Page 4 of 20
Ixia, A Keysight Business Common Criteria Guide
Assumption Guidance
Physical security, commensurate with the Ensure that the device is hosted in a
value of the TOE and the data it contains, is physically secure environment, such as a
provided by the environment. locked server room.
There are no general-purpose computing Do not install other software on the device
capabilities (e.g., compilers or user hardware.
applications) available on the TOE, other
than those services necessary for the
operation, administration and support of the
TOE.
The TOE does not provide any protection of The Common Criteria evaluation focused on
traffic that traverses it. It is assumed that the management plane of the device.
protection of this traffic will be covered by
other security and assurance measures in
the operational environment.
Security Administrators are trusted to follow Ensure that administrators are trustworthy –
and apply all guidance documentation in a e.g. implement background checks or similar
trusted manner. controls.
The TOE firmware and software is updated Apply updates regularly according to your
by an Administrator on a regular basis in organization’s policies.
response to the release of product updates
due to known vulnerabilities.
The Administrator’s credentials (private key) Administrators should take care to not
used to access the TOE must be protected disclose credentials and ensure private keys
on any other platform on which they reside. are stored securely.
The Security Administrator ensures that there Administrators should sanitize the device
is no unauthorized access possible for before disposal or transfer out of the
sensitive residual information (e.g. organization’s control.
cryptographic keys, keying material, PINs,
passwords etc.) on networking equipment
when the equipment is discarded or removed
from its operational environment.
1.5 Conventions
9 The following conventions are used in this guide:
Page 5 of 20
Ixia, A Keysight Business Common Criteria Guide
• CLI Command <replaceable> - This style indicates to you that you can
type the word or phrase on the command line and press [Enter] to invoke a
command. Text within <> is replaceable. For example:
Use the cat <filename> command to view the contents of a file
• [key] or [key-combo] – key or key combination on the keyboard is shown in
this style. For example:
The [Ctrl]-[Alt]-[Backspace] key combination exits your graphical session and
returns you to the graphical login screen or the console.
• GUI => Reference – denotes a sequence of GUI screen interactions. For
example:
Select File => Save to save the file.
• [REFERENCE] Section – denotes a document and section reference from
Table 3. For example:
Follow [USER] Configuring Users to add a new user.
Reference Document
Page 6 of 20
Ixia, A Keysight Business Common Criteria Guide
Page 7 of 20
Ixia, A Keysight Business Common Criteria Guide
Page 8 of 20
Ixia, A Keysight Business Common Criteria Guide
22 Follow instructions at [USER] To upgrade the software on your system section of the
Appendix C Software Upgrade/Downgrade and Cold Spare Upgrade Procedures for
updating the TOE.
23 The TOE verifies the digital signature of the upgrade files using RSA 2048-bit public
key. Refer [USER] Upgrade/Downgrade Guidelines to/from Release 4.5 or
Higher/Lower.
Page 9 of 20
Ixia, A Keysight Business Common Criteria Guide
3 Configuration Guidance
3.1 Installation
24 Follow the instructions of [USER] augmented by the configuration steps in the
following sections.
3.3 Cryptography
27 FIPS mode can be enabled at System > Settings > FIPS encryption. Refer [USER]
Enable Server FIPS Encryption.
Page 10 of 20
Ixia, A Keysight Business Common Criteria Guide
Page 11 of 20
Ixia, A Keysight Business Common Criteria Guide
terminated. If there are no SANs of the correct type (DNS name) in the certificate,
then the TOE will compare the reference identifier to the Common Name (CN) in the
certificate Subject. If there is no CN, then the verification fails and the channel is
terminated. If the CN exists and does not match, then the verification fails and the
channel is terminated. Otherwise, the reference identifier verification passes and
additional verification actions can proceed.
39 For Syslog communication, only DNS names are supported as acceptable reference
identifiers. IP addresses are not allowed for reference identity.
Page 12 of 20
Ixia, A Keysight Business Common Criteria Guide
3.10 Events
42 The TOE generates the following log events.
Table 4: Audit Events
Page 13 of 20
Ixia, A Keysight Business Common Criteria Guide
Page 14 of 20
Ixia, A Keysight Business Common Criteria Guide
Page 15 of 20
Ixia, A Keysight Business Common Criteria Guide
Page 16 of 20
Ixia, A Keysight Business Common Criteria Guide
Page 17 of 20
Ixia, A Keysight Business Common Criteria Guide
Page 18 of 20
Ixia, A Keysight Business Common Criteria Guide
Page 19 of 20
Ixia, A Keysight Business Common Criteria Guide
Page 20 of 20