
| Version | Date | Comment |
|---|---|---|
| 1.0 | 2019-09-17 | Initial publication |
| 1.1 | 2020-06-18 | Compatibility with CPP_ND_V2.2E, incorporation of NIAP Technical Decisions |
| 1.2 | 2022-03-31 | Format conversion, incorporation of NIAP Technical Decisions, TC feedback |
| 1.3 | 2023-08-16 | Incorporation of NIAP Technical Decisions, TC feedback |
| 2.0 | 2025-02-28 | Incorporation of NIAP Technical Decisions, Update to CC:2022 |
This Base-PP is valid because a VPN gateway is a device at the edge of a private network that terminates an IPsec tunnel, which provides device authentication, confidentiality, and integrity of information traversing a public or untrusted network. This is functionality that typically will be implemented by a network device.
A Target of Evaluation (TOE) that conforms to a PP-Configuration containing this PP-Module may be a ‘Distributed TOE’ as defined in the NDcPP; however, the VPN gateway functionality described in this PP-Module should be in a single TOE component. This PP-Module does not prohibit the TOE from implementing other security functionality in a distributed manner. For example, a TOE may have a centralized device that performs VPN gateway and other security functionality (such as intrusion prevention) with a number of distributed nodes that help in the enforcement of the secondary functionality.
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Direct Rationale | A type of Protection Profile, PP-Module, or Security Target in which the security problem definition (SPD) elements are mapped directly to the SFRs and possibly to the security objectives for the operational environment. There are no security objectives for the TOE. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Headend | A VPN use case where the VPN gateway is establishing VPN connectivity with endpoint VPN clients as opposed to other infrastructure devices (e.g., site-to-site). |
Packet Filtering | The process by which an edge network device determines if traffic bound to or from its external network is passed to its destination or dropped. |
VPN Gateway | A type of network device that resides at the edge of a private network and permits the establishment of VPN connectivity from computers residing in an external network. |
Virtual Private Network (VPN) | A mechanism for overlaying a cryptographically secured network over distributed wide-area networks. |
This PP-Module specifically addresses network gateway devices that terminate IPsec VPN tunnels. A compliant VPN gateway is a device composed of hardware and software that is connected to two or more distinct networks and has an infrastructure role in the overall enterprise network. In particular, a VPN gateway establishes a secure tunnel that provides an authenticated and encrypted path to one or more other sites and thereby decreases the risk of exposure of information transiting an untrusted network.
The baseline requirements of this PP-Module are those determined necessary for a multi-site VPN gateway device. A compliant TOE may also contain the ability to act as a headend for remote clients. Because this capability is optional, the remote client-based requirements have been included in Appendix A.
These assumptions are made on the Operational Environment (OE) in order to be able to ensure that the security functionality specified in the PP-Module can be provided by the TOE. If the TOE is placed in an OE that does not meet these assumptions, the TOE may no longer be able to provide all of its security functionality.
This PP-Module defines assumptions that extend those defined in the supported Base-PP.This PP defines no Organizational Security Policies beyond those defined in the claimed Base-PP(s).
| Assumption or OSP | Security Objectives | Rationale |
| A.CONNECTIONS | OE.CONNECTIONS | The OE objective OE.CONNECTIONS is realized through A.CONNECTIONS. |
This SFR has been modified from its definition in the NDcPP to support this PP-Module’s IPsec requirements by mandating support for GCM mode and 256-bit key sizes.
The text of the requirement is replaced with:
The TSF shall perform encryption/decryption in accordance with a specified cryptographic algorithm AES used in [GCM] mode and cryptographic key sizes [256 bits] that meet the following: AES as specified in ISO 18033-3, [GCM as specified in ISO 19772].
This SFR has been modified from its definition in the NDcPP to support this module's IPsec requirements by mandating use of CNSA 1.0 parameters, where applicable. Any requirement not mentioned in this section is unchanged from its definition in the Base-PP.
FCS_IPSEC_EXT.1.4: This element has been modified to require the use of CNSA 1.0-compliant parameters.
The text of FCS_IPSEC_EXT.1.4 is replaced with:
The TSF shall implement the IPsec protocol ESP as defined by RFC 4303 using the cryptographic algorithms [AES-GCM-256 (specified in RFC 4106)] together with a Secure Hash Algorithm (SHA)-based HMAC [selection:HMAC-SHA-384, no HMAC algorithm].
Application Note: SHA-based HMAC is not required since AES-GCM satisfies both confidentiality and integrity functions. IPsec may use a truncated version of the SHA-based HMAC functions contained in the selections. Where a truncated output is used, this is described in the TSS.
FCS_IPSEC_EXT.1.6: This SFR is modified from its definition in the Base-PP to remove support for non-CNSA parameters and algorithms. This includes mandating the use of IKEv2.
The text of FCS_IPSEC_EXT.1.6 is replaced with:
The TSF shall ensure the encrypted payload in the [IKEv2] protocol uses the cryptographic algorithms [AES-GCM-256 (specified in RFC 5282)].
Application Note: This element is changed from its definition in the Base-PP to mandate support of 256-bit GCM. AES-GCM implementation for IPsec is specified in RFC 5282.
FCS_IPSEC_EXT.1.11: This element has been modified from its definition in the NDcPP by mandating DH group 20, which is selectable in the original definition of the element. The selectable options have also been restricted to conform with CNSA 1.0 parameters.
The text of FCS_IPSEC_EXT.1.11 is replaced with:
The TSF shall ensure that IKE protocols implement DH groups [
] and
[
Application Note: This element has been modified from its definition in the NDcPP by mandating DH group 20, which is selectable in the original definition of the element. Any groups other than 20 that are allowed per the element may be selected by the ST author but they are not required for conformance to this PP-Module.
FCS_IPSEC_EXT.1.13: This SFR is modified from its definition in the Base-PP by mandating the use of IKEv2 and its authentication methods.
The text of FCS_IPSEC_EXT.1.13 is replaced with:
The TSF shall ensure that [IKEv2] protocols perform peer authentication using [selection: RSA, ECDSA]
that use X.509v3 certificates that conform to RFC 4945 and [selection: Pre-shared Keys that conform to RFC 8784, Pre-shared Keys transmitted
via EAP-TTLS, EAP-TLS, no other method].
Application Note: At least one public-key-based Peer Authentication method is required in order to
conform to this PP-Module; one or more of the public key schemes is chosen by
the ST author to reflect what is implemented. The ST author also ensures that
appropriate FCS requirements reflecting the algorithms used (and key
generation capabilities, if provided) are listed to support those methods. Note
that the TSS will elaborate on the way in which these algorithms are to be used.
If a selection with “EAP-TLS” or “EAP-TTLS” is chosen, the selection-based requirement FCS_EAP_EXT.1 must be claimed.
When an EAP method is used, verification occurs via an external authentication server.
Though EAP-TTLS involves PSKs, FIA_PSK_EXT.1 is not claimed because PSK requirements for EAP-TTLS are addressed instead via
the Authentication Server PP.
If “pre-shared keys that conform to RFC 8784” is chosen, the selection-based requirement FIA_PSK_EXT.1 must be claimed.
Multifactor support can be achieved via traffic filtering in accordance with FPF_MFA_EXT.1.
It is acceptable for different use cases to leverage different selections. If this is the case, it must be identified.
FCS_IPSEC_EXT.1.14: This SFR is modified from its definition in the Base-PP to require DN to be supported for certificate reference identifiers.
The text of FCS_IPSEC_EXT.1.14 is replaced with:
The TSF shall only establish a trusted channel if the presented identifier in the received certificate matches the configured reference identifier, where the presented and reference identifiers are of the following fields and types: Distinguished Name (DN), [selection: SAN: IP address, SAN: Fully Qualified Domain Name (FQDN), SAN: user FQDN, CN: IP address, CN: FQDN, CN: user FQDN, no other reference identifier types, [assignment: other supported reference identifier types]].
Application Note: This PP-Module requires DN to be supported for certificate reference identifiers at minimum. Other selections may be made by the ST author but they are not required for conformance to this PP-Module.
This SFR, defined in the NDcPP as selection-based, is mandated for inclusion in this PP-Module because the refinements to FMT_SMF.1 mandate its inclusion. Note that it is also refined to refer specifically to keys and certificates used for VPN operation.
The text of the requirement is replaced with:
The TSF shall restrict the ability to [manage] the [cryptographic keys and certificates used for VPN operation] to [Security Administrators].
An element of this SFR is modified from its definition in the Base-PP to require the testing of noise source health tests, regardless of what other testing is claimed. All other elements of this requirement not mentioned in this section are unchanged from their definition in the NDcPP.
FPT_TST_EXT.1.1: This element has been modified from its definition in the Base-PP to require noise source health tests.
The text of the requirement is replaced with:
The TSF shall run a suite of the following self-tests:
Application Note: This SFR is modified from its definition in the NDcPP by requiring noise source health tests to be performed regardless of what other testing is claimed. It is expected that the behavior of this testing will be described in the entropy documentation. Other self-tests may be defined at the ST author’s discretion; note that the Application Note in the NDcPP regarding what other self-tests are expected is still applicable here.
An element of FPT_TUD_EXT.1 is modified from its definition in the NDcPP to mandate use of the first selection (use of a digital signature mechanism to verify updates). All other elements of this requirement not mentioned in this section are unchanged from their definition in the NDcPP.
FPT_TUD_EXT.1.3: The text of the requirement is replaced with:
The TSF shall provide means to authenticate firmware/software updates to the TOE using a digital signature mechanism and [selection: X.509 certificate, no other mechanisms] prior to installing those updates.
Application Note:
The NDcPP provides an option for how firmware/software updates can be verified
but this PP-Module requires the digital signature method to be selected at
minimum. Note that all other options specified in the NDcPP for this component
are permitted so it is possible for the TSF to use code signing certificates to
validate updates, in which case FPT_TUD_EXT.2 from the Base-PP is also included
in the ST.
If X.509 certificates are used to verify the integrity of an update, the certificates
must conform to FIA_X509_EXT.1/Rev. Therefore, certificates that do not (or only
partially) conform to FIA_X509_EXT.1/Rev are not allowed as a means to
authenticate firmware/software updates.
NDcPP states the ST author may use X.509 certificates that do not meet
FIA_X509_EXT.1/Rev. This applies to trust anchors as they can be encoded as
certificates. Even when they are encoded as certificates, the trust anchor must be
protected by another mechanism that ensures its integrity and binds it to the
'code-signing' context. Trust anchors do not need to be validated according to
FIA_X509_EXT.1, even if they are encoded as certificates; instead they need to be
validated as trust anchors. FIA_X509_EXT.1/Rev does not require revocation
checking of certificates designated as trust store elements. The integrity of trust
store elements depends on administrative controls for loading and managing
trust stores and functional integrity checks that are described in other SFRs.
So, if the certificate used to verify the update is a trust store element (self-signed
and specifically trusted for verifying updates, with the integrity of this special
purpose certificate protected by administrative controls and TOE integrity
protections), then revocation checking is not required.
However, if the certificate is issued by a trusted root CA, or by a certificate
authority which chains to a trusted root CA, then revocation checking is required
for all elements of the certificate chain except the trusted root CA, and the TOE
must be able to obtain fresh revocation information from an external source.
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FAU_GEN.1/VPN | ||
| No events specified | N/A | |
| FCS_CKM.1/IKE | ||
| No events specified | N/A | |
| FMT_SMF.1/VPN | ||
| All administrative actions | No additional information. | |
| FPF_RUL_EXT.1 | ||
| Application of rules configured with the 'log' operation |
| |
| FPT_FLS.1/SelfTest | ||
| No events specified | N/A | |
| FPT_TST_EXT.3 | ||
| No events specified | N/A | |
| FTP_ITC.1/VPN | ||
| Initiation of the trusted channel | No additional information. | |
| Termination of the trusted channel | No additional information. | |
| Failure of the trusted channel functions | Identification of the initiator and target of failed trusted channel establishment attempt |
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
| Threat | Addressed by | Rationale |
|---|---|---|
| T.DATA_INTEGRITY | FCS_COP.1/DataEncryption (refined from Base-PP) | Mitigates the threat by encrypting channel data using a specified algorithm. |
| FCS_IPSEC_EXT.1 (refined from Base-PP) | Mitigates the threat by utilizing IPsec to verify message confidentiality and integrity. | |
| FPF_RUL_EXT.1 | Mitigates the threat by filtering traffic from outside the protected network. | |
| FPT_FLS.1/SelfTest | Mitigates the threat by ceasing operations of the TSF if a test or security failure is detected, preventing a failure in secure functionality. | |
| FPT_TST_EXT.1 (refined from Base-PP) | Mitigates the threat by testing the TSF for any unauthorized modifications or cryptographic failures. | |
| FPT_TST_EXT.3 | Mitigates the threat by executing self tests in a specified, repeatable manner. | |
| FPT_TUD_EXT.1 (refined from Base-PP) | Mitigates the threat by providing a secure update mechanism for the TOE that validates its authenticity, ensuring a faulty or malicious update cannot compromise the TSF's ability to protect data integrity. | |
| FTP_ITC.1/VPN | Mitigates the threat by transmitting data over a secure VPN connection protected from unauthorized disclosure. | |
| FTA_VCM_EXT.1 (optional) | Mitigates the threat by assigning a private, internal IP address to VPN clients within the protection of the TSF. | |
| FTA_SSL.3/VPN (optional) | Mitigates the threat by terminating inactive VPN sessions. | |
| T.NETWORK_ACCESS | FCS_IPSEC_EXT.1 (refined from Base-PP) | Mitigates the threat by utilizing IPsec to create VPN connections for authorized users to access the internal network. |
| FIA_X509_EXT.1 (refined from Functional Package for X.509, version 1.0) | Mitigates the threat by preventing connection to servers or clients with malformed or invalid X.509 certificates. | |
| FIA_X509_EXT.2 (refined from Functional Package for X.509, version 1.0) | Mitigates the threat by authenticating a remote entity using X.509 certificates. | |
| FIA_X509_EXT.3 (refined from Functional Package for X.509, version 1.0) | Mitigates the threat by utilizing a secure certificate request method to obtain a signed certificate. | |
| FCS_CKM.1/IKE | Mitigates the threat by generating secure keys utilized for IKE peer authentication. | |
| FPF_RUL_EXT.1 | Mitigates the threat by filtering traffic to disallow unauthorized access. | |
| FPF_MFA_EXT.1 (optional) | Mitigates the threat by providing for multi-factor authentication of VPN clients. | |
| FTA_SSL.3/VPN (optional) | Mitigates the threat by terminating inactive VPN sessions to prevent potential unauthorized use. | |
| FTA_TSE.1 (optional) | Mitigates the threat by preventing connection of VPN clients that meet undesirable criteria. | |
| FTA_VCM_EXT.1 (optional) | Mitigates the threat by assigning a private, internal IP address to VPN clients within the protection of the TSF. | |
| FCS_EAP_EXT.1 (selection-based) | Mitigates the threat by securely authenticating VPN clients with a remote authentication server. | |
| FIA_HOTP_EXT.1 (selection-based) | Mitigates the threat by providing a second factor of authentication via hash-based one-time passwords. | |
| FIA_PSK_EXT.1 (selection-based) | Mitigates the threat by providing a second factor of authentication via a pre-shared key. | |
| FIA_PSK_EXT.2 (selection-based) | Mitigates the threat by securely and randomly generating a pre-shared key. | |
| FIA_PSK_EXT.3 (selection-based) | Mitigates the threat by securely deriving a pre-shared key from a password. | |
| FIA_TOTP_EXT.1 (selection-based) | Mitigates the threat by providing a second factor of authentication via time-based one-time passwords. | |
| T.NETWORK_DISCLOSURE | FPT_TST_EXT.1 (refined from Base-PP) | Mitigates the threat by verifying the TSF's correct operation. |
| FPT_TUD_EXT.1 (refined from Base-PP) | Mitigates the threat by providing a secure update mechanism for the TOE that validates its authenticity, ensuring a faulty or malicious update cannot compromise the TSF's ability to enforce traffic rules. | |
| FPF_RUL_EXT.1 | Mitigates the threat by filtering traffic to disallow unauthorized traffic flows. | |
| FPT_FLS.1/SelfTest | Mitigates the threat by ceasing operations of the TSF if a test or security failure is detected, preventing a failure in traffic filtering. | |
| FPT_TST_EXT.3 | Mitigates the threat by executing self tests in a specified, repeatable manner. | |
| FTA_VCM_EXT.1 (optional) | Mitigates the threat by assigning a private, internal IP address to VPN clients within the protection of the TSF. | |
| T.NETWORK_MISUSE | FPT_TST_EXT.1 (refined from Base-PP) | Mitigates the threat by verifying the TSF's correct operation. |
| FPT_TUD_EXT.1 (refined from Base-PP) | Mitigates the threat by providing a secure update mechanism for the TOE that validates its authenticity, ensuring a faulty or malicious update cannot compromise the TSF's ability to enforce traffic policy and log potential violations. | |
| FAU_GEN.1/VPN | Mitigates the threat by logging potential violations of policy. | |
| FCS_IPSEC_EXT.1 | Mitigates the threat by securing traffic originating from or traveling to an authorized user that resides outside the protected network, ensuring that an unauthorized attacker cannot inject their own actions into the protected network. | |
| FMT_MTD.1/CryptoKeys | Mitigates the threat by implementing a management interface to manage the IPsec parameters so that unprivileged users do not have the ability to misuse its functions. | |
| FMT_SMF.1/VPN | Mitigates the threat by implementing a management interface that allows for authorized usage of the TOE so that unprivileged users do not have the ability to misuse its functions. | |
| FPF_RUL_EXT.1 | Mitigates the threat by filtering traffic to or from disallowed services. | |
| FPT_FLS.1/SelfTest | Mitigates the threat by ceasing operations of the TSF if a test or security failure is detected, preventing a failure in detection or prevention of network misuse. | |
| FPT_TST_EXT.3 | Mitigates the threat by executing self tests in a specified, repeatable manner. | |
| FTA_VCM_EXT.1 (optional) | Mitigates the threat by assigning a private, internal IP address to VPN clients within the protection of the TSF. | |
| T.REPLAY_ATTACK | FCS_COP.1/DataEncryption (refined from Base-PP) | Mitigates the threat by utilizing encryption algorithms to protect data from being sent in cleartext. |
| FCS_IPSEC_EXT.1 (refined from Base-PP) | Mitigates the threat by utilizing the IPsec protocol to encapsulate and encrypt channel data. | |
| FPT_TST_EXT.1 (refined from Base-PP) | Mitigates the threat by verifying the TSF's correct operation. | |
| FPT_TUD_EXT.1 (refined from Base-PP) | Mitigates the threat by providing a secure update mechanism for the TOE that validates its authenticity, ensuring a faulty or malicious update cannot compromise the TSF's ability to encrypt traffic and prevent it from being replayed without detection. | |
| FPT_FLS.1/SelfTest | Mitigates the threat by ceasing operations of the TSF if a test or security failure is detected, preventing a failure in detection of replay attacks. | |
| FPT_TST_EXT.3 | Mitigates the threat by executing self tests in a specified, repeatable manner. | |
| FTP_ITC.1/VPN | Mitigates the threat by ensuring the channel data (in this case, VPN data) is protected from unauthorized disclosure. | |
| FTA_TSE.1 (optional) | Mitigates the threat by preventing connection from a VPN client that meets undesirable criteria. |
| PP-Module Threat, Assumption, OSP | Consistency Rationale |
|---|---|
| T.DATA_INTEGRITY | The threat of data integrity compromise is a specific example of the T.WEAK_CRYPTOGRAPHY threat defined in the Base-PP. |
| T.NETWORK_ACCESS | The threat of a malicious entity accessing protected network resources without authorization is a specific example of the T.UNTRUSTED_COMMUNICATION_CHANNELS threat defined in the Base-PP. |
| T.NETWORK_DISCLOSURE | Exposure of network devices due to insufficient protection is a specific example of the T.UNTRUSTED_COMMUNICATION_CHANNELS threat defined in the Base-PP. |
| T.NETWORK_MISUSE | Depending on the specific nature of the misuse of network resources, this threat is a specific manifestation of either the T.UNTRUSTED_COMMUNICATION_CHANNELS or T.WEAK_AUTHENTICATION_ENDPOINTS threat defined in the Base-PP. |
| T.REPLAY_ATTACK | A replay attack is mentioned in the Base-PP as a specific type of attack based on the T.UNTRUSTED_COMMUNICATION_CHANNELS threat. |
| A.CONNECTIONS | This assumption defines the TOE’s placement in a network such that it is able to perform its required security functionality. The Base-PP does not define any assumptions about the TOE’s architectural deployment so there is no conflict here. |
| PP-Module OE Objective | Consistency Rationale |
|---|---|
| OE.CONNECTIONS | This objective intends for the TOE to be connected to environmental networks in such a way that its primary functionality can be appropriately enforced. There is no inconsistency here with respect to the Base-PP because the Base-PP does not define any restrictions on how a network device is connected to its environment. |
| PP-Module Requirement | Consistency Rationale |
|---|---|
| Modified SFRs | |
| FCS_COP.1/DataEncryption | This PP-Module restricts the Base-PP SFR to a subset of existing permissible functionality and does not introduce any new behavior. |
| FCS_IPSEC_EXT.1 | This PP-Module restricts the Base-PP SFR to a subset of existing permissible functionality and does not introduce any new behavior. |
| FMT_MTD.1/CryptoKeys | This PP-Module applies the key management functionality already defined in the Base-PP specifically to functionality related to VPN gateways. |
| FPT_TST_EXT.1 | This PP-Module refines the Base-PP SFR to mandate a specific type of self-test. This is consistent with the Base-PP because the execution of this self-test is already implied by the Base-PP through its entropy requirements. |
| FPT_TUD_EXT.1 | This PP-Module restricts the Base-PP SFR to a subset of existing permissible functionality and does not introduce any new behavior. |
| Additional SFRs | |
| This PP-Module does not add any requirements when the NDcPP is the base. | |
| Mandatory SFRs | |
| FAU_GEN.1/VPN | This SFR adds new auditable events for the TOE that relate to the functionality that is introduced by the PP-Module. |
| FCS_CKM.1/IKE | This PP-Module specifies a method of key generation that is not defined in the Base-PP. This is used for functionality defined in the Base-PP (IKE) that this PP-Module chooses to represent in greater detail. |
| FMT_SMF.1/VPN | This SFR defines management functions that are specific to the functionality required by this PP-Module and were therefore not already defined in the Base-PP iteration of it. |
| FPF_RUL_EXT.1 | This SFR defines specific behavior for the processing of network traffic, specifically which communications channel is used based on certain attributes of the traffic. The Base-PP does not apply any constraints on how usage of a trusted channel is controlled so this does not contradict anything presented in the Base-PP. |
| FPT_FLS.1/SelfTest | The Base-PP already requires the TOE to specify the self-tests that are performed. This PP-Module simply goes one step further and requires the TSF to behave in a certain way upon failure of those self-tests. |
| FPT_TST_EXT.3 | This PP-Module adds to the self-testing requirements from the Base-PP by mandating that a specific self-test be performed and that it be performed in a certain manner. This does not conflict with the Base-PP because the method used to perform the self-test is a cryptographic function already mandated by the Base-PP. |
| FTP_ITC.1/VPN | This PP-Module iterates a Base-PP SFR to refer to an interface that is unique to the PP-Module. This does not affect the ability of the Base-PP iteration of the SFR to be satisfied. |
| Optional SFRs | |
| FPF_MFA_EXT.1 | This SFR relates specifically to the handling of traffic that is used for the establishment of IPsec connections. |
| Objective SFRs | |
| This PP-Module does not define any Objective requirements. | |
| Implementation-dependent SFRs | |
| FTA_SSL.3/VPN | This SFR refers to a specific condition under which a trusted channel is terminated by the TSF. The Base-PP supports termination of trusted channels and does not mandate this be done in any particular method. |
| FTA_TSE.1 | This SFR refers to a specific condition under which a trusted channel is terminated by the TSF. The Base-PP supports termination of trusted channels and does not mandate this be done in any particular method. |
| FTA_VCM_EXT.1 | This SFR refers to network addressing, which is outside the scope of the Base-PP and therefore not prohibited by it. |
| Selection-based SFRs | |
| FCS_EAP_EXT.1 | This SFR defines the use of EAP-TLS/TTLS; the Base-PP already defines requirements for TLS so potential support for EAP-TLS is consistent with functionality that the Base-PP already expects the TOE may have. |
| FIA_HOTP_EXT.1 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
| FIA_PSK_EXT.1 | This SFR defines the use of pre-shared keys, which is behavior that only relates to the establishment of IPsec connections. |
| FIA_PSK_EXT.2 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
| FIA_PSK_EXT.3 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
| FIA_TOTP_EXT.1 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FPF_MFA_EXT.1 | ||
| No events specified | N/A |
This PP-Module does not define any Objective SFRs.
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FTA_SSL.3/VPN | ||
| No events specified | N/A | |
| FTA_TSE.1 | ||
| No events specified | N/A | |
| FTA_VCM_EXT.1 | ||
| No events specified | N/A |
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FCS_EAP_EXT.1 | ||
| No events specified | N/A | |
| FIA_HOTP_EXT.1 | ||
| No events specified | N/A | |
| FIA_PSK_EXT.1 | ||
| No events specified | N/A | |
| FIA_PSK_EXT.2 | ||
| No events specified | N/A | |
| FIA_PSK_EXT.3 | ||
| No events specified | N/A | |
| FIA_TOTP_EXT.1 | ||
| No events specified | N/A |
| Functional Class | Functional Components |
|---|---|
| Cryptographic Support (FCS) | FCS_EAP_EXT EAP-TLS/TTLS |
| Identification and Authentication (FIA) | FIA_HOTP_EXT HMAC-Based One-Time Password Pre-Shared Keys FIA_PSK_EXT Pre-Shared Key Composition FIA_TOTP_EXT Time-Based One-Time Password Pre-Shared Keys |
| Packet Filtering (FPF) | FPF_MFA_EXT Multifactor Authentication Filtering FPF_RUL_EXT Packet Filtering Rules |
| Protection of the TSF (FPT) | FPT_TST_EXT TSF Self-Test |
| TOE Access (FTA) | FTA_VCM_EXT VPN Client Management |
FCS_EAP_EXT.1, EAP-TLS/TTLS, defines the use of EAP-TLS/TTLS.
No specific management functions are identified.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | FCS_IPSEC_EXT.1 IPsec Protocol |
FIA_HOTP_EXT.1, HMAC-Based One-Time Password Pre-Shared Keys, defines the implementation of HOTP.
No specific management functions are identified.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | FCS_COP.1 Cryptographic Operation |
FIA_PSK_EXT.1, Pre-Shared Key Composition, defines the use and composition of pre-shared keys used for IPsec.
FIA_PSK_EXT.2, Generated Pre-Shared Keys, defines the use and composition of generated pre-shared keys used for IPsec.
FIA_PSK_EXT.3, Password-Based Pre-Shared Keys, defines the use and composition of password-based pre-shared keys used for IPsec.
No specific management functions are identified.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | FCS_IPSEC_EXT.1 IPsec Protocol |
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
| Hierarchical to: | No other components. |
| Dependencies to: | FIA_PSK_EXT.1 Pre-Shared Key Composition |
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
| Hierarchical to: | No other components. |
| Dependencies to: | FIA_PSK_EXT.1 Pre-Shared Key Composition |
FIA_TOTP_EXT.1, Time-Based One-Time Password Pre-Shared Keys, defines the implementation of TOTP.
No specific management functions are identified.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | FPT_STM.1 Reliable Time Stamps |
FPF_RUL_EXT.1, Packet Filtering Rules, requires the TSF to enforce a given set of packet filtering rules in an administrator-defined order against one or more TOE interfaces.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
FPF_MFA_EXT.1, Multifactor Authentication Filtering, defines the use and composition of multifactor authentication filtering.
No specific management functions are identified.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
FPT_TST_EXT.3, Self-Test with Defined Methods, requires the TSF to specify the methods by which self-testing is performed in addition to identifying the self-tests that are executed and the circumstances in which this execution occurs.
No specific management functions are identified.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
FTA_VCM_EXT.1, VPN Client Management, requires the TSF to assign private (internal) IP addresses to VPN clients that successfully establish IPsec connections with it.
No specific management functions are identified.
There are no auditable events foreseen.
This appendix lists requirements that should be considered satisfied by products successfully evaluated against this PP-Module. These requirements are not featured explicitly as SFRs and should not be included in the ST. They are not included as standalone SFRs because it would increase the time, cost, and complexity of evaluation. This approach is permitted by [CC] Part 1, 8.3 Dependencies between components.
This information benefits systems engineering activities which call for inclusion of particular security controls. Evaluation against the PP-Module provides evidence that these controls are present and have been evaluated.
All SFR dependencies in this PP-Module are addressed by appropriate SFRs, either from elsewhere in the PP-Module or inherited from the Base-PP.| Acronym | Meaning |
|---|---|
| Base-PP | Base Protection Profile |
| CA | Certificate Authority |
| CC | Common Criteria |
| CEM | Common Evaluation Methodology |
| CN | Common Name |
| cPP | Collaborative Protection Profile |
| DH | Diffie-Hellman |
| DN | Distinguished Name |
| FP | Functional Package |
| FQDN | Fully Qualified Domain Name |
| ICMP | Internet Control Message Protocol |
| IKE | Internet Key Exchange |
| MSK | Master Session Key |
| OE | Operational Environment |
| PBKDF | Password-Based Key Derivation Function |
| PP | Protection Profile |
| PP-Configuration | Protection Profile Configuration |
| PP-Module | Protection Profile Module |
| SA | Security Association |
| SAN | Subject Alternative Name |
| SAR | Security Assurance Requirement |
| SFP | Small Form-Factor Pluggable |
| SFR | Security Functional Requirement |
| ST | Security Target |
| TOE | Target of Evaluation |
| TSF | TOE Security Functionality |
| TSFI | TSF Interface |
| TSS | TOE Summary Specification |
| VPN | Virtual Private Network |
| Identifier | Title |
|---|---|
| [CC] | Common Criteria for Information Technology Security Evaluation -
|
| [CEM] | Common Methodology for Information Technology Security Evaluation -
|