Contivity™ Extranet Switch 4500
FIPS 140-1 Non-Proprietary
Cryptographic Module Security Policy
Level 2 Validation
February 2000
© Copyright 2000 Nortel Networks.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
Download from Www.Somanuals.com. All Manuals Search And Download.
1 Introduction
1.1 Purpose
This is a non-proprietary Cryptographic Module Security Policy for the Contivity™ Extranet
Switch 4500. This security policy describes how the Contivity™ Extranet Switch 4500 meets
the security requirements of FIPS 140-1, and how to operate the Contivity™ Extranet Switch
4500 in a secure FIPS 140-1 mode. This policy was prepared as part of the level 2 FIPS 140-
1 certification of the Contivity™ Extranet Switch 4500.
FIPS 140-1 (Federal Information Processing Standards Publication 140-1 -- Security
Requirements for Cryptographic Modules) details the U.S. Government requirements for
cryptographic modules. More information about the FIPS 140-1 standard and validation
1.2 References
This document deals only with operations and capabilities of the Contivity™ Extranet Switch
4500 in the technical terms of a FIPS 140-1 cryptographic module security policy. More
information is available on the Contivity™ Extranet Switch 4500 and the entire line of
Contivity™ products from the following sources:
·
·
The Nortel Networks web site contains information on the full line of Contivity
For answers to technical or sales related questions please refer to the contacts listed
1.3 Terminology
In this document the Nortel Contivity™ Extranet Switch 4500 is referred to as the switch, the
Contivity™ Switch, module, or system.
1.4 Document Organization
The Security Policy document is part of the complete FIPS 140-1 Submission Package. In
addition to this document, the complete Submission Package contains:
¨
¨
¨
¨
Vendor Evidence document
Finite State Machine
Module Software Listing
Other supporting documentation as additional references
© Copyright 2000 Nortel Networks.
3
Download from Www.Somanuals.com. All Manuals Search And Download.
This document provides an overview of the Contivity™ Switch and explains the secure
configuration and operation of the module. This introduction section is followed by Section 2,
which details the general features and functionality of the Contivity™ Switch. Section 3
specifically addresses the required configuration for the FIPS-mode of operation.
This Security Policy and other Certification Submission Documentation was produced by
Corsec Security, Inc. under contract to Nortel Networks. With the exception of this Non-
Proprietary Security Policy, the FIPS 140-1 Certification Submission Documentation is Nortel-
proprietary and is releasable only under appropriate non-disclosure agreements. For access to
these documents, please contact Nortel Networks.
© Copyright 2000 Nortel Networks.
4
Download from Www.Somanuals.com. All Manuals Search And Download.
2 The Contivity Extranet 4500 Switch
The Nortel Networks Contivity Extranet Switch 4500 provides a scalable, secure, manageable
remote access server that meets FIPS 140-1 level 2 requirements. This section will describe
the general features and functionality provided by the Contivity Extranet Switch. Section 3 will
provide further details on how the Contivity Switch addresses FIPS 140-1 requirements.
2.1 Cryptographic Module
The Contivity Extranet Switch combines remote access protocols, security, authentication,
authorization, and encryption technologies into a single solution.
Figure 1 – The Contivity Extranet 4500 Switch
The Switch can support up to 5,000 simultaneous user sessions, allowing each user to exercise
a variety of secure connections and services. The Switch supports a number of secure
network-layer and data-link-layer protocols including Internet Protocol Security (IPSec), Point-
to-Point Tunneling Protocol (PPTP), Layer Two Tunneling Protocol (L2TP), and Layer Two
Forwarding (L2F). The architecture for the Switch is user-centric, where an individual user or
group of users can be associated with a set of attributes that provide custom access to the
Extranet. In effect, you can create a personal Extranet based on the special needs of a user or
group.
2.2 Module Interfaces
The interfaces for the Switch are located on the rear panel as shown in Figure 2.
© Copyright 2000 Nortel Networks.
5
Download from Www.Somanuals.com. All Manuals Search And Download.
.
Figure 2 – Physical Interfaces
The physical interfaces include the dual power plugs for the redundant power supplies, the
power and reset buttons, the serial port, the LAN Port RJ-45 connector, and up to six slots
containing additional network connectors. The power and reset buttons light up to indicate
power and hard disk activity respectively. Each RJ-45 connector is accompanied with Light
Emitting Diodes (LEDs), including green and orange LEDs on the LAN Port, and Link/Activity
and 10/100Mbps LEDs on the 10/100BASE-TX LAN ports.
Figure 3 shows details of the LAN Port LEDs, with the green LED indicating 100Mbps activity,
and the orange LED indicating link status and activity. More information on these LEDs and the
LAN Port interface can be found in the Contivity Extranet Switch 4500 Getting Started
Guide, 1C.
Figure 3 – LAN Port LEDs
Figure 4 shows details of the 10/100BASE-TX LAN Port LEDs, with the link status LED
indicating connection to a hub, the activity LED indicating traffic being sent, and the 100TX
LED indicating 100Mbps operation. More information on these LEDs and the /100BASE-TX
LAN Port interface can be found in the manual “Getting Started with the Contivity Extranet
Switch 4500”.
© Copyright 2000 Nortel Networks.
6
Download from Www.Somanuals.com. All Manuals Search And Download.
Figure 4 – 10/100BASE-TX LAN LEDs
These physical interfaces are separated into the logical interfaces from FIPS as described in the
following table:
Switch physical interface
FIPS 140-1 Logical Interface
10/100BASE-TX LAN Port,
LAN Port,
Data Input Interface
Serial Port
10/100BASE-TX LAN Port,
LAN Port,
Serial Port
Data Output Interface
Control Input Interface
Power Button,
Reset Button,
Serial Port,
LAN Port
LAN Port LEDs,
10/100BASE-TX LAN Port LEDs
Serial Port
Status Output Interface
Power Button Light
Reset Button Light
Dual Power Plugs
Power Interface
Table 1 – FIPS 140-1 Logical Interfaces
2.3 Redundancy and Physical Security
With up to 5,000 simultaneous users accessing critical information, network managers can rest
assured that the Contivity Extranet Switch is designed for high availability. Auto switching
redundant power supplies and a redundant storage system protect against failure. Multilevel
authentication methods and automatic backup of all system and accounting data ensure
maximum reliability and management peace of mind. The Switch meets FCC requirements in
47 CFR Part 15 for personal computers and peripherals designated for business use (ClassA),
and is labeled in accordance with FCC requirements.
The Contivity™ Extranet Switch 4500 is entirely encased by a thick steel chassis. The system
has three removable portions: the front bezel, the top cover, and the I/O Panel. Removing the
© Copyright 2000 Nortel Networks.
7
Download from Www.Somanuals.com. All Manuals Search And Download.
front bezel allows access to the dual power supplies, hard drives, and floppy drive. Removing
the top cover or the I/O panel allows access to the motherboard, memory, and expansion slots.
Figure 5 – The Steel Cover of the Extranet Switch 4500
Once the Extranet Switch 4500 has been configured in its FIPS 140-1 level 2 conformant
mode, the system cannot be accessed without signs of tampering. To seal the system, apply
serialized tamper-evident labels as follows:
1. Clean the cover of any grease, dirt, or oil before applying the tamper-evident labels.
Alcohol based cleaning pads are recommended for this purpose. The temperature
of the switch should be above 10°C.
2. Apply two (2) labels on the sides overlapping the top cover and the main chassis as
shown in Figure 6.
3. Apply two (2) labels on the top and bottom overlapping the bezel and the main
chassis as shown in Figure 6.
4. Apply one (1) label over the air holes on the rear I/O Panel as shown in Figure 7
5. Apply one (1) label over the keyboard button cover as shown in Figure 7
6. Apply one (1) label over the gap between the I/O Panel and the main chassis as
shown in Figure 7
7. Apply 2 labels over the AC filter input module screws as shown in Figure 7
8. Record the serial numbers of the labels applied to the module.
9. Allow 24 hours for the adhesive in the tamper-evident seals to completely cure.
© Copyright 2000 Nortel Networks.
8
Download from Www.Somanuals.com. All Manuals Search And Download.
(2) Top Cover
Labels
(2) Front
Bezel Labels
Figure 6 – Tamper-Evident Labels Applied to Switch Front Bezel and Top Cover
(1) Air Hole
Label
(2) AC Filter
Input Labels
(1) I/O Panel
Label
(1) Keyboard
Connector
Label
Figure 7 – Tamper Evident Labels Applied to Rear Panel
The tamper-evident seals are produced from a special thin gauge white vinyl with self-adhesive
backing. Any attempt to open the switch will damage or destroy the tamper-evident seals, or
the painted surface and metal of the module cover. Since the tamper-evident labels have non-
repeated serial numbers, the labels may be inspected for damage and compared against the
applied serial numbers to verify that the module has not been tampered with. An intact label is
shown in Figure 8, with a visible serial number and no breaks.
FIPS 140-1 Level 2 Tamper Evident Label
Contivity
Extranet
Switch
Serial Number: 5673422
Figure 8 – Tamper-Evident Label
© Copyright 2000 Nortel Networks.
9
Download from Www.Somanuals.com. All Manuals Search And Download.
Attempting to remove a label breaks it or continually tears off small fragments as depicted in
Figure 9. Other signs of tamper-evidence include a strong smell of organic solvents, warped or
bent cover metal, and scratches in the paint on the module.
FIPS 140-1 Level 2 Tmper Evident L
Contivity
Extranet
Switch
Serial Number: 5673422
Figure 9 – Damaged Tamper-Evident Label
2.4 Roles and Services
The Switch supports up to 5000 simultaneous users sending packets using Internet Protocol
Security (IPSec), Point-to-Point Tunneling Protocol (PPTP), Layer Two Tunneling Protocol
(L2TP), and Layer Two Forwarding (L2F). In addition, an administrator may securely
configure the switch either locally, or remotely.
The Switch employs role-based authentication of users, and stores user identity information in
an internal or an External Lightweight Directory Access Protocol (LDAP) database.
Authentication can optionally be performed against a variety of external servers using LDAP or
RADIUS (Novell NDS, Microsoft Windows NT Domains, Security Dynamics ACE Server,
Axent OmniGuard Defender)
There are two main roles in the Switch (as required by FIPS 140-1) that users may assume:
Crypto Officer role and User role. The administrator of the switch assumes the Crypto Officer
role in order to configure and maintain the switch using Crypto Officer services, while the Users
exercise only the User services. The Crypto Officer role is assumed with the following rights:
·
Manage Switch rights: (either none, view switch, or manage switch). View
switch rights allow an administrator to view all the configuration and status
information on the switch. Manage switch rights allow an administrator to
configure the switch and actually change settings.
·
Manage Users rights: (either none, view users, or manage users). View users
rights allow an administrator to review all user accounts and settings on the Switch
while manage users rights actually allow an administrator to create, modify, and
delete users.
A User authenticates and assumes the User role in order to have rights to access the following
services:
© Copyright 2000 Nortel Networks.
10
Download from Www.Somanuals.com. All Manuals Search And Download.
·
·
·
·
·
IPSec Protocol Tunnels
PPTP Protocol Tunnels
L2TP Protocol Tunnels
L2F Protocol Tunnels
Change Password
2.4.1 Crypto Officer Services
There is a factory default login ID and password, which allows access to the Crypto Officer
role. This initial account is the primary administrator's account for the Switch, and guarantees
that at least one account is able to assume the Crypto Officer role and completely manage the
switch and users. (This initial account always has manage switch and manage users rights.)
An administrator of the switch may assign permission to access the Crypto Officer role to
additional accounts, thereby creating additional administrators. Administrators may always
access the switch and authenticate themselves via the serial port. They may also authenticate as
a User over a secure tunnel and then authenticate to the switch as a Crypto Officer in order to
manage the switch. An administrator can also configure the switch to allow or disallow
management via a private LAN interface, without using a secure tunnel. Initially the default
configuration allows HTTP management on the private LAN interface of the Switch without
requiring a secure tunnel.
At the highest level, Crypto Officer services include the following:
·
·
Configure the Switch: to define network interfaces and settings, set the protocols
the switch will support, define routing tables, set system date and time, load
authentication information, etc.
Create User Groups: to define common sets of user permissions such as access
hours, user priority, password restrictions, protocols allowed, filters applied, and
types of encryption allowed. Administrators can create, edit and delete User
Groups, which effectively defines the permission sets for a number of Users.
Create Users: to define User accounts and assign them permissions using User
Groups. Every User may be assigned a separate ID and password for IPSec,
PPTP, L2TP, and L2F, which allow access to the User roles. Additionally, an
account may be assigned an Administration ID, allowing access to the Crypto
Officer role. Each Administrator ID is assigned rights to Manage the Switch (either
none, view switch, or manage switch) and rights to Manage Users (either none,
view users, or manage users).
·
·
Define Rules and Filters: to create packet Filters that are applied to User data
streams on each interface. Each Filter consists of a set of Rules, which define a set
of packets to permit or deny based characteristics such as protocol ID, addresses,
ports, TCP connection establishment, or packet direction. The administrator may
use any of the pre-defined Rules or create custom Rules to be included in each
Filter.
© Copyright 2000 Nortel Networks.
11
Download from Www.Somanuals.com. All Manuals Search And Download.
·
·
Status Functions: to view the switch configuration, routing tables, active sessions,
use Gets to view SNMP{ XE "SNMP" } MIB II{ XE "SNMP:MIB II" } statistics,
usage graphs, health, temperature, memory status, voltage, packet statistics, and
review accounting logs.
Manage the Switch: to log off users, shut or reset the switch, disable or enable
audible alarms, manually back up switch configurations, restore switch
configurations, create a recovery diskette, etc.
A complete description of all the management and configuration capabilities of the Contivity
Extranet switch can be found in the administrators manual, Managing the
Contivity Extranet Switch, and in the online help for the switch.
2.4.2 User Services
An administrator (who has manage users rights) assigns each User a name and a User Group.
The User Group defines access limitations and services that the User may exercise, including
access hours, call admission priority, forwarding priority, number of simultaneous logins,
maximum password age, minimum password length, whether passwords may contain only
alphabetic characters, whether static IP addresses are assigned, idle timeout, forced logoff for
timeout, filters, whether IPX is allowed.
The administrator also assigns each User separate User IDs and passwords for the following
services: IPSec, PPTP, L2TP, and L2F tunnels. (A fifth ID and password may be assigned for
Administration of the switch as described in 2.4.1.) The User may then authenticate as
necessary to initiate secure tunnels using any of these services.
·
IPSec: Requires authentication through User Name and Password
(checked against an LDAP directory or using AXENT or a SecureID
token). This authenticates the User to the switch and is protected using
ISAKMP. The Switch may be configured to additionally require
authentication through RADIUS with a Group Name and Password.
Security options for IPSec include using an Encapsulated Security Payload
(ESP) with Triple-DES, Data Encryption Standard (DES), or “40-bit
DES”, and an Authentication Header (AH) with Message Authentication
Code Secure Hash{ XE "SHA" } Algorithm{ XE "secure hash algorithm" }
(HMAC-SHA) or HMAC-MD5.
·
·
·
PPTP: Requires authentication using MS-CHAP, CHAP, or PAP. MS-
CHAP can use no encryption, 40-bit RC4, 128-bit RC4 encryption.
L2TP: Requires authentication using MS-CHAP CHAP, or PAP. MS-
CHAP can use no encryption, 40-bit RC4, 128-bit RC4 encryption.
L2F: Requires authentication using CHAP, or PAP.
© Copyright 2000 Nortel Networks.
12
Download from Www.Somanuals.com. All Manuals Search And Download.
2.5 Key Management
The switch securely administers both cryptographic keys and other critical security parameters
such as User passwords. Ephemeral sessions keys are created during the negotiation of secure
tunnels on behalf of Users who have successfully authenticated themselves to the switch with
their user ID and password. These keys are created for protocols like MS-CHAP and
ISAKMP which securely negotiate key exchange and then allow encryption services for PPTP,
L2TP, and IPSec.
Keys are destroyed when the appropriate tunnel, SA, or session is terminated and are never
archived or released from the device. User passwords can be destroyed by Crypto Officers, or
by users overwriting their own passwords. All passwords are stored in the LDAP database in
an encrypted format, and never released. They are used only for authentication in key exchange
protocols, which each protect CSPs according to their protocol. (Crypto Officers should be
aware that PAP transmits password information in the clear and should not be enabled before
deciding local policy. See notes on PAP in the Managing the Contivity Extranet Switch
(page 3-32).
2.6 Self Tests
In order to prevent any secure data being released, it is important to test the cryptographic
components of a security module to insure all components are functioning correctly. The
Contivity Switch includes an array of self-tests which are run during startup and periodically
during operations. The self-test run at power-up include a cryptographic known answer tests
(KAT) on the FIPS-approved cryptographic algorithms (DES, 3DES) and on the message
digest (SHA-1). Also performed at startup are software integrity tests using a DES MAC per
FIPS 113 and a continuous random number generator test. Other test are run periodically or
conditionally such as a software load test for upgrades using a DES MAC and the continuous
random number generator test. In addition, there are checksum tests on the flash memory
which are updated with flash changes.
If any of these self-test fail the switch will transition into an error state. Within the error state, all
secure data transmission is halted and the switch outputs status information indicating the failure.
3 Secure Operation of the Contivity Switch
The Contivity Switch is a versatile machine; it can be run in a Normal Operating Mode or a
FIPS Operating Mode. In FIPS operating mode, the switch meets all the Level 2 requirements
for FIPS 140-1. In order to place the module in FIPS mode, click the “FIPS Enabled” button
on the Services Available management screen and restart the module. A number of
configuration settings are recommended when operating the Contivity Switch in a FIPS 140-1
compliant manner. Other changes are required in order to maintain compliance with FIPS 140-
1 requirements. These include the following:
© Copyright 2000 Nortel Networks.
13
Download from Www.Somanuals.com. All Manuals Search And Download.
Recommended
·
·
Change the default administrator password on the switch.
Disable all management protocols over private non-tunnelled interfaces
Required
·
Select the “FIPS Enabled” button on the Service Available Management screens and
restart the module.
·
·
Apply the tamper evident labels as described in section 2.3
Disable cryptographic services that employ non-FIPS approved algorithms.
·
For IPSec: When operating the device in a FIPS 140-1 compliant manner, only
the Triple DES ESP, DES ESP, and HMAC-SHA AH may be enabled. MD5
is not an approved FIPS algorithm.
·
For PPTP and L2TP: When operated in a FIPS 140-1 compliant manner, MS-
CHAP and CHAP are not enabled with RC4 encryption.
·
·
·
·
For L2P: CHAP must be disable to operate in a FIPS compliant manner.
The internal LDAP database must be used in place of an external LDAP server.
SSL cannot be used to establish secure connections
For RIP – In FIPS mode, MD5 must be disabled.
Note: A switch that has a Hardware Accelerator installed cannot be run in FIPS mode.
There are several services that are effected by transitioning the module into FIPS compliant
mode. When the module is restarted in FIPS mode, several administrative services accessing
the shell, including the debugging scripts, are disabled. RSA digital signatures are disabled in
FIPS mode, because RSA digital signature is not a FIPS approved algorithm. When the module
is in FIPS mode, the administrator is given additional authority to reset the default
administrator’s password and username. The integrated firewall program, by Checkpoint, and
the restore capabilities are disabled during FIPS mode. The FTP demon is also turned off,
preventing any outside intruder from FTPing into the server.
In order to transition the mode out of FIPS mode, the FIPS disable button, on the Services
Available management screen, must be clicked and the module must be restarted.
© Copyright 2000 Nortel Networks.
14
Download from Www.Somanuals.com. All Manuals Search And Download.
|