Common Criteria for HP Networking Switches

8
TOE Access Functions
The TOE displays a banner regarding unauthorized use of the TOE before establishing a user session. The
TOE also terminates a user’s session after an administrator-configured period of inactivity expires.
Protection of the TSF Functions
The TOE, in conjunction with the operational environment, protects TSF data from unauthorized
disclosure when transmitted between itself and trusted external IT entities.
The TOE is also capable of self-testing during initial start-up and reboot to detect security failures.
Operational Assumptions
One or more authorized administrators are assigned who are competent to manage the TOE and
the security of the information it contains, trained for the secure operation of the TOE, and who
can be trusted not to deliberately abuse their privileges so as to undermine security.
Authorized TOE users are trusted to correctly install, configure and operate the TOE according to
the instructions provided by the TOE documentation.
There will be no untrusted users and no untrusted software on the TOE component servers.
The switch must be installed in a physically secure area where only authorized administrators
have access to the physical appliance.
Users will protect their authentication data.
Switch Configuration Overview
The following configuration options for the must be set in order for the switch to be in the Common
Criteria Evaluated configuration:
TELNET for CLI and Menu Interfaces must be disabled and SSH must be used. Refer to “Telnet
vs. Secure Shell” on page 11.
Web access for management using a standard web browser connection must be disabled.
(Instead, SSL HTTP must be used.) Refer to “HTTP vs. HTTPS” on page 12.
TFTP client and server do not require authentication and must be disabled. Secure File Transfer
Protocol (SFTP) and Secure Copy Protocol (SCP) should be enabled. Refer to “TFTP vs. SFTP and
SCP” on page 12.
SNMP v2 and v1 must be disabled. Refer to “SNMPv1/2c vs. SNMPv3” on page 12.