Specifications

Cisco Aggregation Services Router (ASR) 901 Series Security Target
Page 43 of 50
TOE SFRs
How the SFR is Met
numbers, and special characters (that include: “!”, “@”, “#”, “$”, “%”, “^”, “&”,
“*”, “(“, and “)”. Minimum password length is settable by the Authorized
Administrator, and can be configured for minimum password lengths of 15
characters.
FIA_PSK_EXT.1
The TOE supports use of IKEv1 (ISAKMP) pre-shared keys for authentication of
IPsec tunnels. Pre-shared keys can be entered as ASCII characters (from 22 and
up to 128 characters long) using the “crypto isakmp key” command and are
conditioned by the TOE (using AES) to a bit-based string used by IKE. Pre-
shared keys can also be entered as HEX (“bit-based”) values using the “key-
string” command.
FIA_UIA_EXT.1
FIA_UAU_EXT.2
The TOE requires all users to be successfully identified and authenticated before
allowing any TSF mediated actions to be performed. Administrative access to the
TOE is facilitated through the TOE’s CLI. The TOE mediates all administrative
actions through the CLI. Once a potential administrative user attempts to access
the CLI of the TOE through either a directly connected console or remotely
through an SSHv2 connection, the TOE prompts the user for a user name and
password. Only after the administrative user presents the correct authentication
credentials will access to the TOE administrative functionality be granted. No
access is allowed to the administrative functionality of the TOE until an
administrator is successfully identified and authenticated.
The TOE provides a local password based authentication mechanism as well as
RADIUS and TACACS+ authentication, if configured.
The administrator authentication policies include authentication to the local user
database or redirection to a remote authentication server, if configured. Interfaces
can be configured to try one or more remote authentication servers, and then fail
back to the local user database if the remote authentication servers are
inaccessible.
The process for authentication is the same for administrative access whether
administration is occurring via a directly connected console cable or remotely via
SSHv2. At initial login, the administrative user is prompted to provide a
username. After the user provides the username, the user is prompted to provide
the administrative password associated with the user account. The TOE then either
grant administrative access (if the combination of username and password is
correct) or indicate that the login was unsuccessful. The TOE does not provide a
reason for failure in the cases of a login failure.
FIA_UAU.7
When a user enters their password at the local console, the TOE displays only ‘*’
characters so that the user password is obscured. For remote session
authentication, the TOE does not echo any characters as they are entered.
FMT_MTD.1
The TOE provides the ability for Security Administrators (a.k.a Authorized
Administrators) to access TOE data, such as audit data, configuration data,
security attributes, session thresholds and updates. Each of the predefined and
administratively configured privilege level has a set of permissions that will grant
them access to the TOE data, though with some privilege levels, the access is
limited.
The TOE performs role-based authorization, using TOE platform authorization
mechanisms, to grant access to the privileged and semi-privileged levels. For the