Juniper Netscreen Family with ScreenOS 5.0.0r9
|Product type: Network and Network Related Devices and Systems|
Product Status: Completed
Assurance Level: EAL4
Components: Platforms: Juniper Networks NetScreen-5GT, -5XT, -25, -50, -204, -208, -500; Juniper Networks ISG 1000 and 2000; Juniper Networks NetScreen 5200 and 5400. 5GT runs ScreenOS 5.0.0r9.r; ISG 1000 and 2000
Certification Country: UNITED STATES
Juniper Networks Inc1133 Innovation Way,
Sunnyvale California 94089 United States
Juniper Networks Australia Pty. Ltd (Distributor)
Juniper Networks Australia Pty Ltd (Distributor)
The Juniper Networks evaluated products are integrated security appliances that control traffic flow through a network and operate as the central security hub in a network configuration. The appliances integrate stateful packet inspection firewall, virtual private networking (VPN), and traffic management features. All have hardware-accelerated IPSec encryption and very low latency, allowing them to fit into any network. Installing and managing the appliances is accomplished using a command line interface (CLI).
Each evaluated model consists of hardware and firmware, and each runs ScreenOS 5.0.0r9 in firmware, a Juniper Networks proprietary operating system. The model differences have no affect on the security functions claimed in the Security Target
The TOE generates audit records corresponding to traffic flow, administrator actions, and identification and authentication. The TOE provides interfaces that allow the administrator to review the audit records, including the ability to search and sort the audit records. Additionally, the TOE provides the ability to protect the audit records and limit the loss of records due to storage exhaustion.
The TOE enforces an information flow policy that is enforced upon all packets attempting to traverse a Juniper Networks appliance. The policy is configurable by the administrator and is based on the presumed IP source address, destination IP address, protocol, source and destination interface, and service. The TOE has a packet buffer for temporary storage of packet information. All temporary storage is accounted for in that the size of the temporary storage relative to every packet is known, thus ensuring that the TOE does not reuse any previous packet information. Additionally, the TOE provides encryption/decryption capabilities for VPN sessions.
Administrators are the only users of the TOE and are forced to be identified and authenticated by the TOE before they are allowed to invoke any administrator commands. Although the TOE includes the console port, the actual console used is not part of the TOE, but is part of the environment. The Security Target includes an assumption that a VT-100 terminal, or any device that can emulate a VT-100 terminal, is required for use as a locally-connected console.
Security management is provided through the administrator interface. This interface allows an administrator (when properly identified and authenticated) to configure the Juniper Networks appliance. The security management functions are not available to non-administrator users.
The security functions of the TOE are protected in two ways. First, untrusted users do not have a direct interface to these functions; they are limited to sending packets to the device. Second, the administrative interface is a separate interface that is not connected to the network and, therefore, not susceptible to many of the general threats on the network such as packet sniffing or attempts to log into a public administrative interface. The administrative interface allows an administrator (when properly identified and authenticated) to configure the Juniper Networks appliance. The security management functions are not available to non-administrator users. Additionally, the TOE includes a system clock that can only be set and modified by the administrator, providing reliable time stamps for audit information.