iboss Firesphere Guidance Version 1.6 March 22, 2016 Note: Please refer to the User Manual for the latest updates. Copyright © by iboss, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in chemical, manual or otherwise, without the prior written permission of Phantom Technologies Inc. iboss Cybersecurity makes no representations or warranties, either expressed or implied, with respect to the contents hereof and specifically disclaims any warranties, merchantability or fitness for any particular purpose. Any software described in this manual is sold or licensed "as is". Should the programs prove defective following their purchase, the buyer (and not this company, its distributor, or its dealer) assumes the entire cost of all necessary servicing, repair, and any incidental or consequential damages resulting from any defects. Further, this company reserves the right to revise this publication and make changes from time to time in the contents hereof without obligation to notify any person of such revision of changes. All brand and product names mentioned in this manual are trademarks and/or registered trademarks of their respective holders. www.iboss.com Open Source Code This product may include software code subject to the GNU General Public License (“GPL”), GNU Lesser General Public License (“LGPL”), or other open-source software licenses. Copies of the GPL and LGPL licenses are available upon request. You may also visit www.gnu.org to view more information regarding open-source licensing. The GPL, LGPL and other open-source code used in Phantom Technologies Inc products are distributed without any warranty and are subject to the copyrights of their authors. Upon request, open-source software source code is available from Phantom Technologies Inc via electronic download or shipment on a physical storage medium at cost. For further details and information please visit www.iphantom.com/opensource. Page 2 of 40 Table of Contents 1 Document Overview ............................................................................................................................. 5 2 Introduction .......................................................................................................................................... 6 3 Getting Started...................................................................................................................................... 7 3.1 Identification ................................................................................................................................. 7 3.2 Environment.................................................................................................................................. 7 3.3 Technical Requirements................................................................................................................ 8 3.3.1 3.4 4 Procedural Requirements ..................................................................................................... 9 Installation .................................................................................................................................... 9 3.4.1 User Accounts ..................................................................................................................... 10 3.4.2 Cryptographic Operations ................................................................................................... 12 Security Functions ............................................................................................................................... 13 4.1 Security Audit .............................................................................................................................. 13 4.2 Local Console Access ................................................................................................................... 13 4.3 Administration ............................................................................................................................ 13 4.3.1 Time .................................................................................................................................... 13 4.3.2 Trusted Updates .................................................................................................................. 14 4.3.3 Inter TSF Trusted Channel Configuration ............................................................................ 14 4.3.4 Configuration of Trusted Services ....................................................................................... 14 4.4 Configuring the Cryptographic Engine ........................................................................................ 15 4.5 Configuring the Random Bit Generation (RBG) .......................................................................... 15 5 Management for data logging ............................................................................................................ 16 6 Design Specification ............................................................................................................................ 17 6.1 Keys ............................................................................................................................................. 17 6.1.1 Key Protection ..................................................................................................................... 17 6.1.2 Key Zeroization.................................................................................................................... 17 6.2 Error State ................................................................................................................................... 17 6.3 Firmware update process ........................................................................................................... 17 6.4 DRBG and NDRNG ....................................................................................................................... 17 6.5 Physical Security Mechanisms .................................................................................................... 18 6.6 Inhibit data on Key generation and zeroization.......................................................................... 18 Page 3 of 40 7 Audit Records ...................................................................................................................................... 19 8 Processes............................................................................................................................................. 38 9 Features .............................................................................................................................................. 39 9.1 Evaluated Features...................................................................................................................... 39 9.2 Disabled Features........................................................................................................................ 39 9.2.1 Features Disabled in Common Criteria and FIPS mode ...................................................... 39 9.2.2 Features Disabled in FIPS mode .......................................................................................... 39 9.3 Modified Features ....................................................................................................................... 39 9.3.1 Report Manager .................................................................................................................. 39 9.3.2 Secure Web Gateway .......................................................................................................... 40 9.4 Unevaluated Features ................................................................................................................. 40 9.5 Out of Compliance Features ....................................................................................................... 40 Page 4 of 40 1 Document Overview This document includes all of the applicable requirements from the PP and PPE. All of the text that is straight from the PP and PPE is prefixed by its associated SFR identifier. The goal of the Common Criteria guidance is to: 1. 2. 3. 4. 5. 6. Uniquely Identify the TOE and all of its parts. Describe how to verify TOE upgrades. Describe how to configure the TOE in a manner consistent with the PP and PPE. Describe all of the CC Evaluated security functions. Describe the format of the audit records. List the processes running on the TOE that are capable of processing network traffic. Page 5 of 40 2 Introduction This document describes the Common Criteria evaluated security features of the iboss Firesphere 14600_fips (SWG) and iboss Firesphere 7960_fips (Report Manager). The SWG and Report Manager were evaluated against the Protection Profile for Network Devices, Version 1.1, June 8, 2012; and Security Requirements for Network Devices Errata #3, November 3, 2014. These documents are referred to as PP and PPE throughout this document. Page 6 of 40 3 Getting Started 3.1 Identification The evaluated servers consists of the following components: Iboss Firesphere Guidance - This document Firesphere 14600_FIPS Firesphere 14600_ FIPS Server Software: Version 8.2.0.10 Firesphere 7960_ FIPS Firesphere 7960_FIPS Server Software: Version 8.2.0.10 Secure Web Gateway Quick Start Guide: Version 8.2.0.10 Secure Web Gateway User Manual: Version 8.2.0.10 Report Manager Quick Start Guide: Version 8.2.0.10 Report Manager User Manual: Version 8.2.0.10 Iboss FireSphere Security Target 15-3460-R-0007: Version 0.7. Section 1.3.4 specifies TLS and cipher suite support 3.2 Environment As demonstrated the SWG can be configured as a standalone inline server that processes network traffic. In this configuration the SWG utilizes an internal Report Manager for the aggregation of data, report generation, audit logging, and alerting. For most networks, the SWG is configured to utilize an external Report Manager. When configured with an external report manager, the internal reporter on the SWG is utilized to communicate current network status to the external reporter for real time traffic. When utilizing an internal Report Manager no additional configuration is necessary to configure the SWG or Report Manager to communicate. When utilizing an external Report manager Section 3.8 of the Page 7 of 40 Report Manager User Manual describes how to configure the Report Manager to communicate with the SWG. Section 7 of the Secure Web Gateway User Manual describes the steps that are necessary to configure the SWG to communicate with the Report Manager. 3.3 Technical Requirements The iboss Firesphere servers are compatible with the following devices, servers, and protocol versions: TOE Hardware 7960 7960 7960 7960 Functionality LDAP(RFC 4510) Syslog(RFC 3164) HTTPS Trusted Update (pudsus1.ibossconnect.com) TLS Versions Ciphersuites 1.1 (RFC4346) 1.2 (RFC5246) TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 1.1 (RFC4346) 1.2 (RFC5246) TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 1.1 (RFC4346) 1.2 (RFC5246) TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 1.1 (RFC4346) 1.2 (RFC5246) TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 7960 SMTP(RFC 3207) 1.1 (RFC4346) 1.2 (RFC5246) 14600 LDAP(RFC 4510) 1.0 (RFC2246) 1.1 (RFC4346) 1.2 (RFC5246) 14600 HTTPS TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA 1.1 (RFC4346) 1.2 (RFC5246) TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 14600 Trusted Update (pudsus1.ibossconnect.com) 1.1 (RFC4346) 1.2 (RFC5246) TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 7960 and 14600 Intra-TSF Communication 1.0 (RFC2246) 1.1 (RFC4346) TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA Page 8 of 40 1.2 (RFC5246) TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 The iboss Firesphere servers are able to work with the following browsers: Internet Explorer Version 10 Chrome Version 35 Firefox Version 26 Safari Version 6 3.3.1 Procedural Requirements The following protections must be provided by the operational environment the TOE is deployed in. The iboss Firesphere Servers are physically protected from unauthorized access. These countermeasures should be commensurate with the value of the data and networks being protected by the iboss Firesphere Servers. The Administrators must be trusted, and they must follow and apply all administrator guidance. The TOE must be installed in the network in a manner that will allow the TOE to effectively enforce its policies on network traffic flowing among attached networks. See the network diagram in Section 3.2. The TOE must have a live internet connection to pudsus1.ibossconnect.com through the management interface. 3.4 Installation This section describes the steps to configure the iboss Firesphere Servers in a manner that is consistent with the requirements in the PP and PPE. Before beginning, verify that the hardware and documentation matches Section 3.1. Familiarize yourself with the user interface of the SWG and Report Manager by reviewing section 4 of the Secure Web Gateway User Manual and section 1.5 of the Report Manager User Manual. This iboss Fireshere Servers come with a 3 network port configuration (1 network port for LAN, 1 network port for WAN, and 1 network port for the Management Interface). The LAN and WAN port form a fully transparent network bridge that behaves similar to a layer 2 network switch. The LAN/WAN port do not route packets (like a firewall/router). The network interfaces (LAN/WAN) forward packets between interfaces like a switch. A packet received on the WAN port is sent on the LAN port. A packet received on the LAN port is sent on the WAN port. The IP Address is assigned to the “Management” interface. This port is used to access the SWG configuration web interface. The LAN/WAN port are blind and the web configuration interface cannot be accessed via those two ports. Page 9 of 40 Connect the power and network interfaces of the iboss Firesphere servers according to the Secure Web Gateway Quick Start Guide and Report Manager Quick Start Guide. Section 3.8 of the Report Manager User Manual descriptions the steps to establish secure communication between the Secure Web Gateway and the Report Manager. 3.4.1 User Accounts 3.4.1.1 Password Management The SWG and Report Manager are configured initially to require a minimum password length of 15 characters. The administrator of the server can change the minimum password to a length between 15 and 32 characters. On the SWG the minimum length can be changed by navigating to Preferences and then the System Settings submenu. On the Report Manager the minimum length can be changed by navigating to Settings, then General submenu, and then Additional Settings section. The administrator can then provide a numeric value between 15 and 32 characters for the minimum password length and save. An administrator can change the password of a user on the Report Manager by navigating to the Settings Menu. Then to the Users submenu. Locate the user that requires a password change and click the key icon. On the SWG by navigating to the Preferences, then System Settings. Clicking the “Change” link next to the Administration Password option. A dialog will be displayed to provide the new password and to confirm the new password. In the case of the SWG, the user must also be able to provide the existing password for the system in order to change the admin password. The length of the new password will be enforced to the minimum password length configured. The password can contain characters a – Z, 0 – 9, and the characters @!#$%^&*(). When the update password button is clicked the system will validate that the provided values match and then perform a sha256 hash of the value and store it within the system database. Iboss recommends the use of strong passwords to secure accounts. Strong passwords should consist of a mix of letters, both upper and lower case, as well as the use of numeric and special characters. 3.4.1.2 User Identification and Authentication The iboss Firesphere servers are initially configured with a default administrator account. The default administrator username is admin and the default password is documented in the Quick Start Guide for the SWG or Report Manager. Iboss recommends that the administrator of the system change the default administrator password to a more secure password as soon as possible after delivery of the server. To change the admin password on the Report Manager Prior to enabling the iboss Firesphere Servers for general use the administrator should establish trusted web certificates. The process of configuring SSL certificates is detailed in section 3.4.2 of this document. Page 10 of 40 3.4.1.3 Establishing users Section 4.5.5 of the Secure Web Gateway User Manual and section 3.3 of the Report Manager User Manual provide instructions for creating users. Users that are created as a Full Administrator are able to adjust TSF Data. A user that is created as a Delegated Administrator will need to be assigned specific permissions to allow the management of TSF data. The Secure Web Gateway session timeout under the “Add User” modal does not apply to “Settings Administrator” “Administrator Type” Full. To set the session timeout for a SWG “Settings Administrator” perform the following: Preferences->System Settings To set the session timeout for a Reporter “Settings Administrator” perform the following: Page 11 of 40 Settings->General->Additional Settings and set the “User Session Timeout” field. 3.4.2 Cryptographic Operations 3.4.2.1 Configuration of TLS All TLS configuration comes preconfigured within the firmware. Please reference Section 3.3 to see the list of protocols and ciphers. 3.4.2.2 Establishing SSL Certificates for SWG Section 4.8.3 of the Secure Web Gateway User Manual documents the proper process of configuring the SSL Certificates for secure communication between the SWG and the end users browser. The Report Manager comes configured with a factory default certificate. This certificate and private key must be replaced with either a customer generated self-signed certificate or with a certificate that has been purchased by a trusted certificate authority. Section 4.8.2 of the Secure Web Gateway User Manual documents the proper process of configuring the SSL Decryption functionality. SSL Decryption is allowed but it has not been evaluated as part of the Common Criteria. Other cryptographic engines were not evaluated nor tested during the CC evaluation of the TOE. 3.4.2.3 Establishing SSL Certificates for Report Manager Section 3.7 of the Report Manager User Manual documents the proper process of configuring the SSL certificates for secure communication between the Report Manager and the end users browser. The Report Manager comes configured with a factory default certificate. This certificate and private key must be replaced with either a customer generated self-signed certificate or with a certificate that has been purchased by a trusted certificate authority. Other cryptographic engines were not evaluated nor tested during the CC evaluation of the TOE. Page 12 of 40 4 Security Functions This section describes the security functions that were evaluated against the PP and PPE, but were not discussed in Section 3.4. 4.1 Security Audit Section 3.1.14 of the Report Manager User Manual provides instructions on how to configure an external syslog server for storage for audit events and for the storage of URL and IPS log events. The SWG forwards audit messages to the Report Manager by writing records to the url_log_entry_current table and identifying the record as an audit. The Report Manager, processes each record from the url_log_entry_current in a sequential fashion and when an audit log is encountered, the audit log is immediately forwarded to the system configured Syslog server. On the Report Manager when an audit event is generated, the audit event is immediately forwarded to the configured Syslog server. In the event that the Syslog server is unavailable, the audit message is lost. Section 7 of this document details the various audit events that can occur from the iboss Firesphere servers. 4.2 Local Console Access The SWG and Report Manager provides limited access to the shell of the device through an RS-232 Serial Port. Section 2.2.2 of the Secure Web Gateway User Manual and Section 1.2 of the Report Manager User Manual provides instruction on how to connect to the serial port. Once connected, the administrator will be prompted to provide login credentials. The credentials are the same values as used to access the web interface. Once authenticated the administrator will be able to configure the IP Address of the device, reset the device, or view the current network settings. The SWG provide local console access only to the “admin” user account. 4.3 Administration 4.3.1 Time The SWG allows the administrator to set a timezone. The SWG then utilizes NTP to establish a time based upon the provided timezone. The administrator sets the timezone by navigating to Preferences then Timezone submenu. The administrator can also choose if daylight savings should be enforced. Once the settings have been configured the administrator can persist these changes by clicking the save button. The Report Manager provides the ability for the administrator to configure an NTP server endpoint and to establish a timezone for the server. The administrator sets these by navigating to the Settings and then the System Time submenu. When the settings have been configured the administrator can persist these changed by clicking the save button. The server will then need to restart to apply these changes. Page 13 of 40 4.3.2 Trusted Updates The SWG and Report Manager expose an update process that will validate if new firmware is available for the server. If an update is available the administrator can trigger the download of the update. Upload download the SWG or Report Manager will perform an RSA2048SHA256 signature verification of the update to confirm that the update is trusted. When the signature has been verified the administrator will be prompted to install the new update. The SWG or Report Manager will need to restart in order to apply the changes. In order to perform a trusted update of the SWG and Reporter manager network access to pudus1.ibossconnect.com over port 443 must be accessible. The process of updating the SWG can be found in the Secure Web Gateway User Manual Section 4.1.3. To update the Report Manager refer to section 5 of the Report Manager User Manual. When the firmware update is successful a green banner will be displayed stating the successful update. If the firmware update fails, a red banner will be displayed and a reason for the update failure will be provided. The user can also validate that the firmware version on either the firmware page of the SWG or the System Info page of the Report Manager instance. 4.3.3 Inter TSF Trusted Channel Configuration When utilizing both an SWG and Report Manager within a single environment. They need to be configured to communicate over a trusted channel. The configuration of the trusted channel will allow the Report Manager to query current network status and allow the SWG to record networking data as well as any actions that were taken to block suspicious traffic. If the trusted channel is unintentionally broken communication between the SWG and Report Manager will cease. When the channel is restored protected communication will be resumed without the need of administrative action 4.3.3.1 Configuring Report Manager on SWG The Secure Web Gateway User Manual in section 4.9.2 instructions are provided to establish the secure connection from the SWG to Report Manager. 4.3.3.2 Configuring Gateways on Report Manager The Report Manager User Manual in section 3.8 instructions are provided to establish the secure connection from the Report Manager to the SWG. Note that depending on the network configuration it may be necessary to configure multiple SWGs on the Report Manager. The administrator will also need to establish a Behavioral Data & Threat Gateway configuration pointing to the appropriate SWG instances. 4.3.4 Configuration of Trusted Services The iboss Firesphere Servers can be configured to communicate securely to trusted services. The iboss Firesphere Servers support communication with LDAP, SMTP, Syslog, and time services. 4.3.4.1 LDAP Configuration A full administrator of the SWG and either a full administrator or delegated administrator with permissions to edit settings on the Report Manager can configure access to LDAP. For instructions on how to configure LDAP authentication on the SWG, please refer to section 4.6.2 of the Secure Web Page 14 of 40 Gateway User Manual. Section 3.1.8 of the Report Manager User Manual details the settings that are necessary to configure LDAP authentication on the Report Manager. Refer to section 3.3 of this document for details on supported cipher suites and protocols. 4.3.4.2 SMTP Configuration The SWG does not send emails, rather sending of email is delegated to the Report Manager. A full administrator or delegated administrator with permissions to edit settings on the Report Manager can configure access to send emails through SMTP. For instructions on how to configure SMTP on the Report Manager, please refer to section 3.1.2. Refer to section 3.3 of this document for details on supported cipher suites and protocols. 4.3.4.3 Syslog Configuration Syslog is utilized to record audit records to an external audit server. The SWG does not send audit records directly to the syslog server, rather audit messages are delegated to the Report Manager. A full administrator or a delegated administrator with permissions to edit settings on the Report Manager can configured the Syslog integration. Instructions on how to integrate the Syslog server with the Report Manager are in section 3.1.14 of the Report Manager User Manual. Section 3.3 of this document details the supported ciphers suites and protocols that are supported. 4.3.4.4 System Time The SWG comes preconfigured to communicate to time.nist.gov NTP Server to synchronize time. At this time, the NTP server for the SWG cannot be modified. An administrator can change the timezone and daylight savings settings from the SWG user interface. Section 4.10.3 of the Secure Web Gateway User Manual provides additional information on setting the system timezone. The standalone Report Manager allows the full administrator to configure the system time of the Report Manager. Section 3.6 of the Report Manager User Manual provides information about configuring the Report Manager to utilize NTP for synchronizing time. 4.4 Configuring the Cryptographic Engine The cryptographic engine is self-contained and no configuration is needed by an end user. The SWG and Report Manager perform a known answer test on each cryptographic algorithm to ensure the cryptographic engine has been configured properly. 4.5 Configuring the Random Bit Generation (RBG) The RBG is self-contained and no configuration is needed by an end user. The SWG and Report Manager perform a known answer test on each cryptographic RBG to ensure it has been configured properly. Page 15 of 40 5 Management for data logging The Report Manager User Manual section 2.9.2 describes how audit logs are added to the events logs and that they can be filtered to specifically view only those. IPS based logs are under section 2.9.6 of the Report Manager User Manual. Page 16 of 40 6 Design Specification 6.1 Keys 6.1.1 Key Protection The restrictive management interfaces does not provide the user with commands to view pre-shared keys, symmetric keys, passwords, and private keys. Key Association With the exception of temporal keys for TLS connections, the module does not associate keys with a specific user or entity, all keys are considered global configuration values. Temporal keys are created within the context of the thread created for that specific TLS connection and the association is handled by the thread management aspect of the operating system. 6.1.2 Key Zeroization The SWG and Report Manager zeroizes persistent CSPs whenever a file containing CSPs is modified or deleted by reading the size of the file in bytes and overwriting with zeros that amount. The file is then truncated to a length of 0 and overwritten with new data if modified. 6.2 Error State The SWG and Report Manager will transition to an error state under the following events:SelfTest Error Crypto Error Settings Error All cryptographic functions are inhibited by disabling all crypto services when in an error state. 6.3 Firmware update process The SWG and Report Manager perform an RSA 2048 with SHA-256 signature verification of any candidate update image. The TSF verifies that the image is signed by the iboss certificate. This certificate is persistently stored in the TOE file system (i.e. hard-coded). If the signature check fails, the SWG and Report Manager will not install the update and the following message will be shown to the user “An error occurred while downloading the firmware update” Upon power-up, the TSF performs a SHA-256 of the kernel, all executables, and all interpreted files. The SWG and Report Manager also perform a known answer test on each cryptographic algorithm. The SWG and Report Manager then begins normal operation, if all of the executables are unchanged and the cryptographic algorithms are operating correctly. 6.4 DRBG and NDRNG The DRBG outputs 384 bits per call. The NDRNG outputs 128 bits per call. Page 17 of 40 6.5 Physical Security Mechanisms The SWG and Reporter Manager use tamper stickers for physical security. 6.6 Inhibit data on Key generation and zeroization The SWG makes use of the openssl library for key generation. Openssl will inihibit any data output during key generation by blocking the calling thread until complete. During zeroization the SWG will reboot guaranteeing there is no data output. Page 18 of 40 7 Audit Records The iboss Servers will produce the following audit messages. Each audit event starts with the date time when the audit event was received by the syslog server, the name of the Report Manager that provided the message to the syslog server, and the time when the Report Manager processed the request. Startup/Shutdown of the audit function. Jan 20 12:13:05 reporter.ibosstest.com Wed FIPS_LOG_ENTRY MESSAGE=SWG Audit Logging Started Jan 20 12:13:05 PST 2016 Fields Contained in the Entry: Message identifying audit loggin has started for the SWG Jan 21 10:35:29 reporter.ibosstest.com Thu Jan 21 10:35:29 PST 2016 FIPS_LOG_ENTRY MESSAGE=SWG Audit Termination Fields Contained in the Entry: Message identifying audit loggin is stopping for the SWGJan 20 10:23:40 reporter.ibosstest.com Wed Jan 20 10:23:40 PST 2016 FIPS_LOG_ENTRY MESSAGE=ibreporter audit logging started Fields Contained in the Entry: Message identifying audit loggin has started for the Report Manager Jan 20 10:21:35 reporter.ibosstest.com Wed Jan 20 10:21:35 PST FIPS_LOG_ENTRY MESSAGE=Initiating iboss reporter shutdown IDENTITY=admin 2016 Fields Contained in the Entry: Message identifying audit loggin is stopping for the Report Manager Identity is the username of the user who initiated the shutdown of the Report Manager Failure/Establish/termination a TLS session. Reason for the failure in a human readable format (i.e. not an error code). IP address of the non-TOE endpoint. a. 14600 <-> 7960 i. Failure Jan 20 11:09:48 reporter.ibosstest.com Wed Jan 20 11:09:48 PST 2016 FIPS_LOG_ENTRY MESSAGE=Failed web connection because of IO Exception connect timed out DESTINATION=192.168.1.10 IDENTITY=swg.ibosstest.com REASON=Other configuration issue SERVICE TYPE=WEBCOMMUNICATION Fields Contained in the Entry: Message identifying the failure to connect to the remote host Destination is the remote IP address Identity is the hostname of the remote server Reason is the general classification of the error Service type is the kind of network communication Page 19 of 40 Jan 20 11:10:51 reporter.ibosstest.com Wed Jan 20 11:10:51 PST 2016 FIPS_LOG_ENTRY MESSAGE=Failed web connection because of IO Exception No route to host DESTINATION=192.168.1.10 IDENTITY=swg.ibosstest.com REASON=Other configuration issue SERVICE TYPE=WEBCOMMUNICATION Fields Contained in the Entry: Message identifying the failure to connect to the remote host Destination is the remote IP address Identity is the hostname of the remote server Reason is the general classification of the error Service type is the kind of network communication ii. Establishment Jan 20 13:09:47 reporter.ibosstest.com Wed Jan 20 13:09:47 PST 2016 FIPS_LOG_ENTRY MESSAGE=Connecting to remote host DESTINATION=192.168.1.10 IDENTITY=swg.ibosstest.com SERVICE TYPE=WEBCOMMUNICATION Fields Contained in the Entry: Message identifying the connection to the remote server Destination is the remote IP address Identity is the hostname of the remote server Service type is the kind of network communication iii. Termination Jan 21 06:59:44 reporter.ibosstest.com Thu Jan 21 06:59:44 PST 2016 FIPS_LOG_ENTRY MESSAGE=Disconnecting from remote host DESTINATION=192.168.1.10 IDENTITY=swg.ibosstest.com SERVICE TYPE=WEBCOMMUNICATION Fields Contained in the Entry: Message identifying the disconnection from the remote server Destination is the remote IP address Identity is the hostname of the remote server Service type is the kind of network communication b. 14600 LDAP i. Failure Logs from [v1.2] Jan 19 16:28:54 reporter.ibosstest.com Tue Jan 19 16:28:54 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update network ldap test Bind to LDAP server failed. Code -1. IDENTITY=igl Fields Contained in the Entry: Message identifying the failure to connect to the LDAP server Identity is the user name attempting to establish the connection test Jan 21 06:59:05 reporter.ibosstest.com Thu Jan 21 06:59:05 PST 2016 FIPS_LOG_ENTRY MESSAGE=Server chose TLSv1, but that protocol version is not enabled or not supported by the client. DESTINATION=192.168.1.1 IDENTITY=ldap.ibosstest.com REASON=Other configuration issue SERVICE TYPE=LDAP Fields Contained in the Entry: Page 20 of 40 Message identifying the failure to connect to the LDAP server Destination is the remote IP address of the LDAP server Identity is the hostname of the LDAP server Reason is the classification of the error message Service type is the kind of network communication ii. Establishment Jan 20 14:36:47 reporter.ibosstest.com Wed Jan 20 14:36:47 PST 2016 FIPS_LOG_ENTRY MESSAGE=Binding to LDAP Server IDENTITY=10.128.16.101 Fields Contained in the Entry: Message identifying the starting of the connection to the LDAP server Identity is the IP Address of the LDAP server iii. Termination Jan 20 14:36:47 reporter.ibosstest.com Wed Jan 20 14:36:47 PST 2016 FIPS_LOG_ENTRY MESSAGE=UnBinding to LDAP Server IDENTITY=10.128.16.101 Fields Contained in the Entry: Message identifying the disconnecting for the LDAP server Identity is the IP Address of the LDAP server c. 14600 Update i. Failure Logs Jan 21 08:51:39 reporter.ibosstest.com Thu Jan 21 08:51:39 PST 2016 FIPS_LOG_ENTRY MESSAGE=206.125.47.2 Failed to download firmware update. Fields Contained in the Entry: Message identifying the download of a firmware including the IP Address of the iboss update server update failed ii. Establishment Jan 21 08:51:19 reporter.ibosstest.com Thu Jan 21 08:51:19 PST 2016 FIPS_LOG_ENTRY MESSAGE=206.125.47.2 Successfully checked for firmware update. Fields Contained in the Entry: Message identifying the check for firmware from the iboss update server including the IP Address of the server iii. Termination Jan 21 08:16:51 reporter.ibosstest.com Thu Jan 21 08:16:51 PST 2016 FIPS_LOG_ENTRY MESSAGE=Successfully downloaded firmware update. Fields Contained in the Entry: Message identifying the download of a firmware update including the IP Address of the iboss update serverOR Jan 21 08:51:39 reporter.ibosstest.com Thu Jan 21 08:51:39 PST 2016 FIPS_LOG_ENTRY MESSAGE=206.125.47.2 Failed to download firmware update. Page 21 of 40 Fields Contained in the Entry: Message identifying the failure to download a including the IP Address of the iboss update server firmware update d. 7960 LDAP i. Failure Jan 20 12:24:13 reporter.ibosstest.com Wed Jan 20 12:24:13 PST 2016 FIPS_LOG_ENTRY MESSAGE=sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target DESTINATION=192.168.1.1 IDENTITY=ldap.ibosstest.com REASON=Other configuration issue SERVICE TYPE=LDAP Fields Contained in the Entry: Message identifying a failure to communicate with the LDAP and a reason why the failure occurred Destination provides the remote LDAP server Identity provides the hostname of the LDAP server Reason provides the classification of error Service type defines the type of communication Jan 20 12:33:57 reporter.ibosstest.com Wed Jan 20 12:33:57 PST 2016 FIPS_LOG_ENTRY MESSAGE=javax.naming.InvalidNameException: [LDAP: error code 34 invalid DN]; remaining name '' DESTINATION=192.168.1.1 IDENTITY=ldap.ibosstest.com REASON=Other configuration issue SERVICE TYPE=LDAP Fields Contained in the Entry: Message identifying a failure to communicate with the LDAP and a reason why the failure occurred Destination provides the remote LDAP server Identity provides the hostname of the LDAP server Reason provides the classification of error Service type defines the type of communication ii. Establishment Jan 20 12:24:13 reporter.ibosstest.com Wed Jan 20 12:24:13 PST 2016 FIPS_LOG_ENTRY MESSAGE=Starting LDAP communication DESTINATION=192.168.1.1 IDENTITY=ldap.ibosstest.com SERVICE TYPE=LDAP Fields Contained in the Entry: Message identifying the start of LDAP communication Destination provides the remote LDAP server Identity provides the hostname of the LDAP server Service type defines the type of communication iii. Termination Jan 20 12:24:13 reporter.ibosstest.com Wed Jan 20 12:24:13 PST 2016 FIPS_LOG_ENTRY MESSAGE=Completed LDAP communication DESTINATION=192.168.1.1 IDENTITY=ldap.ibosstest.com SERVICE TYPE=LDAP Page 22 of 40 Fields Contained in the Entry: Message identifying the end of the LDAP communication Destination provides the remote LDAP server Identity provides the hostname of the LDAP server Service type defines the type of communication e. 7960 Syslog i. Failure: N/A, the TSF does not cache and re-send audit logs generated while the Syslog server is unavailable. ii. Establishment Jan 21 08:28:56 reporter.ibosstest.com Thu Jan 21 08:28:56 PST 2016 FIPS_LOG_ENTRY MESSAGE=Syslog system has initialized and started DESTINATION=192.168.1.1 IDENTITY=syslog.ibosstest.com SERVICE TYPE=SYSLOG Fields Contained in the Entry: Message identifying the start of the syslog connection Destination provides the remote host of the syslog server Identity provides the hostname of the syslog server Service type defines the type of communication iii. Termination Jan 21 09:37:33 reporter.ibosstest.com Thu Jan 21 09:37:33 PST 2016 FIPS_LOG_ENTRY MESSAGE=Syslog system is shutting down DESTINATION=192.168.1.1 IDENTITY=syslog.ibosstest.com SERVICE TYPE=SYSLOG Fields Contained in the Entry: Message identifying the termination of the syslog connection Destination provides the remote host of the syslog server Identity provides the hostname of the syslog server Service type defines the type of communication f. 7960: SMTP i. Failure Jan 20 12:47:14 reporter.ibosstest.com Wed Jan 20 12:47:14 PST 2016 FIPS_LOG_ENTRY MESSAGE=Error while sending email. Error message is: 454 4.7.0 TLS not available due to local problem REASON=Other configuration issue SERVICE TYPE=EMAIL Fields Contained in the Entry: Message identifying the failure to send an email including a reason why Reason provides the classification of the error Service type defines the type of communication Jan 20 12:50:54 reporter.ibosstest.com Wed Jan 20 12:50:54 PST 2016 FIPS_LOG_ENTRY MESSAGE=Error while sending email. Error message is: Could not convert socket to TLS REASON=Other configuration issue SERVICE TYPE=EMAIL Page 23 of 40 Fields Contained in the Entry: Message identifying the failure to send an email including a reason why Reason provides the classification of the error Service type defines the type of communication ii. Establishment Jan 20 12:42:28 reporter.ibosstest.com Wed Jan 20 12:42:28 PST 2016 FIPS_LOG_ENTRY MESSAGE=Preparing to send email. DESTINATION=192.168.1.1 IDENTITY=smtp.ibosstest.com SERVICE TYPE=EMAIL Fields Contained in the Entry: Message identifying the start of the transaction Destination provides the IP address of the remote host Identity provides the hostname of the remote host Service type defines the type of communication iii. Termination Jan 20 12:42:28 reporter.ibosstest.com Wed Jan 20 12:42:28 PST 2016 FIPS_LOG_ENTRY MESSAGE=Completed sending email. DESTINATION=192.168.1.1 IDENTITY=smtp.ibosstest.com SERVICE TYPE=EMAIL Fields Contained in the Entry: Message identifying the completion of the transaction Destination provides the IP address of the remote host Identity provides the hostname of the remote host Service type defines the type of communication g. 7960: Update i. Failure Jan 20 10:25:12 reporter.ibosstest.com Wed Jan 20 10:25:12 PST 2016 FIPS_LOG_ENTRY MESSAGE=Failed web connection because of SSL Exception sun.security.validator.ValidatorException: PKIX path validation failed: java.security.cert.CertPathValidatorException: Algorithm constraints check failed: SHA1withRSA DESTINATION=206.125.47.2 IDENTITY=pudsus1.ibossconnect.com REASON=Cryptographic Mismatch SERVICE TYPE=WEBCOMMUNICATION Fields Contained in the Entry: Message identifying a failure to connect to the remote host including a reason for the failure Destination provides the IP address of the remote host Identity provides the hostname of the remote host Reason for the failure to establish the connection Service type defines the type of communication ii. Establishment Page 24 of 40 Jan 20 10:25:12 reporter.ibosstest.com Wed Jan 20 10:25:12 PST 2016 FIPS_LOG_ENTRY MESSAGE=Connecting to remote host DESTINATION=206.125.47.2 IDENTITY=pudsus1.ibossconnect.com SERVICE TYPE=WEBCOMMUNICATION Fields Contained in the Entry: Message identifying a web connection is being made to a remote host Destination provides the IP address of the remote host Identity provides the hostname of the remote host iii. The Service type defines the type of communication Jan 21 09:39:38 reporter.ibosstest.com Thu Jan 21 09:39:38 PST 2016 FIPS_LOG_ENTRY MESSAGE=Disconnecting from remote host DESTINATION=192.168.1.10 IDENTITY=swg.ibosstest.com SERVICE TYPE=WEBCOMMUNICATION Fields Contained in the Entry: Message identifying disconnecting web connection from a remote host Destination provides the IP address of the remote host Identity provides the hostname of the remote host The Service type defines the type of communication Failed web interface authentication, provided user identity and the IP Address of the non-TOE endpoint. The event will also identify when the account is locked from further attempts. o Establishment/Termination are covered by FIA_UIA_EXT.1 and FTA_SSL_EXT.4. o 14600 Failure to establish: Jan 21 10:25:19 reporter.ibosstest.com Thu Jan 21 10:25:19 PST FIPS_LOG_ENTRY MESSAGE=192.168.1.100 SSL ERROR: Cryptographic Mismatch 2016 Fields Contained in the Entry: o Message identifying a remote host provided an invalid ssl request that did not match the supported ssl configuration including the origin of the remote client7960 Failure to establish: Jan 20 12:13:42 reporter.ibosstest.com Wed Jan 20 12:13:42 PST 2016 FIPS_LOG_ENTRY MESSAGE=Login Attempt Failed ORIGIN=192.168.1.100 IDENTITY=admin Fields Contained in the Entry: Message identifying user attempted to login The origin of the remote host The identity of the username provided for login attempt Successful website authentication, authenticated user identity and use of the local console identification and authentication mechanism o 14600: Jan 20 12:49:16 reporter.ibosstest.com Wed Jan FIPS_LOG_ENTRY MESSAGE=Login Failed IDENTITY=nouser 20 12:49:16 PST 2016 Page 25 of 40 Fields Contained in the Entry: Message identifying user attempted to login The identity of the username provided for login attempt Jan 20 12:49:36 reporter.ibosstest.com Wed Jan 20 12:49:36 FIPS_LOG_ENTRY MESSAGE= fips banner Login Success IDENTITY=igl PST 2016 Fields Contained in the Entry: Message identifying user successfully logged into the SWG The identity of the user who logged in Jan 20 12:50:36 reporter.ibosstest.com Wed Jan 20 12:50:36 PST 2016 FIPS_LOG_ENTRY MESSAGE=User Password incorrect for console IDENTITY=igl Fields Contained in the Entry: Message identifying user attempted to login with an incorrect password The identity of the user who attempted to login Jan 20 12:50:46 reporter.ibosstest.com Wed FIPS_LOG_ENTRY MESSAGE=Admin Successfully IDENTITY=admin Jan 20 logged 12:50:46 PST 2016 in to console Fields Contained in the Entry: Message identifying successful user login to the local console The name of the user who accessed the serial port o 7960: Logs from [v1.2] Jan 15 16:35:18 reporter.ibosstest.com Fri Jan 15 16:35:18 PST 2016 FIPS_LOG_ENTRY MESSAGE=Login Successful ORIGIN=192.168.1.100 IDENTITY=admin Fields Contained in the Entry: Message identifying successful user login to the Report Manager interface The origin is identifying the remote IP Address The name of the user who logged into the Report Manager Jan 15 16:37:01 reporter.ibosstest.com Fri Jan 15 16:37:01 PST 2016 FIPS_LOG_ENTRY MESSAGE=Login Attempt Failed ORIGIN=192.168.1.100 IDENTITY=admin Fields Contained in the Entry: Message identifying a user failed to log into Report Manager interface The origin is identifying the remote IP Address The name of the user who attempted to login Jan 15 16:31:57 reporter.ibosstest.com Fri Jan 15 16:31:57 FIPS_LOG_ENTRY MESSAGE=Login Attempt Failed ORIGIN=Serial Port PST 2016 Fields Contained in the Entry: Message identifying a user failed to log into the local console The origin is identifying the local serial port Jan 15 16:32:11 reporter.ibosstest.com Fri Jan 15 16:32:11 PST 2016 FIPS_LOG_ENTRY MESSAGE=Login Successful ORIGIN=Serial Port IDENTITY=admin Fields Contained in the Entry: Message identifying a user successfully logged into the Report Manager Page 26 of 40 The origin is identifying the local serial port The identity of the user who is logging into the console Changes to the time caused by the NTP server (if over a minimum threshold). Old and new values for the time and IP address of the NTP server. o 14600 NTP: Jan 20 14:27:27 reporter.ibosstest.com Wed Jan 20 14:27:27 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update preferences time Changing System Time from Wed Jan 20 16:45:32 PST 2016 IDENTITY=admin Fields Contained in the Entry: Message identifying the system time is being updated from the time value The identity of the user who is making the adjustment to the time Jan 20 14:27:27 reporter.ibosstest.com Wed Jan 20 14:27:27 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update preferences time Success Changing System Time to 16:55:32 1.20.2016 IDENTITY=admin Fields Contained in the Entry: Message identifying the update to the system time including the new time value o The identity of the user who made the time change7960 Admin Jan 20 14:19:02 reporter.ibosstest.com Wed Jan 20 14:19:02 PST 2016 FIPS_LOG_ENTRY MESSAGE=System DateTime has changed IDENTITY=admin ORIGINAL_VALUE=1/20/16 2:19 PM NEW_VALUE=1/20/16 11:55 AM Fields Contained in the Entry: Message identifying the system time was updated by NTP The identity of the user who triggered the time check The original time value before the update The new value after the time update o 7960 NTP: Jan 20 12:00:16 reporter.ibosstest.com Wed Jan 20 12:00:16 PST 2016 FIPS_LOG_ENTRY MESSAGE=System time updated by NTP, elapsed change is 8891 IDENTITY=time.nist.gov ORIGINAL_VALUE=1453320007609 NEW_VALUE=1453320016500 Fields Contained in the Entry: Message identifying the system time was updated by NTP and the amount of the change The identity of the time server that was used to determine the time The original time value before the update The new value after the time update Termination of a web session due to user logout. Identity of the user who logged out and IP Address of the non-TOE endpoint. Page 27 of 40 o 14600 Local: Jan 20 12:56:56 reporter.ibosstest.com Wed Jan 20 12:56:56 PST FIPS_LOG_ENTRY MESSAGE=Admin User Logout of console IDENTITY=admin 2016 Fields Contained in the Entry: Message identifying a user logged out of the local console The identity of the user who logged out o 14600 Remote: Jan 20 12:56:46 reporter.ibosstest.com Wed Jan 20 12:56:46 PST FIPS_LOG_ENTRY MESSAGE=You have successfully logged out. IDENTITY=igl 2016 Fields Contained in the Entry: Message identifying a user logged out of the SWG interface The identity of the user who logged out o 7960 Local: Jan 20 11:29:06 reporter.ibosstest.com Wed Jan 20 11:29:06 PST 2016 FIPS_LOG_ENTRY MESSAGE=Session terminated due to logout ORIGIN=Serial Port IDENTITY=admin Fields Contained in the Entry: Message identifying the user logged out of the local console The origin indicating that the connection was on the local serial port The identity of the user who logged out o 7960 Remote: Jan 20 11:38:20 reporter.ibosstest.com Wed Jan 20 11:38:20 PST 2016 FIPS_LOG_ENTRY MESSAGE=Session terminated due to logout ORIGIN=192.168.1.100 IDENTITY=admin Fields Contained in the Entry: Message identifying the user logged out of the Report Manager The origin of the remote session The identity of the user who logged out Termination of a web session due to timeout. Identity of the user who logged out and IP Address of the non-TOE endpoint. o 14600: Jan 21 18:42:34 reporter.ibosstest.com Thu Jan 20 18:42:34 PST 2016 FIPS_LOG_ENTRY MESSAGE=192.168.1.100 User logged into admin interface, but session timed out IDENTITY=igl Fields Contained in the Entry: Message identifying a user was logged out because of a session timeout including the remote IP address of the user The identity of the user who was logged out o 7960: Page 28 of 40 Jan 20 11:43:43 reporter.ibosstest.com Wed Jan FIPS_LOG_ENTRY MESSAGE=Session terminated ORIGIN=192.168.1.100 IDENTITY=admin 20 11:43:43 due to PST 2016 timeout Fields Contained in the Entry: Message identifying a user was logged out because of a session timeout The origin of the remote request to the Report Manager The identity of the user who was logged out Changes to TOE related settings that affect the operation of the system, the name of the setting and the username of the authorized user who made the change h. 7960: i. Change own password: Logs from [v1.2] Jan 18 09:59:01 reporter.ibosstest.com Mon Jan 18 09:59:01 PST 2016 FIPS_LOG_ENTRY MESSAGE=User updated IDENTITY=test NEW_VALUE=UserName:test,FirstName:,LastName: Fields Contained in the Entry: Message identifying a user has been updated on the Report Manager The name of the user who updated the user The new value field contains the name of the user who was updated ii. Change other password: Logs from [v1.2] Jan 18 10:07:13 reporter.ibosstest.com Mon Jan 18 10:07:13 PST 2016 FIPS_LOG_ENTRY MESSAGE=User updated IDENTITY=admin NEW_VALUE=UserName:test,FirstName:,LastName: Fields Contained in the Entry: Message identifying a user has been updated on the Report Manager The name of the user who updated the user The new value field contains the name of the user who was updated iii. New User: Logs from [v1.2] Jan 18 09:28:02 reporter.ibosstest.com Mon Jan 18 09:28:02 PST 2016 FIPS_LOG_ENTRY MESSAGE=User created IDENTITY=admin NEW_VALUE=UserName:test,FirstName:,LastName: Fields Contained in the Entry: Message identifying a user has been removed from the Report Manager The name of the user who deleted the user The new value field contains the name of the user who was removed iv. Delete User: Logs from [v1.2] Jan 18 10:07:42 reporter.ibosstest.com Mon Jan 18 10:07:42 PST 2016 FIPS_LOG_ENTRY MESSAGE=User deleted IDENTITY=admin NEW_VALUE=UserName:test2,FirstName:,LastName: Fields Contained in the Entry: Message identifying a user has been removed from the Report Manager The name of the user who deleted the user Page 29 of 40 The new value field contains the name of the user who was removed v. Configure Syslog: Jan 20 13:14:55 reporter.ibosstest.com Wed Jan 20 13:14:55 PST 2016 FIPS_LOG_ENTRY MESSAGE=SyslogLoggingPort setting changed IDENTITY=admin ORIGINAL_VALUE=6514 NEW_VALUE=514 Fields Contained in the Entry: Message identifying the syslog port has been updated The name of the user who modified the settings The original value for the syslog port The new value for the syslog port vi. Configure LDAP: Jan 20 12:36:57 reporter.ibosstest.com Wed Jan 20 12:36:57 PST 2016 FIPS_LOG_ENTRY MESSAGE=LdapAdminPassword setting changed IDENTITY=admin Fields Contained in the Entry: Message identifying the password for the ldap user has been updated The name of the user who modified the settingsJan 20 12:36:57 reporter.ibosstest.com Wed Jan 20 12:36:57 PST 2016 FIPS_LOG_ENTRY MESSAGE=LdapAdminUsername setting changed IDENTITY=admin ORIGINAL_VALUE=sdlab\minion1 NEW_VALUE=cn=igl_admin,dc=ibosstest,dc=com Fields Contained in the Entry: Message identifying the ldap server usename has been changed The name of the user who modified the settings The original ldap username The new value for the ldap username Jan 20 12:36:57 reporter.ibosstest.com Wed Jan 20 12:36:57 PST 2016 FIPS_LOG_ENTRY MESSAGE=LdapHost setting changed IDENTITY=admin ORIGINAL_VALUE=dc1.sdlab.iblabs.loc NEW_VALUE=ldap.ibosstest.com Fields Contained in the Entry: Message identifying the ldap server has been updated The name of the user who modified the settings The original ldap server The new value for the ldap server Jan 20 12:36:57 reporter.ibosstest.com Wed Jan 20 12:36:57 PST 2016 FIPS_LOG_ENTRY MESSAGE=LdapSearchBase setting changed IDENTITY=admin ORIGINAL_VALUE=dc=sdlab,dc=iblabs,dc=loc NEW_VALUE=dc=ibosstest,dc=com Fields Contained in the Entry: Message identifying the ldap search base has been modified The name of the user who modified the settings The original value of search base The new value for the search base Page 30 of 40 vii. Configure SMTP: Jan 20 13:07:57 reporter.ibosstest.com Wed Jan 20 13:07:57 PST 2016 FIPS_LOG_ENTRY MESSAGE=SMTPServer setting changed IDENTITY=admin ORIGINAL_VALUE=it.ibosstest.com NEW_VALUE=smtp.ibosstest.com Fields Contained in the Entry: Message identifying the smtp server settings were changed The name of the user who modified the smtp server settings The original value of the smtp server The new value for the smtp server viii. Min PW Length Change: Logs from [v1.2] Jan 18 10:10:25 reporter.ibosstest.com Mon Jan 18 10:10:25 PST 2016 FIPS_LOG_ENTRY MESSAGE=UserMinimumPasswordLength setting changed IDENTITY=admin ORIGINAL_VALUE=15 NEW_VALUE=32 Fields Contained in the Entry: Message identifying the minimum password length was changed The name of the user who changed the password length setting The original value for the password length The new value for the password length ix. FTA TAB: Logs from [v1.2] Jan 18 10:10:55 reporter.ibosstest.com Mon Jan 18 10:10:55 PST 2016 FIPS_LOG_ENTRY MESSAGE=LoginBannerText setting changed IDENTITY=admin ORIGINAL_VALUE=CC Login Banner NEW_VALUE=CC Login Banner 2 Fields Contained in the Entry: Message identifying the login banner text was changed The name of the user who changed the login banner text The original value of the login banner text The new value of the login banner text i. NTP Server Config: Jan 20 12:03:26 reporter.ibosstest.com Wed Jan 20 12:03:26 PST 2016 FIPS_LOG_ENTRY MESSAGE=NTP Time server has changed IDENTITY=admin ORIGINAL_VALUE=time.nist.gov NEW_VALUE=it.ibosstest.com Fields Contained in the Entry: Message identifying the time server was changed The name of the user who changed the time server The original time server being utilized by the Report Manager The new time server that will be utilized by the Report Manager ii. Delete Gateway: Logs from [v1.2] Jan 18 14:56:35 reporter.ibosstest.com Mon Jan 18 14:56:35 PST 2016 FIPS_LOG_ENTRY MESSAGE=Gateway removed. IDENTITY=admin NEW_VALUE=192.168.1.9 Page 31 of 40 Fields Contained in the Entry: Message identifying a SWG was unregistered from the Report Manager The name of the user who removed the gateway The IP Address of the gateway that was removed iii. Add Gateway: Logs from [v1.2] Jan 18 14:55:49 reporter.ibosstest.com Mon Jan 18 14:55:49 PST 2016 FIPS_LOG_ENTRY MESSAGE=New gateway added. IDENTITY=admin NEW_VALUE=192.168.1.9 Fields Contained in the Entry: Message identifying a new SWG was registered with the Report Manager The name of the user who added the new gateway iv. Report Manager Database Password change: Jan 20 13:08:43 reporter.ibosstest.com Wed Jan 20 13:08:43 PST 2016 FIPS_LOG_ENTRY MESSAGE=DatabasePassword setting changed Fields Contained in the Entry: Message identifying the database password was changed The name of the user who updated the password v. Change Idle Timeout: Jan 20 11:35:29 reporter.ibosstest.com Wed Jan 20 11:35:29 PST 2016 FIPS_LOG_ENTRY MESSAGE=UserSessionTimeoutSeconds setting changed IDENTITY=admin ORIGINAL_VALUE=1800 NEW_VALUE=300 Fields Contained in the Entry: Message identifying the user session timeout setting was adjusted The name of the user who updated the setting The original value before the change was made The new value after the change was applied i. 14600: i. Change own password: Logs from [v1.2] Jan 15 17:46:34 reporter.ibosstest.com Fri Jan 15 17:46:34 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update preferences password Successfully updated password. IDENTITY=admin Fields Contained in the Entry: Message identifying that a user updated their own password The name of the user who updated their password Jan 15 17:59:44 reporter.ibosstest.com Fri Jan 15 17:59:44 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update changePasswordSelfServiceSubmit Successfully updated password! IDENTITY=test Fields Contained in the Entry: Message identifying that a user updated their own password ii. The name of the user who updated their passwordChange other password: Page 32 of 40 Jan 20 13:01:16 reporter.ibosstest.com Wed Jan 20 13:01:16 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update users Successfully updated user. IDENTITY=admin Fields Contained in the Entry: Message identifying the update of a user by the administrator The name of the user who made the update iii. New User: Logs from [v1.2] Jan 15 17:58:04 reporter.ibosstest.com Fri Jan 15 17:58:04 PST 2016 FIPS_LOG_ENTRY MESSAGE=Create users Successfully added user. IDENTITY=admin Fields Contained in the Entry: Message identifying the creation of a new user in the SWG The name of the user who added the new user iv. Delete User: Logs from [v1.2] Jan 15 18:32:44 reporter.ibosstest.com Fri Jan 15 18:32:44 PST 2016 FIPS_LOG_ENTRY MESSAGE=Delete users Successfully removed user(s). IDENTITY=admin Fields Contained in the Entry: Message identifying the deletion of users from the SWG The name of the user who deleted the users v. Configure LDAP: Logs from [v1.2] Jan 15 18:36:54 reporter.ibosstest.com Fri Jan 15 18:36:54 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update network ldap Successfully added LDAP server!. IDENTITY=admin Fields Contained in the Entry: Message identifying the change in network ldap settings The name of the user who made the change vi. Min PW Length Change: Logs from [v1.2] Jan 15 18:35:14 reporter.ibosstest.com Fri Jan 15 18:35:14 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update preferences settings Settings saved successfully. IDENTITY=admin Fields Contained in the Entry: Message identifying the change in SWG report Settings The name of the user who made the change vii. FTA TAB: Logs from [v1.2] Jan 15 18:35:14 reporter.ibosstest.com Fri Jan 15 18:35:14 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update preferences settings Settings saved successfully. IDENTITY=admin Fields Contained in the Entry: Message identifying the change in SWG report Settings The name of the user who made the change viii. Report Manager Database Password change: Page 33 of 40 Jan 20 13:09:06 reporter.ibosstest.com Wed Jan 20 13:09:06 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update preferences reportSettings Successfully stored settings. IDENTITY=admin Fields Contained in the Entry: Message identifying the change in SWG report Settings The name of the user who made the change ix. Change Idle Timeout: Logs from [v1.2] Jan 15 15:51:12 reporter.ibosstest.com Fri Jan 15 15:51:12 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update preferences settings Settings saved successfully. IDENTITY=admin Fields Contained in the Entry: Message identifying the change in SWG preferences The name of the user who made the change Termination of a local session due to timeout or logoff o 14600 Local: Jan 20 12:56:56 reporter.ibosstest.com Wed Jan 20 12:56:56 PST FIPS_LOG_ENTRY MESSAGE=Admin User Logout of console IDENTITY=admin 2016 Fields Contained in the Entry: Message identifying the end of the session with the local Report Manager interface o The name of the user who initiated the logout request14600 Remote: Jan 21 18:37:24 reporter.ibosstest.com Thu Jan 21 18:37:24 PST FIPS_LOG_ENTRY MESSAGE=192.168.1.100 You have successfully logged IDENTITY=admin 2016 out. Fields Contained in the Entry: Message identifying the end of the session with the SWG interface including the remote IP address connected to the interface The name of the user who initiated the logout request o 7960 Local: Jan 20 11:29:06 reporter.ibosstest.com Wed Jan 20 11:29:06 PST 2016 FIPS_LOG_ENTRY MESSAGE=Session terminated due to logout ORIGIN=Serial Port IDENTITY=admin Fields Contained in the Entry: Message identifying the end of the session with the local Report Manager interface An indicator that it came form the serial port The name of the user who initiated the logout request o 7960 Remote: Jan 20 11:38:20 reporter.ibosstest.com Wed Jan 20 11:38:20 PST 2016 FIPS_LOG_ENTRY MESSAGE=Session terminated due to logout ORIGIN=192.168.1.100 IDENTITY=admin Fields Contained in the Entry: Page 34 of 40 Message identifying the end of the session with the Report Manager The remote IP address that was accessing the interface The name of the user who initiated the logout request Initiation of an update o 14600: Jan 21 08:15:51 reporter.ibosstest.com Thu Jan 21 08:15:51 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update firmware checkForUpdate IDENTITY=admin Fields Contained in the Entry: Message identifying the request to check for firmware update The name of the user who initiated the request Jan 21 08:15:51 reporter.ibosstest.com Thu Jan 21 08:15:51 FIPS_LOG_ENTRY MESSAGE=Successfully checked for firmware update. PST 2016 Fields Contained in the Entry: Message identifying the successful check for firmware update Jan 21 08:16:11 reporter.ibosstest.com Thu Jan 21 08:16:11 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update firmware downloadFirmware Firmware download started. IDENTITY=admin Fields Contained in the Entry: Message identifying the start of the download of the firmware update The identity of the user who initiated the download. Jan 21 08:16:51 reporter.ibosstest.com Thu Jan 21 08:16:51 FIPS_LOG_ENTRY MESSAGE=Successfully downloaded firmware update. PST 2016 Fields Contained in the Entry: Message identifying the successful download of the firmware update Jan 21 08:17:31 reporter.ibosstest.com Thu Jan 21 08:17:31 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update firmware install Installing Firmware IDENTITY=admin Fields Contained in the Entry: Message identifying the start of the firmware update process The name of the user who initiated the installation of the update Jan 21 08:34:19 reporter.ibosstest.com Thu Jan 21 08:34:19 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update firmware downloadFirmware Firmware download started. IDENTITY=admin Fields Contained in the Entry: Message identifying the start of the firmware update process The Identity of the user who initiated the action Jan 21 08:34:49 reporter.ibosstest.com Thu Jan 21 08:34:49 PST 2016 FIPS_LOG_ENTRY MESSAGE=206.125.47.2 Failed to validate signature on download Fields Contained in the Entry: Message identifying failure to validate firmware update and the IP address of the iboss update server hosting the updateJan 21 08:34:49 Page 35 of 40 reporter.ibosstest.com Thu Jan 21 08:34:49 PST 2016 MESSAGE=206.125.47.2 Failed to download firmware update. FIPS_LOG_ENTRY Fields Contained in the Entry: Message identifying failure to download firmware update including the IP address of the iboss update server hosting the update o 7690: Jan 21 11:26:41 reporter.ibosstest.com Thu Jan 21 11:26:41 PST FIPS_LOG_ENTRY MESSAGE=Checking for firmware update IDENTITY=admin 2016 Fields Contained in the Entry: Message identifying a request to check for a firmware update The Identity of the user triggering the firmware update check Jan 21 11:27:01 reporter.ibosstest.com Thu FIPS_LOG_ENTRY MESSAGE=Initiating firmware Contained in the Entry: Jan 21 11:27:01 PST 2016 update IDENTITY=adminFields Message identifying a firmware update was started The Identity of the user initiating the updateJan 21 09:39:33 reporter.ibosstest.com Thu Jan 21 09:39:33 PST 2016 FIPS_LOG_ENTRY MESSAGE=Checking for firmware update IDENTITY=admin Fields Contained in the Entry: Message identifying that a firmware update was requested The Identity of the user initiating the action Jan 21 09:40:08 reporter.ibosstest.com Thu Jan 21 09:40:08 FIPS_LOG_ENTRY MESSAGE=Failed to verify signature of DESTINATION=206.125.47.2 IDENTITY=pudsus1.ibossconnect.com TYPE=UPDATE PST 2016 download SERVICE Fields Contained in the Entry: Message identifying failure to valid firmware update The Destination ip of the iboss update server The URL of the iboss update server An indicator that the server was attempting to perform an update Changes to the time as a result of an administrative action o 14600 NTP: Jan 20 14:27:27 reporter.ibosstest.com Wed Jan 20 14:27:27 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update preferences time Changing System Time from Wed Jan 20 16:45:32 PST 2016 IDENTITY=admin Fields Contained in the Entry: Message identifying a user requested a change to the system time including the value before update The Identify of the user who made the change Jan 20 14:27:27 reporter.ibosstest.com Wed Jan 20 14:27:27 PST 2016 FIPS_LOG_ENTRY MESSAGE=Update preferences time Success Changing System Time to 16:55:32 1.20.2016 IDENTITY=admin Page 36 of 40 Fields Contained in the Entry: Message identifying a user successfully changed the system time including updated value after update The user who made the change o 7960 Admin Jan 20 14:19:02 reporter.ibosstest.com Wed Jan 20 14:19:02 PST 2016 FIPS_LOG_ENTRY MESSAGE=System DateTime has changed IDENTITY=admin ORIGINAL_VALUE=1/20/16 2:19 PM NEW_VALUE=1/20/16 11:55 AM Fields Contained in the Entry: Message identifying that a user manually updated the server time The Identity of the user who made the change The original value before the Update The new value after the Update o 7960 NTP: Jan 20 12:00:16 reporter.ibosstest.com Wed Jan 20 12:00:16 PST 2016 FIPS_LOG_ENTRY MESSAGE=System time updated by NTP, elapsed change is 8891 IDENTITY=time.nist.gov ORIGINAL_VALUE=1453320007609 NEW_VALUE=1453320016500 Fields Contained in the Entry: Message identifying that the time was updated by the NTP service and the amount that the time was adjusted The Identity of the NTP server that was utilized to adjust the time The original value before NTP Update The new time after NTP Update Page 37 of 40 8 Processes Process Server Lockbox.bin SWG HW Ring 4 SW Privilege Root Description ibreports SWG and Report Manager 4 Root Httpd SWG and Report Manager 4 Root Squid SWG 4 Root Snort SWG 4 Root SWG accepts connections on port 80 and 443 for user activities. SWG listens on all ports 1 – 65535 to sense potentially dangerous traffic entering or leaving the network. Performs requests over TLS on port 443 to check for available updates and to perform the download of updates. SWG secure front end interface on port 7443 SWG dns port 53 Report Manager communicates with LDAP, SMTP, NTP, and Syslog services over configured ports. Performs requests over TLS on port 443 to check for available updates and to perform the download of updates. Apache web server that listens on port 80 and 443 to process http web traffic from end users. Requests to port 80 are redirected to port 443. Daemon process that listens for proxy requests on port 7009 by default and also listens on port 9443 in order to perform SSL MITM Decryption. Performs analysis of network traffic in tap mode to identify and prevent signature based threats. Page 38 of 40 9 Features 9.1 Evaluated Features Unless noted in the following sections the remaining features on the SWG and Report Manager have been evaluated for Common Criteria Protection Profile. 9.2 Disabled Features 9.2.1 Features Disabled in Common Criteria and FIPS mode 9.2.1.1 Report Manager Settings – General Settings – SNMP Monitoring Settings – OAuth2 Integration Settings – SDN Controller Integration Settings – iboss MobileEther MDM Integration Settings - Remote Management 9.2.1.2 Secure Web Gateway Remote Management 9.2.2 Features Disabled in FIPS mode 9.2.2.1 Secure Web Gateway LDAP Authentication TLS Protected communication between Secure Web Gateway and Report Manager 9.3 Modified Features The following features are modified while in FIPS and Common Criteria mode 9.3.1 Report Manager The following feature will only allow communication over a channel that utilizing TLS v 1.1 or 1.2 Settings – LDAP Settings Settings - Syslog Logging Settings – Email Server Settings The following features have been modified to not display private key data or passwords SMB – Backup of reports and logs Settings – Certificates The following features have the ability to modify the level of compliance of the system Settings – Additional Settings – Compliance Mode Page 39 of 40 9.3.2 Secure Web Gateway The following features have the ability to modify the level of compliance of the system Preferences – System Settings 9.4 Unevaluated Features The following features have not been evaluated for compliance with common criteria Man in the Middle SSL Decryption IPS and data loss protection Web Filtering Auto Sandboxing Bandwidth Shaping BYOD, AD Plugin, Google SSO, iboss NetID SSO, eDirectory (User Authentication related to web filtering) Data Redirectors Bandwidth Tracking Clustering Settings – Splunk Integration Utilization of the internal Report Manager 9.5 Out of Compliance Features The following features can be enabled. However, when they are enabled they will compromise the validity of the common criteria certification. SMB backup of log data does not meet the trusted channel requirements. If this feature is enabled, this will be out of compliance of common criteria. SNMP is out of compliance Page 40 of 40
© Copyright 2026 Paperzz