Cisco Cat4K NDPP ST    11 March 2014 
EDCS-1228241 
 
10 
Usage/Purpose Description for TOE performance 
SSHv2 and a key size of 2048 bits or greater may be used. 
The syslog audit server is used for remote storage of audit 
records that have been generated by and transmitted from 
the  TOE. The  TOE  would  ensure  that  messages  are 
encrypted within an  IPsec tunnel as they leave the TOE.  
The syslog server needs to be able  of acting as an IPsec 
peer or as an IPsec endpoint. 
The TOE supports communications with an NTP server to 
receive  clock  updates.  Any  server  that  supports  NTPv1 
(RFC 1059), NTPv2 (RFC 1119), or NTP v3 (RFC 1305) 
may be used. 
1.4  TOE Description 
The TOE description explains  the  TOE in  more detail than was  provided  in the TOE 
overview. 
1.4.1  TOE Architecture and Security Capabilities 
The Cisco Catalyst 4500 Series are network devices that protect themselves by offering 
only a minimal logical interface to the network and control of that interface.  The Switch 
IOS subsystem is special purpose software that runs on the Cisco Catalyst 4500 Series 
Switch  hardware.  The  Catalyst  Switches  have  been  designed  so  that  all  locally 
maintained security relevant data can only be manipulated via the secured management 
interface, a CLI and provides no general purpose programming capability.  There are no 
undocumented interfaces for managing the Catalyst switches.   
 
All  network  traffic  to  the  TOE  protected  (internal)  network  passes  through  Catalyst 
Switches. There are no unmediated traffic flows into or out of the TOE.  Once network 
traffic is received on one of the network ports, it is always subject to the security policy 
rules  as  applied  to  each  traffic flow.    Traffic  flows  characterized as  unauthorized  are 
discarded  and  not  permitted  to  circumvent  the  Catalyst  Switch.    Configuration  and 
management  of  the  Catalyst  Switch  is  through  an  SSHv2  session  via  Management 
workstation or via a local console connection.  The management interfaces require user 
identification and authentication prior to allowing management operations.  As described 
in Section 6, all management functions are restricted to the authorized administrator of 
the  TOE.  The  term  “authorized  administrator”
  is  used  in  this  ST  to  refer  to  any 
administrative  user  which  has  been  assigned  to  a  privilege  level  that  is  permitted  to 
perform  the  relevant  action;  therefore  has  the  appropriate  privileges  to  perform  the 
requested functions.   
 
 
  Note,  the  term  ‘authorized  administrator’  as  used  in  this  ST  is  synonymous  with  the  ‘Security 
Administrator’ referenced in the NDPP.