zxr10 m6000 PDF
zxr10 m6000 PDF
zxr10 m6000 PDF
ZTE CORPORATION
NO. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://ensupport.zte.com.cn
E-mail: support@zte.com.cn
Version: R1.6
Revision History
II
1.1 ST IDENTIFICATION
1.1.1 ST Title
V1.6 of the Security Target for the ZXR10 M6000&T8000&8900E Series Routers and
Switches running the ZXROSNG Operating System.
1.1.2 References
The following documentation was used to prepare this ST.
[CCp1]
Common Criteria for Information Technology Security Evaluation – Part 1:
Introduction and general model, dated July 2009, Version 3.1 Revision 3 Final, CCMB-
2009-07-001
[CCp2]
Common Criteria for Information Technology Security Evaluation – Part 2:
Security functional requirements, dated July 2009, Version 3.1 Revision 3 Final,
CCMB-2009-07-002
[CCp3]
Common Criteria for Information Technology Security Evaluation – Part 3:
Security assurance requirements, dated July 2009, Version 3.1 Revision 3 Final,
CCMB-2009-07-003
[CEM]
1-1
M6000-8 8 x PFU
4 x SFU
2 x MPU
M6000-16 16 x PFU
4 x SFU
2 x MPU
à 1 x RS232 Console
M6000-3S 3 x PFU
2 x MPU
M6000-5S 5 x PFU
2 x SRU
1-2
à 1 x RS232 Console
T8000 16 x PFU
4 x SFU
2 x MPU
à 1 x RS232 Console
8902E 2 x MCS
2 x LIC
8905E 2 x MCS
5 x LIC
8908E 2 x MCS
8 x LIC
8912E 2 x MCS
12 x LIC
à 1 x RS232 Console
1-3
The major difference between models is the type, capacity and number of the physical
interfaces described in the above table.
The TOE enables the delivery of metro Ethernet services and high-density service-aware
Ethernet aggregation over IP/ MPLS-based networks.
The supported protocols are layer 2 / layer 3 encapsulation and Internet Protocol (IP), and
Ethernet. Other protocols may be supported by the product, but are not evaluated (see
section 1.4.3).
The major security features of the TOE are:
l Handling of packet flows using the RIPv2, OSPFv2, IS-IS and BGPv4 protocols
l Local and remote administration
l Authentication, either in the TOE or through TACACS+ or RADIUS.
l Administrator Profiles to permit or deny access to a hierarchical branch or specific
commands.
l Audit
l Management and configuration of the TOE
l Mitigate DoS attacks
l URPF (Unicast Reverse Path Forwarding) to limit the malicious traffic
l For the SNMP server, any platform that supports RFC 3411-RFC 3418 (SNMPv3)
l For the SYSLOG server, any platform that supports RFC 3164 (SYSLOG Protocol);
1-4
All logs are stored in the TOE whenever there is new log generated and then the TOE
transferred the log files to SNMP/SYSLOG Servers with SNMP/SYSLOG network protocol
through internal network in a constant period time. The log file is stored under the ‘data’
directory of the flash/disk inside the TOE. For detail content of the log, please reference
chapter 5.1.2.1.
The TOE consists of two planes: Control plane and Forwarding plane.
1-5
Control Plane
The control plane receives configuration commands, protocol information and keep-alive
packets from other planes to implements the following functions:
l Configuration of command parameter, displaying statistics and status information.
l Local authentication, RADIUS authentication and TACACS+ authentication
l Audit logging and SNMP trapping and precise clock synchronization
l Generation of variety of configuration items such as routing tables, IP and MAC
binding table, ACL table, etc.
l Important protocols such as BGPv4 / RIPv2 / IS-IS / OSPFv2 supports variety
of authentication methods (no authentication, clear text authentication, MD5
authentication),.
Control plane sends protocol packet and table entries to the other plane.
Forwarding Plane
The forwarding plane forwards the user data, receives protocol packets, keep-alive
packets and configuration table entries from other planes. The protocol information and
keep-alive packet are sent to the network according to their priorities. To prevent IP
address theft from leased-line users, the leased-line IP addresses are bound to specific
MAC addresses. To restrict the unknown users to access the TOE, the ACL is assigned
to the network interface. By specifying the URPF to the importing network interface
and checking the consistency of the source routing address and the incoming interface,
The TOE can prevent IP spoofing attacks. To prevent DoS attacks, the TOE limits the
up-sending flow, the traffic to control plane, rate to protect the CPU when the data flow
exceeding the configured threshold, the exceeded traffic will be dropped. Then the TOE
dispatches incoming packets to control plane.
The forwarding plane also provides statistical information to the other plane.
1-6
l guidance documents
l Handling of packet flows: as described above using the RIPv2, OSPFv2, IS-IS, and
BGPv4 protocols which can prevent the communication with trusted routers from
modification, insertion and replay errors. Packet flows can be restricted to come only
from authorized sources and/or go to authorized destinations.
l Local (through a console port) and remote (protected through SSH or SNMPv3)
access to the TOE for administrators. These sessions are dropped after a
configurable amount of total session time or after a configurable amount of idle time
to prevent access to unattended open sessions.
l Authentication: Access permission is controlled using: TACACS+; RADIUS; or
local authentication. A profile, which is based on administrator name and password
configurations, is applied for the administrator authorization processes. This ST
1-7
addresses only the client-side support of RADIUS and TACACS+: the servers
themselves are out-of-scope.
l Profiles: Administrator profiles are configured to permit or deny access to a
hierarchical branch or specific commands.
l Audit: The TOE provides an audit feature for actions related to authentication attempts
and administrator actions
l Management: The TOE offers administrators the capability to configure the TOE
(primarily the packet flow handling and audit features).
l Mitigate DoS attacks through use of real-time statistics capabilities and URPF (Unicast
Reverse Path Forwarding)
l Evaluated: this means that the feature can be enabled, and it will work securely.
l Not Permitted: this means that the feature may not be enabled, as this will endanger
the security of the entire TOE.
l Not Evaluated: this means that the feature can be enabled, that enabling this feature
will not endanger the security of the other features, but the evaluation has not
determined whether the feature itself will work securely.
IGMP × ×
IPv6 × ×
1-8
NetFlow ×
SNMPv2 × ×
Telnet × ×
FTP / TFTP × ×
1-9
1-10
2-1
2-2
1. Any known or assumed threats to the assets against which specific protection within
the TOE or its environment is required
2. Any organizational security policy statements or rules with which the TOE must comply
3. Any assumptions about the security aspects of the environment and/or of the manner
in which the TOE is intended to be used.
This chapter identifies threats as T.THREAT, assumptions as A.ASSUMPTION and policies
as P.POLICY.
Table of Contents
Threat ........................................................................................................................3-1
Assumption ................................................................................................................3-2
ORGANIZATIONAL SECURITY POLICIES ................................................................3-3
3.1 Threat
A threat consists of a threat agent, an asset and an adverse action of that threat agent on
that asset.
1. Threat agents are entities that can adversely act on assets – the threat agents in the
threats below are unauthorized user, network attacker, authorized user and
2. Assets are entities that someone places value upon – the assets are access to network
services,
3. Adverse actions are actions performed by a threat agent on an asset – the adverse
actions are: unauthorized changes to configuration, both network routing configuration
and management configuration.
THREAT DESCRIPTION
3-1
THREAT DESCRIPTION
T.NO_AUTH _SESSION A user may gain unauthorized access to an unattended session and
alter the TOE security configuration.
T.NO_AUTH_ACCESS An unauthorized user gains management access to the TOE and alter
the TOE security configuration.
3.2 Assumption
The assumptions are ordered into three groups: Personnel Assumptions, Physical
Environment Assumptions, and Operational Assumptions.
ASSUMPTION DESCRIPTION
ASSUMPTION DESCRIPTION
A.CONNECTIVITY All TOE external interfaces except for the network traffic/data interface
are attached to the internal (trusted) network. This includes:
1. RADIUS, TACACS+ server interface (optional)
2. SNMP/SYSLOG interface (required)
3. NTP interface (required)
4. SSH interface for remote client (at least one of the local or
remote administration client is required)
3-2
ASSUMPTION DESCRIPTION
ASSUMPTION DESCRIPTION
OSP DESCRIPTION
P.ROUTE The TOE must be able to accept routing data from trusted routers
3-3
3-4
OBJECTIVES DESCRIPTION
O.AUDIT_REVIEW The TOE will provide the privileged administrators and authentication
administrators the capability to review Audit data and will restrict audit
review to administrators who have been granted explicit read-access.
The TOE will generate audit records which will include the time that
the event occurred and the identity of the administrator performing
the event.
O.MANAGE The TOE must provide services that allow effective management of
its functions and data and restrict access to the TOE Management
functions to the privileged administrators and authentication
administrators.
O.IDAUTH The TOE must uniquely identify and authenticate the claimed identity
of all administrative users before granting management access.
O.ROUTE The TOE shall be able to accept routing data from trusted routers
according to BGPv4/OSPFv2/IS-IS/RIPv2.
4-1
OBJECTIVES DESCRIPTION
OE.CONNECTIVITY All TOE external interfaces except for the network traffic/data interface
are attached to the internal (trusted) network. This includes:
1. RADIUS, TACACS+ server interface (optional)
2. SNMP, SYSLOG interface (required)
3. NTP interface (required)
4. SSH interface for remote client (at least one of the local or
remote administration client is required)
4-2
5.1.1 Overview
The security functional requirements for this ST consist of the following components from
Part 2 of the CC.
Identifier Name
5-1
5-2
5-3
Application Note: There is no success / failure concept for Alarm log. Therefore there is
no outcome (success or failure) for alarm log.
FAU_SAR.1.2 The TSF shall provide the audit records in a manner suitable for the user
to interpret the information.
5-4
Application Note: the TOE only accepts routing information from other routers with trusted
IPs configured by the administrators.
FDP_IFF.1.2 The TSF shall permit an information flow between a controlled subject and
controlled information via a controlled operation if the following rules hold:
1. [a. the information security attributes match the attributes in a filtering rule (contained
in the information flow policy rule set defined by the Administrator) according to the
following algorithm:
l First match. When multiple policy names are specified, the policies shall be
executed in the order they are specified. The first policy that matches is applied;
the selected information flow policy rule specifies that the information flow is to
be permitted]
2. the presumed address of the source subject, in the packet, is consistent with the
network interface it arrives on;
3. the presumed address of the destination subject, in the packet, can be mapped to a
nexthop;
4. the security attributes of the packet matches the configured route-map policy
(contained in the information flow policy rule set defined by the Administrator) and it
can be mapped to the nexthop].
Application Note: A “nexthop” is the next router to which a packet is sent from any given
router as it traverses a network on its journey to its final destination. In the event that the
packet is at the final router in its journey, the nexthop is the final destination.
1. when the up-sending flow rate from the network interface exceeds the configured
threshold, the exceeded traffic will be dropped (Anti-DoS);
2. when the outgoing interface of the source routing packet is different from the ingoing
interface, the packet will be dropped. (URPF)
3. when the semi-connection statistics information of the TCP SYN flood exceeds
configured threshold, the TOE suppresses these attacks.]
5-5
FDP_IFF.1.4 The TSF shall explicitly authorize an information flow based on the following
rules: [none].
FDP_IFF.1.5 The TSF shall explicitly deny an information flow based on the following rules:
1. [the TOE shall reject requests for access or services where the source identity of the
information received by the TOE is not included in the set of source identifiers for the
source subject;
2. The TOE shall reject requests for access or services where the source identity of the
information received by the TOE specifies a broadcast identity;
3. The TSF shall reject requests for access or services where the presumed source
identity of the information received by the TOE specifies a loopback identifier.
4. The TSF shall drop requests in which the information received by the TOE does not
correspond to an entry in the routing table.
5. The TSF shall deny information flows that do not conform to IP protocol (RFC 791)
and the associated routing protocol specification (RFCs for RIPv2, OSPFv2, IS-IS and
BGPv4)].
FDP_IFF.1.4 The TSF shall explicitly authorise an information flow based on the
following rules: [none].
5-6
FDP_IFF.1.5 The TSF shall explicitly deny an information flow based on the following
rules: [none].
5-7
FIA_UAU.5.2 The TSF shall authenticate any user's claimed identity according to the
[authentication mechanism specified by the authorised user].
5-8
FMT_MSA.3.2 The TSF shall allow the [Administrators] to specify alternative initial values
to override the default values when an object or information is created.
Application Note for all FMT_MTD.1: Each administrator has his privilege level. These
SFRs are used to restrict the management scope for different administrator.
FMT_SMF.1.1 The TSF shall be capable of performing the following management
functions:
1. start-up and shutdown;
2. create, modify, delete,and view configuration data
3. empty, and review the audit log
4. create, delete, modify, and view filtering rules;
5. perform configuration backup and restore;
6. user account management;
7. modify date/time;
8. trusted router management and
9. security management functions listed in FMT_MOF.1
Application Note: although there is only one administrator role. However each
administrator account has his privilege level and corresponding management scope. The
management scope of each privilege level is configurable. All commands are assigned a
5-9
required privilege level. The administrator can execute commands with required privilege
levels lower than or equal to his privilege level.
5-10
FTP_ITC.1.3 The TSF shall require the use of the trusted channel for [user
authentication,].
FTP_ITC.1.2 The TSF shall permit [the TSF] to initiate communication via the trusted
channel.
FTP_ITC.1.3 The TSF shall require the use of the trusted channel for [time
synchronization,].
Identifier Name
5-11
5-12
l authentication alarm
1. I&A authentication success
2. I&A authentication failure
l user management alarm
1. user account is locked
2. user account is unlocked
3. user account is enabled
4. user account is disabled
l RADIUS alarm log
6-1
6-2
to access the audit trail storage. There is no other interface to access the audit trail
storage. However the audit trail stored in the SNMP/SYSLOG server is not protected
by the TOE;
The TSF shall overwrite the oldest stored audit records in flash when the maximum
allowed number of log files reached.
6-3
is processed between RADIUS and local or TACACS+ and local passwords are
specifically configured. The order of TACACS+ and local can be configured. The allowed
authentication models are listed below:
1. Local only
2. RADIUS only
3. TACAS+ only
4. RADIUS first, if RADIUS not response then local authentication
5. TACACS+ first, if TACACS+ not response then local authentication
6. Local first, if local authentication failed then RADIUS authentication
7. Local first, if local authentication failed then TACACS+ authentication
Authentication validates an administrator name and password combination when an
administrator attempts to log in. When an administrator attempts to log in, the TOE sends
an access request to a RADIUS, TACACS+, or local database.
l FIA_UID.2 User identification before any action
The TOE validates an administrator name and password combination when an
administrator attempts to log in
l FIA_UAU.5 Multiple authentication mechanisms
The TOE software supports three kinds of user authentication methods: Local
Authentication, Remote Authentication Dial-In User Service (RADIUS) and Terminal
Access Controller Access Control System Plus (TACACS+). Authentication mechanism
can be configured. Administrator can be authenticated any of the above authentication
mechanisms based on the specification by authentication.
6-4
Management of TSF Data (Audit logs):The TOE can be configured to clear audit logs
and specify the log level by an administrator.
Management of TSF Data (User Account): The TOE restricts the ability to administer
user data to only administrators. The CLI provides administrators with a text-based
interface from which all user data can be managed. From this interface new accounts can
be created, and existing accounts can be modified or deleted.
l FMT_MOF.1 Management of security functions behavior
The administrator will perform the following:
1. Configure administrator profiles used to deny or permit access to CLI command tree
permissions, or specific CLI commands.
2. Configure authentication failure handling configurable integer of unsuccessful
authentication attempts within configurable range of time, and configurable lock out
period of time that occurs related to a administrator’s authentication.
3. Configure authentication-order for local, RADIUS and TACACS+ authentication
Enables RADIUS or TACACS+ (TOE client-side).
4. Configure password complexity [numeric] [special-character] [capital] [lowercase]and
configure password minimum-length value.
5. Configure ACLs and controls where (e.g., from a specific network address or local
management interface) administrators, and authorized IT entities access the TOE.
6. Configures audit logs.
7. Configure SNMP/SYSLOG
8. Configure NTP
9. Configure anti-DoS attack
10. Configure URPF
11. Configure CPU protection policies
l FMT_MSA.1 Management of security attributes
Simple security attributes (unauthenticated policy)
The administrator specifies information flow policy rules (i.e., routing protocols and
ingress/egress traffic filtering and peer filtering) that contain information security attribute
values, and associate with that rule an action that permits the information flow or disallows
the information flow. When a packet arrives at the source interface, the information
security attribute values of the packet are compared to each information flow policy rule
and when a match is found the action specified by that rule is taken.
6-5
The event log is configured to send events to one SYSLOG destination. SYSLOG
destinations have the following properties:
1. SYSLOG server IP address.
2. The UDP port used to send the SYSLOG message.
3. The SYSLOG Facility Code (0 - 23): default 16 (local 0).
4. The SYSLOG Severity Threshold (0 - 7) - events exceeding the configured level will
be sent.
The Administrator uses CLI syntax to configure the TOE to send SNMP trap.
Subject and information security attributes used are:
The TOE allows all authorized administrators with the needed authority to configure and
control the associated features. Only authenticated administrators are permitted to use
or manage the TOE resources. Only authenticated administrators execute certain CLI
commands. Authorization features allow administrators to configure administrator profiles
which are used to limit what CLI commands are executed by the specific authenticated
administrator. Once an administrator has been authenticated the TOE is configured to
perform authorization. Each command has a corresponding privilege level (0-15) which
can be modified by the administrator. These levels associate with users. An authenticated
user must belong to a certain privilege level. An authenticated administrator shall only
6-6
execute commands allowed by his privilege level and can not execute commands of higher
level.
The TOE allows configuring login control parameters for console and remote administration
sessions.
The TOE has the ability to terminate stale connections. The TOE terminates interactive
session after an administrator defined period of inactivity with a default value of 2 minutes,
and within a range of 1 to 1000 minutes. And the TOE can configure mandatory termination
absolute-time within from 1 to 10000 minutes with a default value of 1440 minutes.
This idle-time parameter configures the idle timeout for console, or remote sessions before
the session is terminated by the system. The idle-time and absolute-time would reduce
the chance for the unauthorized administrators to access the TOE through an unattended
opened session. By default, an idle console, or remote session times out after 2 minutes
of inactivity. This timer is set for all session.
l FTA_TSE.1 TOE session establishment
The TOE will deny session establishment after the configured number (1~15) of active
sessions is reached. An administrator can configureACLs to refuse to establishment of a
connection, to ensure only connections from trusted address or port is trustable.
The TOE has a direct connection via the physical RS232 console interface and a remote
console connection to perform security management functions.
The TOE enforces an UNAUTHENTICATED SFP whereby the network packets sent and/or
received through the TOE to IT entity.
6-7
The TOE enforces an EXPORT SFP whereby information events are sent from the TOE
to SNMP trap and SYSLOG destinations. The TOE will only send audit and management
data to properly configured destinations
l FDP_IFF.1(1) Simple security attributes (unauthenticated policy)
The TOE supports routing of the traffic that is permitted by the information flow
policies. All traffic passing through the router is processed by the ACL attached to the
interface/protocol. The ACL is processed top-down, with processing continuing until the
first match is made according to the source/destination and security attributes in the
packet.
All traffic that successfully passedthe ACLs is processed by the routing tables. The routing
table may be statically updated by an administrator or dynamically generated according to
RIPv2, OSPFv2, IS-ISand BGPv4 routing protocols.
6-8
l FTP_ITC.1
The TSF shall provide a communication channel between itself and a remote
administration client. Secure remote administration is provided by SSH. The
communication between TOE and RADIUS/TACACS+/NTP server is protected by the
trusted channel.
6-9
6-10
T.AUDIT_RE-
VIEW
× ×
T.NO_PRIVI-
LEGE
×
T.MEDIATE ×
T.NO_AUTH
_SESSION
×
T.NO_AUTH-
_ACCESS
×
P.ROUTE ×
7-1
is also clear since the Security Objectives for the Operational environment are simply
a restatement of the applicable assumption, that each objective is suitable to meet its
corresponding assumption.
Table 7-2 Mapping of Assumptions to Security Objectives for the Operational Environment
A.NO_EVIL&TR-
AIN
×
A.CONNECTIVITY ×
A.PHYSICAL ×
A.TIMES ×
P.USERS ×
FAU_GEN.1 ×
FAU_GEN.2 ×
FAU_SAR.1 ×
FAU_STG.1 ×
FAU_STG.4 ×
FDP_IFC.1(1) ×
FDP_IFF.1(1) ×
FDP_IFC.1(2) ×
FDP_IFF.1(2) ×
FDP_UIT.1 ×
FIA_AFL.1 ×
FIA_SOS.1 ×
FIA_UAU.2 ×
7-2
FIA_UAU.5 ×
FIA_UID.2 ×
FMT_MOF.1 ×
FMT_MSA.1 × ×
FMT_MSA.3 × ×
FMT_MTD.1(1) ×
FMT_MTD.1(2) ×
FMT_MTD.1(3) ×
FMT_MTD.1(4) ×
FMT_SMF.1 ×
FMT_SMR.1 ×
FPT_STM.1 ×
FTA_SSL.3 ×
FTA_TSE.1 ×
FTP_ITC.1(1) × ×
FTP_ITC.1(2) ×
FTP_ITC.1(3) ×
The following table presents a mapping of the rationale of TOE Security Requirements to
Objectives.
Table 7-4 Mapping of the rationale of TOE Security Requirements to Objectives.
7-3
7-4
7-5
FAU_GEN.1 FPT.STM.1 Y
FAU_GEN.2 FAU_GEN.1 Y
FIA_UID.1 FIA_UID.1 Hierarchical to
FIA_UID.2
FAU_SAR.1 FAU_GEN.1 Y
FAU_STG.1 FAU_GEN.1 Y
FAU_STG.4 FAU_GEN.1 Y
FDP_IFC.1(1) FDP_IFF.1(1) Y
FDP_IFC.1(2) FDP_IFF.1(2) Y
FDP_IFF.1(1) FDP_IFC.1(1) Y
FMT_MSA.3
FDP_IFF.1(2) FDP_IFC.1(2) Y
FMT_MSA.3
FDP_ACC.1/FDP_IFC.1
FTP_ITC.1/FTP_TRP.1
1. The dependency on
FDP_ACC.1/FDP_IFC.1 is
unnecessary since the reference
to the policy was refined away.
Defining a whole policy to restate
FDP_UIT.1 Y
FDP_UIT.1 was considered
unnecessary.
2. The dependency on FTP_ITC.1
is unnecessary since this SFR
specifies confidentiality of the
channel data and this is not
required.
7-6
FIA_AFL.1 FIA_UAU.1 Y
FIA_UAU.1 Hierarchical to
FIA_UAU.2
FIA_SOS.1 No dependencies Y
FIA_UAU.2 FIA_UID.1 Y
FIA_UAU.5 No dependencies Y
FIA_UID.2 No dependencies Y
FMT_MOF.1 FMT_SMR.1 Y
FMT_SMF.1
FMT_MSA.1 FDP_IFC.1 Y
FMT_SMR.1
FMT_SMF.1
FMT_MSA.3 FMT_MSA.1 Y
FMT_SMR.1
FMT_MTD.1(1) FMT_SMR.1 Y
FMT_SMF.1
FMT_MTD.1(2) FMT_SMR.1 Y
FMT_SMF.1
FMT_MTD.1(3) FMT_SMR.1 Y
FMT_SMF.1
FMT_MTD.1(4) FMT_SMR.1 Y
FMT_SMF.1
FMT_SMF.1 No dependencies Y
FMT_SMR.1 FIA_UID.1 Y
FPT_STM.1 No dependencies Y
FTA_SSL.3 No dependencies Y
FTA_TSE.1 No dependencies Y
FTP_ITC(1) No dependencies Y
FTP_ITC(2) No dependencies Y
FTP_ITC(3) No dependencies Y
7-7
7-8
ACL Access Control List It is filter policy applied on ingress or egress to a service
device on an interface to control the traffic access.
BGP Border Gateway The Border Gateway Protocol (BGP) is the core routing
Protocol protocol of the Internet. It maintains a table of IP networks
or 'prefixes' which designate network reachability among
autonomous systems (AS). It is described as a path vector
protocol. BGP does not use traditional IGP metrics, but
makes routing decisions based on path, network policies
and/or rulesets.
A-1
OSPF Open Shortest Path A link-state routing algorithm that is used to calculate
First routes based on the number of routers, transmission
speed, delays and route cost.
PFU Packet Forwarding PFU mainly includes Egress Traffic Manager (TM),
Unit Packet Forwarding Module (PFM), Ingress TM, switching
network interface module Fabric Q and Central Processing
Unit (CPU) main control module. At present, ZXR10
M6000&T8000 is designed to support 1–port 40G POS line
speed access and forwarding at most. It can be extended
to support 2–port 40G POS line speed processing and
forwarding, and support 100G Ethernet non-line speed
processing and forwarding.
A-2
SFU Switch Fabric Unit The SFU of ZXR10 M6000-8 adopts 2+1 redundancy
backup. The SFU of ZXR10 M6000-16&T8000 adopts 3+1
redundancy backup. Several SFUs can work at the same
time. When a SFU is broken or plugged out, interface
access and processing ability are not affected. According
to the demand of rack cascade connection, SFU can be
divided into non-cascade connection SFU and cascade
connection SFU.
SRU Switch Route Unit The SRU of ZXR10 is composed of 1 MPU and 1 SFU.
SRU implements switch/route/management functionality.
URPF Unicast Reverse Network administrators can use Unicast Reverse Path
Path Forwarding Forwarding (Unicast RPF) to help limit the malicious traffic
on an enterprise network. This security feature works by
enabling a router to verify the reachability of the source
address in packets being forwarded. This capability can
limit the appearance of spoofed addresses on a network. If
the source IP address is not valid, the packet is discarded.
UDP User Datagram UDP is transport layer protocol which do not guarantee
Protocol delivery of data
A-3
A-4