HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GB/T 18018-2019 English PDF

US$359.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 18018-2019: Information security technology - Technical requirement for router security
Status: Valid

GB/T 18018: Evolution and historical versions

Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 18018-2019English359 Add to Cart 4 days [Need to translate] Information security technology - Technical requirement for router security Valid GB/T 18018-2019
GB/T 18018-2007English679 Add to Cart 3 days [Need to translate] Information security technology -- Technical requirements for router security Obsolete GB/T 18018-2007
GB/T 18018-1999English719 Add to Cart 5 days [Need to translate] Security requirements for router Obsolete GB/T 18018-1999

PDF similar to GB/T 18018-2019


Standard similar to GB/T 18018-2019

GB/T 18336.1   GB/T 18336.2   GB/T 18336.3   GB/T 37027   GB/T 19713   

Basic data

Standard ID GB/T 18018-2019 (GB/T18018-2019)
Description (Translated English) Information security technology - Technical requirement for router security
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 18,125
Date of Issue 2019-08-30
Date of Implementation 2020-03-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 18018-2019: Information security technology - Technical requirement for router security

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - Technical requirement for router security ICS 35.040 L80 National Standards of People's Republic of China Replace GB/T 18018-2007 Information Security Technology Router security technical requirements 2019-08-30 released 2020-03-01 Implementation State Administration for Market Regulation Issued by China National Standardization Administration

Table of contents

Foreword Ⅰ 1 Scope 1 2 Normative references 1 3 Terms and definitions, abbreviations 1 3.1 Terms and definitions 1 3.2 Abbreviations 1 4 Level 1 safety technical requirements 2 4.1 Safety function requirements 2 4.2 Safety assurance requirements 3 5 Level 2 safety technical requirements 4 5.1 Safety function requirements 4 5.2 Safety assurance requirements 7 6 Level 3 safety technical requirements 8 6.1 Safety function requirements 8 6.2 Safety assurance requirements 11 Appendix A (Informative Appendix) Safety Requirements Comparison Table 14

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. This standard replaces GB/T 18018-2007 "Information Security Technology Router Security Technical Requirements". Compared with GB/T 18018-2007, the main technical changes of this standard are as follows except for editorial changes. ---Modified Chapter 2 normative references (see Chapter 2, Chapter 2 of the.2007 edition); --- Modified 3.2 abbreviations (see 3.2, 3.2 in the.2007 edition); ---Modified 4.1.2.1 administrator authentication (see 4.1.2.1, 4.1.2.1 of the.2007 version); --- Added 4.1.3.2 management protocol settings, 4.1.4 equipment safety protection, 4.1.5 safety function protection; ---Modified 5.1.2.1 administrator authentication, 5.1.3.1 authority management (see 5.1.2.1, 5.1.3.1, 5.1.2.1, 5.1.3.1 in.2007 version); ---Added 5.1.3.2 management protocol settings, 5.1.4 equipment security protection, 5.1.5 network security protection, 5.1.6 security function protection; ---Modified 6.1.2.1 administrator authentication, 6.1.4.1 authority management (see 6.1.2.1, 6.1.4.1, 6.1.2.1, 6.1.4.1 of the.2007 edition); --- Added 6.1.2.2 device login password management, 6.1.2.3 certificate verification, 6.1.3.2 data storage, 6.1.3.3 data transmission, 6.1.3.4 sensitive data, 6.1.4.2 management protocol settings, 6.1.5 equipment security protection, 6.1.6 network security protection, 6.1.7 security Functional protection; --- Deleted 5.1.8 routing authentication and 6.1.10 routing authentication; adjusted to 5.1.5.2 and 6.1.6.2 respectively; ---The additional security functions in Chapter 7 have been deleted. Please note that certain contents of this document may involve patents. The issuing agency of this document is not responsible for identifying these patents. This standard was proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). Drafting organizations of this standard. Institute of Software, Chinese Academy of Sciences, Huawei Technologies Co., Ltd., New H3C Technology Co., Ltd., Maipu Communication Technology Co., Ltd., Institute of Information Engineering, Chinese Academy of Sciences, School of Software and Microelectronics, Peking University, and China Electronics Standardization Institute. The main drafters of this standard. Qing Sihan, Chen Chi, Fu Tianfu, Wang Bo, Yang Yinzhu, Li Jinglin, He Bin, Wang Liming, Zhao Zhiyu, Wang Huilai, Luo Fengying, Zhou Qiming, Shen Qingni, Wen Weiping, Ma Shunan. The previous versions of the standard replaced by this standard are as follows. ---GB/T 18018-1999, GB/T 18018-2007. Information Security Technology Router security technical requirements

1 Scope

This standard specifies the security function requirements and security assurance requirements of routers in grades. This standard applies to the design and implementation of router product security, and the testing, evaluation and management of router products can also be referred to use.

2 Normative references

The following documents are indispensable for the application of this document. For dated reference documents, only the dated version applies to this article Pieces. For undated references, the latest version (including all amendments) applies to this document. GB 17859-1999 Classification criteria for security protection grades of computer information systems GB/T 18336.1~18336.3-2015 Information Technology Security Technology Information Technology Security Evaluation Criteria 3 Terms and definitions, abbreviations 3.1 Terms and definitions The following terms and definitions defined in GB 17859-1999 and GB/T 18336.1~18336.3-2015 apply to this document. 3.1.1 Router The main network node equipment, carrying data traffic, determines the forwarding processing of the data flowing through the routing algorithm, and can pass the set Functional modules such as firewalls provide access control and security extension functions. 3.1.2 Simple Network Management Protocol simplenetworkmanagementprotocol A series of protocol groups and specifications provide a method for collecting network management information from devices on the The workstation provides a way to report problems and errors. 3.1.3 Unicast reverse path forwarding unicastreversepathforwarding In order to prevent network attacks based on source address spoofing, the source address is used as the destination address, and the Action for inbound interface matching. 3.2 Abbreviations The following abbreviations apply to this document. 4 First-level safety technical requirements 4.1 Safety function requirements 4.1.1 Discretionary access control The router should implement an autonomous access control strategy, and control the configuration data and other Data viewing, modification, and execution of procedures on the router prevent unauthorized personnel from performing the above activities. 4.1.2 Identity authentication 4.1.2.1 Administrator authentication Before the administrator enters the system session, the router should authenticate the administrator's identity. System. The password should be invisible and encrypted during storage and transmission. When performing authentication, the router should only provide the minimum feedback (such as. the number of characters entered, the success or failure of authentication) to the authenticated person member. At the same time, the feedback information should avoid prompting "user name error", "password error" and other information, so as to prevent attackers from violating username or password. Guess the solution. 4.1.2.2 Authentication failure processing After a certain number of authentication failures, the router should lock the account. The maximum number of failures can only be set by authorized administrators. 4.1.3 Security Management 4.1.3.1 Rights Management The router should be able to set multiple roles, have the ability to divide administrator levels and specify related permissions (such as monitoring, maintenance configuration, etc.), It can limit the management scope and authority of each administrator to prevent unauthorized login and unauthorized operation. 4.1.3.2 Management protocol settings The router should be able to configure and use secure protocols to manage and control the system. SSH, SFTP, SNMPV3 and HT- TPS. 4.1.3.3 Security attribute management The router should provide administrators with functions to control and manage security functions, including. a) Management of functions related to the corresponding router's autonomous access control, authentication and security assurance technology. b) Management of functions related to general installation and configuration. c) The security configuration parameters of the router must have initial values. After the router is installed, the security function should prompt the administrator to modify the configuration, And can periodically remind the administrator to maintain the configuration. 4.1.4 Equipment safety protection 4.1.4.1 Flow Control The router should be able to control the amount of protocol traffic that needs to be parsed and processed by the device itself, for example, by setting the bandwidth and other protective measures. Section, to ensure that the original forwarding service is normal when the system is subjected to a protocol flood attack, and the system can be directly restored after the flood attack is eliminated. 4.1.4.2 Priority scheduling no. 4.1.4.3 Resource exhaustion protection no. 4.1.5 Security function protection 4.1.5.1 Self-check When the device is powered on, it should perform a self-check of the security function, such as memory, digital signature, encryption algorithm, etc., to ensure the correct security function. only The device can be started normally only when all the self-check functions pass. 4.1.5.2 Ensure the legality of software updates The security administrator should be able to query the currently executing software/firmware version number and the last installed version number. Should be able to Use digital signatures to verify the legality of software/firmware updates. 4.2 Security requirements 4.2.1 Configuration Management Developers should design and implement router configuration management, provide unique identification for different versions of the product, and each version of the product should use Use its unique identifier as a label. 4.2.2 Delivery and operation The developer should explain the safe delivery, installation and startup process of the router in the form of a document. The documentation should include. a) Instructions for safely delivering the router to users; b) Instructions for safely installing and starting the router. 4.2.3 Development Developers should provide router functional design, require functional design according to the requirements of informal functional design, and describe in an informal method. Describe the safety function and its external interface, and describe the purpose and method of using the external safety function interface. 4.2.4 Guiding documents Developers should compile guidance documents for routers with the following requirements. a) The document should provide information on the security functions and interfaces of the router, the management and configuration of the router, the startup and operation of the router, and the security Description of all attributes and warning messages; b) The document should not contain any information that will endanger the security of the system once it is leaked. The document can be a hard copy, electronic document or online Machine documentation. If it is an online document, access to the document should be controlled. 4.2.5 Life cycle support Developers should establish a life cycle model for the development and maintenance of routers, including procedures, tools, and techniques used to develop and maintain routers. Surgery. Developers should develop and maintain in accordance with their defined life cycle model, and provide life cycle definition documents, which describe the use of Develop and maintain a life cycle model of router security functions. 4.2.6 Test Developers should test the router, the requirements are as follows. a) General functional tests should be carried out to ensure that the router can meet the requirements of all security functions; b) Retain and provide test documents, describing in detail the test plan, test process, and predicted results and actual test results. 5 Level 2 safety technical requirements 5.1 Safety function requirements 5.1.1 Discretionary access control The router should implement an autonomous access control strategy, and control the configuration data and other Data viewing, modification, and execution of procedures on the router prevent unauthorized personnel from performing the above activities. 5.1.2 Identity authentication 5.1.2.1 Administrator authentication Before the administrator enters the system session, the router should authenticate the administrator's identity. System. The password should be invisible and encrypted during storage and transmission. When performing authentication, the router should only provide the minimum feedback (such as. the number of characters entered, the success or failure of authentication) to the authenticated person member. At the same time, the feedback information should avoid prompting "user name error", "password error" and other information, so as to prevent attackers from violating username or password. Guess the solution. 5.1.2.2 Authentication failure handling After a certain number of authentication failures, the router should lock the account. The maximum number of failures can only be set by authorized administrators. 5.1.2.3 Timeout lock The router should have a login timeout lock function. To terminate the session without any operation within the set time period, you need to Only after identification can be re-operation. The maximum timeout period can only be set by an authorized administrator. Note. The boldface type in this standard indicates the newly emerging enhancement requirements in this level. 5.1.2.4 Session Lock The router should provide administrators with the function of locking their own interactive sessions. After locking, they need to be authenticated again to be able to manage again. Manage routers. 5.1.2.5 Login History The router should have a log-in history function to provide log-in personnel with relevant information about system log-in activities, so that log-in personnel can identify intrusive companies. Figure. After successfully passing the authentication and logging in to the system, the router should display the following data. a) Date, time, source and last successful login to the system; b) The identity authentication failed since the last successful login to the system; c) The number of days from the password expiration date. 5.1.3 Safety Management 5.1.3.1 Authority management The router should be able to set multiple roles, have the ability to divide administrator levels and specify related permissions (such as monitoring, maintenance configuration, etc.), It can limit the management scope and authority of each administrator to prevent unauthorized login and unauthorized operation. The system should be able to support centralized authentication and authorization management of RADIUS/T ACACS. 5.1.3.2 Management protocol settings The router should be able to configure and use secure protocols to manage and control the system. SSH, SFTP, SNMPV3 and HT- TPS. 5.1.3.3 Security attribute management The router should provide administrators with functions to control and manage security functions, including. a) Management of functions related to the corresponding router's autonomous access control, authentication and security assurance technology. b) Management of functions related to general installation and configuration. c) The security configuration parameters of the router must have initial values. After the router is installed, the security function should prompt the administrator to modify the configuration, And can periodically remind the administrator to maintain the configuration. 5.1.4 Equipment safety protection 5.1.4.1 Flow control The router should be able to control the amount of protocol traffic that needs to be parsed and processed by the device itself, for example, by setting the bandwidth and other protective measures. Section, to ensure that the original forwarding service is normal when the system is subjected to a protocol flood attack, and the system can be directly restored after the flood attack is eliminated. 5.1.4.2 Priority scheduling The router should be able to prioritize the protocol traffic that the device itself needs to analyze and process according to the importance of the business. High priority Priority guarantee is given to the protocol traffic, so that important services are not interrupted when there is a surge in business volume or a network attack. 5.1.4.3 Resource exhaustion protection Routers should be able to protect important system resources and limit the impact of attacks to a certain range by limiting resource allocation. The router should support the MAC address learning restriction function so that users of other interfaces of the system are not affected. 5.1.5 Network Security Protection 5.1.5.1 Unicast reverse path forwarding function The router should have the URPF function to block the source IP address spoofing attack at the network boundary. 5.1.5.2 Routing Protocol Authentication The routing protocol used by the router should support the routing authentication function to ensure that the route is issued by a legal router and is in the forwarding process. Has not been changed. 5.1.5.3 MPLSVPN function The router should implement the Layer 2 and Layer 3 VPN functions based on the MPLS protocol, and use an independent VPN management network to realize communication between different users. Business isolation. 5.1.6 Security function protection 5.1.6.1 Self-check When the device is powered on, it should perform a self-check of the security function, such as memory, digital signature, encryption algorithm, etc., to ensure that the security function is correct. Only when all the self-check functions pass, the device can be started normally. 5.1.6.2 Secure software update The security administrator should be able to query the currently executing software/firmware version number and the last installed version number. Should be able to Use digital signatures to verify the legality of software/firmware updates. 5.1.7 Audit 5.1.7.1 Audit data generation The router should have an audit function and at least be able to audit the following behaviors. a) Initiation and termination of the audit function; b) Account management; c) Login event; d) System events; e) Modification of configuration files. The router should generate audit records for auditable activities and record at least the following information in each audit record. a) The date and time of the incident; b) the type of event; c) Administrator status; d) The result of the event (success or failure). 5.1.7.2 Audit data access The router should provide authorized administrators with the ability to read audit information from audit records, and the audit records provided by administrators are unique. 1.Clear definition and easy-to-read format. 5.1.7.3 Audit data protection The router should be able to protect the stored audit records, avoid unauthorized deletion, and be able to monitor and prevent the modification of the audit records. when When the audit storage is exhausted, fails, or is attacked, the router should ensure that the latest audit records will not be destroyed within a certain period of time. 5.1.8 Reliability Routers should provide reliability guarantees and have partial redundancy design performance. Supports redundancy and hot swap of plug-in cards, interfaces, power supplies and other components ability. 5.2 Security requirements 5.2.1 Configuration Management Developers should design and implement router configuration management, the requirements are as follows. a) Developers should use a configuration management system and provide configuration management documents, provide unique identifications for different versions of the product, and Each version of the product should use its unique identification as a label. b) The scope of configuration management should include at least the product implementation representation, design documents, test documents, user documents, and configuration management of the router. This ensures that their modifications are carried out in a properly authorized and controlled manner. Configuration management documents should at least be able to track And describe how the configuration management system tracks these configuration items. 5.2.2 Delivery and operation The developer should explain the safe delivery, installation and startup process of the router in the form of a document. The documentation should include. a) Instructions for safely delivering the router to users; b) Instructions for safely installing and starting the router. 5.2.3 Development Developers should provide router functional specifications, the requirements are as follows. a) Perform functional design according to the requirements of informal functional design, describe safety functions and their external interfaces in an informal way, and describe Describe the purpose and method of using the external safety function interface. b) Provide high-level design of router security functions. The high-level design should describe the safety function and structure according to the subsystem, and identify the safety All interfaces of the functional subsystem. The high-level design should also identify the basic hardware, firmware, and software. c) The developer should provide an informal correspondence analysis between the functional design of the router security function and the high-level design. It is proved that all relevant safety functions expressed by the functional design are correctly and completely refined in the high-level design. 5.2.4 Guiding documents Developers should compile guidance documents for routers with the following requirements. a) The document should provide information on the security functions and interfaces of the router, the management and configuration of the router, the startup and operation of the router, and the security Description of full attributes, warning messages, and audit tools. b) The document should not contain any information that will endanger the security of the system once it is leaked. The document can be a hard copy, electronic document or online Machine documentation. If it is an online document, access to the document should be controlled. 5.2.5 Life cycle support Developers should establish a life cycle model for the development and maintenance of routers, that is, the procedures, tools and techniques used to develop and maintain routers. Requirements are as follows. a) Developers should develop and maintain according to their defined life cycle model, and provide life cycle definition documents, which are described in the documents A life cycle model used to develop and maintain router security functions. b) The model should provide the necessary control for the development and maintenance of the router, using physical, procedural, personnel and other aspects The security measures to protect the security of the router development environment, including the physical security of the site and the choice of developers, and take appropriate Use appropriate protective measures to eliminate or reduce the security threats faced by router development. 5.2.6 Test Developers should test the router, the requirements are as follows. a) General functional tests should be carried out to ensure that the router can meet the requirements of all security functions. b) An analysis of the depth of the test should be provided. In the in-depth analysis, it should be demonstrated that the safety function test identified in the test document is sufficient Shows that the operation of the safety function is consistent with the high-level design. c) An independent compliance test should be carried out, and a professional third-party independent laboratory should implement the test to confirm that the router can meet all safety requirements. Functional requirements. d) Retain and provide test documents, describing in detail the test plan, test process, and predicted results and actual test results. 5.2.7 Vulnerability assessment The vulnerability assessment includes the following. a) The developer should provide guidance documents and analysis documents, and determine all possible operation modes of the router (including failure The consequences of failure and operation errors) and the significance of maintaining safe operation, and list all the assumptions and assumptions of the target environment All external security measures (including external procedural, physical or human control) requirements. The content should be complete, clear, Consistent and reasonable. b) Developers should conduct security function strength analysis for security mechanisms (for example, password mechanisms) with security function strength and life. An The full-featured strength analysis shall prove that the safety mechanism has reached the stated strength. c) Developers should implement vulnerability analysis and provide documentation of vulnerability distribution. For all identified vulnerabilities, the documentation should state it They cannot be used in the expected router usage environment. The document should ...

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 18018-2019_English be delivered?

Answer: Upon your order, we will start to translate GB/T 18018-2019_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 18018-2019_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 18018-2019_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Question 5: Should I purchase the latest version GB/T 18018-2019?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 18018-2019 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.