Nortel Networks 7.05, 7.11 manual TOE Description, Product Type, Product Description

Page 8

Security Target, Version 3.9

March 18, 2008

 

 

2 TOE Description

This section provides a general overview of the TOE as an aid to understanding the general capabilities and security requirements provided by the TOE. The TOE description provides a context for the TOE evaluation by identifying the product type and describing the evaluated configuration.

2.1 Product Type

The Nortel VPN Router v7.05 and Client Workstation v7.11 is a hardware and software TOE which combines network data routing, Virtual Private Network (VPN) connection and acceleration, and firewall capabilities in one device. This product class makes use of public telecommunication infrastructure (most commonly the Internet) in order to connect physically discontiguous private network segments to one “virtually contiguous” private network. Privacy and security of corporate data is maintained through the use of encrypted tunneling protocols within the VPN connection and various other security procedures when it is in transit over the public network.

A VPN connection requires the creation and operation of a secure tunnel between a VPN client on a remote device (such as personal computer (PC)) and VPN server software on a VPN security gateway, such as a Nortel VPN Router.

2.2 Product Description

The TOE is a VPN Router/Firewall which provides three main areas of functionality: it efficiently routes network traffic to its intended destination; it enables secure Internet Protocol (IP) VPN connections across the public data network; and it protects the private network from attack by parties on the public network. Each of these functions are discussed in greater detail below.

The TOE’s primary purpose is to allow users of a private (Enterprise) network to have secure access to that network from a remote location. The TOE provides firewall, routing, encryption and decryption, authentication, and data integrity services to ensure that data is securely tunneled across IP networks (including the Internet). The Nortel VPN Router and the Nortel VPN Client are the two components that compose the TOE. Figure 1 below shows a typical deployment configuration of the TOE:

The World

 

Enterprise

 

VPN Tunnel

Corporate

 

 

 

Internet

Network

 

 

Nortel

Nortel VPN Router

 

VPN Client

 

 

 

Workstation

 

 

 

 

Corporate

 

 

Servers

 

CLI Workstation

Management

 

 

Workstation

Figure 1 – VPN Client Deployment Configuration of the TOE

The Nortel VPN Router can also be configured to operate in Branch Office mode. Branch Office mode allows two separate portions of an Enterprise network to be securely connected to each other via the Internet. In Branch Office

Nortel VPN Router v7.05 and Client Workstation v7.11

Page 8 of 67

© 2008 Nortel Networks

Image 8
Contents Nortel Networks Corsec Security, Inc Revision History Version Modification Date Modified By Description of ChangesTable of Contents Table of Figures Table of TablesProtection Profile Claims Rationale Security Target Introduction Purpose Security Target, TOE and CC Identification and Conformance ST, TOE, and CC Identification and ConformanceConventions, Acronyms, and Terminology ConventionsTerminology TerminologyPrimary Admin password Product Description TOE DescriptionProduct Type Branch Office Deployment Configuration of the TOE TOE Boundaries and Scope Physical BoundaryLogical Boundary TOE EnvironmentWorld EnterpriseUser Data Protection Security AuditCryptographic Support Identification and Authentication Security ManagementProtection of the TOE Security Functions Trusted Path/ChannelsExcluded TOE Functionality Threats to Security TOE Security EnvironmentAssumptions Threats Addressed by the TOE Threats Addressed by the TOE EnvironmentSecurity Objectives Security Objectives for the TOESecurity Objectives for the Environment IT Security ObjectivesNon-IT Security Objectives OE.TIMEIT Security Requirements TOE Security Functional RequirementsTOE Security Functional Requirements ST OperationDescription ST Operation Class FAU Security Audit FAUGEN.1 Audit Data GenerationFAUSAR.1 Audit review Auditable EventsDependencies FAUGEN.1 Audit data generation Class FCS Cryptographic Support FCSCKM.1a Cryptographic key generation Diffie-HellmanFCSCKM.1b Cryptographic key generation RSA FCSCKM.4 Cryptographic key destructionFCSCOP.1e Cryptographic operation hashing FCSCOP.1b Cryptographic operation authenticationFCSCOP.1d Cryptographic operation random number generation Security Target, Version March 18 FDPACC.2 Complete access control FDPACF.1 Security attribute based access controlClass FDP User Data Protection FDPIFC.2a Complete information flow control VPNFDPIFC.2b Complete information flow control Firewall FDPIFF.1a Simple security attributes VPNFDPIFF.1b Simple security attributes Firewall FDPUCT.1 Basic data exchange confidentiality FDPUIT.1 Data exchange integrityFDPUCT.1.1 FDPUIT.1.1Class FIA Identification and Authentication FIAUAU.1 Timing of authenticationFIAUAU.5 Multiple authentication mechanisms FIAUID.2 User identification before any actionDependencies No dependencies Class FMT Security Management FMTMOF.1a Management of security functions behaviourFMTMOF.1b Management of security functions behaviour FMTMSA.1a Management of security attributesFMTMSA.1c Management of security attributes FMTMSA.2 Secure security attributesFMTMSA.3a Static attribute initialisation FMTMSA.2.1FMTSMF.1 Specification of Management Functions FMTMSA.3b Static attribute initialisationFMTMSA.3c Static attribute initialisation FMTSMR.1 Security rolesFMTSMR.1.2 FPTAMT.1 Abstract machine testing FPTTST.1 TSF testingClass FPT Protection of the TSF FPTRPL.1 Replay detectionClass FTP Trusted Path/Channels FTPTRP.1 Trusted pathFTPTRP.1.1 FTPTRP.1.2Security Functional Requirements on the IT Environment FPTRVM.1 Non-bypassability of the TSPFPTSEP.1 TSF domain separation FPTSTM.1 Reliable time stampsSecurity Target, Version 3.9March 18 Assurance Requirements Assurance RequirementsAssurance Components TOE Summary Specification TOE Security FunctionsTOE Security Description FunctionConfiguration Log Security AuditAccounting Logs Security LogSystem Log Event LogCryptographic Support Fips Validated ModulesFIPS-Validated Cryptographic Algorithms Validation Modules Fips 140-2 Certificate #User Data Protection Identification and Authentication Security ManagementConditional Self-Tests Power-Up Self-TestsProtection of the TOE Security Functions TOE Security Assurance Measures Trusted Path/ChannelsTOE Security Functional Requirements Satisfied FTPTRP.1 Assurance Assurance Measure ComponentAugmentation to EAL 4+ assurance level Protection Profile Claims Protection Profile ReferenceRationale Security Objectives RationaleRelationship of Security Threats to Objectives TOE Objectives Environmental Objectives Non-ITHack Certificate Security Functional Requirements Rationale OE.CERTIFICATERelationship of Security Requirements to Objectives Objectives RequirementsFunctions and data EnvAble to access such functionality FMTMSA.3a,b,cReject packets based on their attributes IntegritySecurity Assurance Requirements Rationale Rationale for Strength of FunctionDependency Rationale Functional Requirements DependenciesFCSCOP.1 TOE Summary Specification Rationale Development Configuration ManagementSecure Delivery and Operation Tests Guidance DocumentationLife Cycle Support Documents Strength of Function Vulnerability and TOE Strength of Function AnalysesAcronyms AcronymsAcronym Definition DoDSHA