Security Target, Version 3.9March 18, 2008
Table of Contents
REVISION HISTORY | 2 | |||
TABLE OF CONTENTS | 3 | |||
TABLE OF FIGURES | 4 | |||
TABLE OF TABLES | 4 | |||
1 | SECURITY TARGET INTRODUCTION | 5 | ||
| 1.1 | PURPOSE | 5 | |
| 1.2 | SECURITY TARGET, TOE AND CC IDENTIFICATION AND CONFORMANCE | 5 | |
| 1.3 | CONVENTIONS, ACRONYMS, AND TERMINOLOGY | 6 | |
| 1.3.1 | Conventions | 6 | |
| 1.3.2 | Terminology | 6 | |
2 | TOE DESCRIPTION | 8 | ||
| 2.1 | PRODUCT TYPE | 8 | |
| 2.2 | PRODUCT DESCRIPTION | 8 | |
| 2.3 | TOE BOUNDARIES AND SCOPE | 10 | |
| 2.3.1 | Physical Boundary | 10 | |
| 2.3.2 | Logical Boundary | 11 | |
| 2.3.3 | Excluded TOE Functionality | 15 | |
3 | TOE SECURITY ENVIRONMENT | 16 | ||
| 3.1 | ASSUMPTIONS | 16 | |
| 3.2 | THREATS TO SECURITY | 16 | |
| 3.2.1 | Threats Addressed by the TOE | 17 | |
| 3.2.2 | Threats Addressed by the TOE Environment | 17 | |
4 | SECURITY OBJECTIVES | 18 | ||
| 4.1 | SECURITY OBJECTIVES FOR THE TOE | 18 | |
| 4.2 | SECURITY OBJECTIVES FOR THE ENVIRONMENT | 19 | |
| 4.2.1 | IT Security Objectives | 19 | |
| 4.2.2 | 19 | ||
5 | IT SECURITY REQUIREMENTS | 20 | ||
| 5.1 | TOE SECURITY FUNCTIONAL REQUIREMENTS | 20 | |
| 5.1.1 | Class FAU: Security Audit | 22 | |
| 5.1.2 | Class FCS: Cryptographic Support | 24 | |
| 5.1.3 | Class FDP: User Data Protection | 27 | |
| 5.1.4 | Class FIA: Identification and Authentication | 31 | |
| 5.1.5 | Class FMT: Security Management | 33 | |
| 5.1.6 | Class FPT: Protection of the TSF | 37 | |
| 5.1.7 | Class FTP: Trusted Path/Channels | 38 | |
| 5.2 | SECURITY FUNCTIONAL REQUIREMENTS ON THE IT ENVIRONMENT | 39 | |
| 5.3 | ASSURANCE REQUIREMENTS | 41 | |
6 | TOE SUMMARY SPECIFICATION | 42 | ||
| 6.1 | TOE SECURITY FUNCTIONS | 42 | |
| 6.1.1 | Security Audit | 43 | |
| 6.1.2 | Cryptographic Support | 45 | |
| 6.1.3 | User Data Protection | 46 | |
| 6.1.4 | Identification and Authentication | 47 | |
| 6.1.5 | Security Management | 47 | |
| 6.1.6 | Protection of the TOE Security Functions | 48 | |
| 6.1.7 | Trusted Path/Channels | 49 | |
| 6.2 | TOE SECURITY ASSURANCE MEASURES | 49 | |
|
| |||
Nortel VPN Router v7.05 and Client Workstation v7.11 | Page 3 of 67 | |||
|
|
| © 2008 Nortel Networks |
|