Security Target, Version 3.9March 18, 2008
7 | PROTECTION PROFILE CLAIMS | 51 | ||
| 7.1 | PROTECTION PROFILE REFERENCE | 51 | |
8 | RATIONALE | 52 | ||
| 8.1 | SECURITY OBJECTIVES RATIONALE | 52 | |
| 8.2 | SECURITY FUNCTIONAL REQUIREMENTS RATIONALE | 55 | |
| 8.3 | SECURITY ASSURANCE REQUIREMENTS RATIONALE | 60 | |
| 8.4 | RATIONALE FOR STRENGTH OF FUNCTION | 60 | |
| 8.5 | DEPENDENCY RATIONALE | 60 | |
| 8.6 | TOE SUMMARY SPECIFICATION RATIONALE | 62 | |
| 8.6.1 | TOE Summary Specification Rationale for the Security Functional Requirements | 62 | |
| 8.6.2 | TOE Summary Specification Rationale for the Security Assurance Requirements | 63 | |
| 8.7 | STRENGTH OF FUNCTION | 65 | |
9 | ACRONYMS | 66 |
Table of Figures
FIGURE 1 – VPN CLIENT DEPLOYMENT CONFIGURATION OF THE TOE | 8 | |
FIGURE 2 – BRANCH OFFICE DEPLOYMENT CONFIGURATION OF THE TOE | 9 | |
FIGURE 3 | - PHYSICAL TOE BOUNDARY | 10 |
FIGURE 4 | - PHYSICAL TOE BOUNDARY IN BRANCH OFFICE TUNNEL MODE | 10 |
FIGURE 5 | - TOE LOGICAL BOUNDARY | 12 |
FIGURE 6 | - TOE LOGICAL BOUNDARY IN BRANCH OFFICE TUNNEL MODE | 12 |
Table of Tables
TABLE 1 - ST, TOE, AND CC IDENTIFICATION AND CONFORMANCE | 5 | ||
TABLE 2 - TERMINOLOGY | 6 | ||
TABLE 3 - TOE SECURITY FUNCTIONAL REQUIREMENTS | 20 | ||
TABLE 4 - AUDITABLE EVENTS | 22 | ||
TABLE 5 - IT ENVIRONMENT SECURITY FUNCTIONAL REQUIREMENTS | 39 | ||
TABLE 6 | - ASSURANCE COMPONENTS | 41 | |
TABLE 7 | - MAPPING OF TOE SECURITY FUNCTIONS TO SECURITY FUNCTIONAL REQUIREMENTS | 42 | |
TABLE 8 | - | 45 | |
TABLE 9 | - ASSURANCE MEASURES MAPPING TO TOE SECURITY ASSURANCE REQUIREMENTS (SARS) | 49 | |
TABLE 10 - RELATIONSHIP OF SECURITY THREATS TO OBJECTIVES | 52 | ||
TABLE 11 | - RELATIONSHIP OF SECURITY REQUIREMENTS TO OBJECTIVES | 56 | |
TABLE 12 | - FUNCTIONAL REQUIREMENTS DEPENDENCIES | 60 | |
TABLE 13 | - MAPPING OF SECURITY FUNCTIONAL REQUIREMENTS TO TOE SECURITY FUNCTIONS | 62 | |
TABLE 14 | - ACRONYMS | 66 |
Nortel VPN Router v7.05 and Client Workstation v7.11 | Page 4 of 67 |
© 2008 Nortel Networks |
|