Nortel Networks 7.05 Table of Figures, Table of Tables, Protection Profile Claims, Rationale

Models: 7.11 7.05

1 67
Download 67 pages 33.01 Kb
Page 4
Image 4
PROTECTION PROFILE CLAIMS

Security Target, Version 3.9March 18, 2008

7

PROTECTION PROFILE CLAIMS

51

 

7.1

PROTECTION PROFILE REFERENCE

51

8

RATIONALE

52

 

8.1

SECURITY OBJECTIVES RATIONALE

52

 

8.2

SECURITY FUNCTIONAL REQUIREMENTS RATIONALE

55

 

8.3

SECURITY ASSURANCE REQUIREMENTS RATIONALE

60

 

8.4

RATIONALE FOR STRENGTH OF FUNCTION

60

 

8.5

DEPENDENCY RATIONALE

60

 

8.6

TOE SUMMARY SPECIFICATION RATIONALE

62

 

8.6.1

TOE Summary Specification Rationale for the Security Functional Requirements

62

 

8.6.2

TOE Summary Specification Rationale for the Security Assurance Requirements

63

 

8.7

STRENGTH OF FUNCTION

65

9

ACRONYMS

66

Table of Figures

FIGURE 1 – VPN CLIENT DEPLOYMENT CONFIGURATION OF THE TOE

8

FIGURE 2 – BRANCH OFFICE DEPLOYMENT CONFIGURATION OF THE TOE

9

FIGURE 3

- PHYSICAL TOE BOUNDARY

10

FIGURE 4

- PHYSICAL TOE BOUNDARY IN BRANCH OFFICE TUNNEL MODE

10

FIGURE 5

- TOE LOGICAL BOUNDARY

12

FIGURE 6

- TOE LOGICAL BOUNDARY IN BRANCH OFFICE TUNNEL MODE

12

Table of Tables

TABLE 1 - ST, TOE, AND CC IDENTIFICATION AND CONFORMANCE

5

TABLE 2 - TERMINOLOGY

6

TABLE 3 - TOE SECURITY FUNCTIONAL REQUIREMENTS

20

TABLE 4 - AUDITABLE EVENTS

22

TABLE 5 - IT ENVIRONMENT SECURITY FUNCTIONAL REQUIREMENTS

39

TABLE 6

- ASSURANCE COMPONENTS

41

TABLE 7

- MAPPING OF TOE SECURITY FUNCTIONS TO SECURITY FUNCTIONAL REQUIREMENTS

42

TABLE 8

- FIPS-VALIDATEDCRYPTOGRAPHIC ALGORITHMS

45

TABLE 9

- ASSURANCE MEASURES MAPPING TO TOE SECURITY ASSURANCE REQUIREMENTS (SARS)

49

TABLE 10 - RELATIONSHIP OF SECURITY THREATS TO OBJECTIVES

52

TABLE 11

- RELATIONSHIP OF SECURITY REQUIREMENTS TO OBJECTIVES

56

TABLE 12

- FUNCTIONAL REQUIREMENTS DEPENDENCIES

60

TABLE 13

- MAPPING OF SECURITY FUNCTIONAL REQUIREMENTS TO TOE SECURITY FUNCTIONS

62

TABLE 14

- ACRONYMS

66

Nortel VPN Router v7.05 and Client Workstation v7.11

Page 4 of 67

© 2008 Nortel Networks

 

Page 4
Image 4
Nortel Networks 7.05, 7.11 manual Table of Figures, Table of Tables, Protection Profile Claims, Rationale, Acronyms