Nortel Networks Nortel Network VPN Router and Client Workstation 7.05 User Manual

Page 3

Advertising
background image

Security Target, Version 3.9

March 18, 2008

Nortel VPN Router v7.05 and Client Workstation v7.11

Page 3 of 67

© 2008 Nortel Networks

Table of Contents

REVISION HISTORY ................................................................................................................................................ 2

TABLE OF CONTENTS ............................................................................................................................................ 3

TABLE OF FIGURES ................................................................................................................................................ 4

TABLE OF TABLES .................................................................................................................................................. 4

1

SECURITY TARGET INTRODUCTION ........................................................................................................ 5

1.1

P

URPOSE

......................................................................................................................................................... 5

1.2

S

ECURITY

T

ARGET

,

TOE

AND

CC

I

DENTIFICATION AND

C

ONFORMANCE

...................................................... 5

1.3

C

ONVENTIONS

,

A

CRONYMS

,

AND

T

ERMINOLOGY

.......................................................................................... 6

1.3.1

Conventions ........................................................................................................................................... 6

1.3.2

Terminology ........................................................................................................................................... 6

2

TOE DESCRIPTION .......................................................................................................................................... 8

2.1

P

RODUCT

T

YPE

............................................................................................................................................... 8

2.2

P

RODUCT

D

ESCRIPTION

.................................................................................................................................. 8

2.3

TOE

B

OUNDARIES AND

S

COPE

..................................................................................................................... 10

2.3.1

Physical Boundary ............................................................................................................................... 10

2.3.2

Logical Boundary ................................................................................................................................ 11

2.3.3

Excluded TOE Functionality................................................................................................................ 15

3

TOE SECURITY ENVIRONMENT ............................................................................................................... 16

3.1

A

SSUMPTIONS

.............................................................................................................................................. 16

3.2

T

HREATS TO

S

ECURITY

................................................................................................................................. 16

3.2.1

Threats Addressed by the TOE ............................................................................................................ 17

3.2.2

Threats Addressed by the TOE Environment ....................................................................................... 17

4

SECURITY OBJECTIVES .............................................................................................................................. 18

4.1

S

ECURITY

O

BJECTIVES FOR THE

TOE ........................................................................................................... 18

4.2

S

ECURITY

O

BJECTIVES FOR THE

E

NVIRONMENT

........................................................................................... 19

4.2.1

IT Security Objectives .......................................................................................................................... 19

4.2.2

Non-IT Security Objectives .................................................................................................................. 19

5

IT SECURITY REQUIREMENTS .................................................................................................................. 20

5.1

TOE

S

ECURITY

F

UNCTIONAL

R

EQUIREMENTS

............................................................................................. 20

5.1.1

Class FAU: Security Audit ................................................................................................................... 22

5.1.2

Class FCS: Cryptographic Support ..................................................................................................... 24

5.1.3

Class FDP: User Data Protection ....................................................................................................... 27

5.1.4

Class FIA: Identification and Authentication ...................................................................................... 31

5.1.5

Class FMT: Security Management ...................................................................................................... 33

5.1.6

Class FPT: Protection of the TSF ........................................................................................................ 37

5.1.7

Class FTP: Trusted Path/Channels ..................................................................................................... 38

5.2

S

ECURITY

F

UNCTIONAL

R

EQUIREMENTS ON THE

IT

E

NVIRONMENT

............................................................ 39

5.3

A

SSURANCE

R

EQUIREMENTS

........................................................................................................................ 41

6

TOE SUMMARY SPECIFICATION .............................................................................................................. 42

6.1

TOE

S

ECURITY

F

UNCTIONS

.......................................................................................................................... 42

6.1.1

Security Audit ....................................................................................................................................... 43

6.1.2

Cryptographic Support ........................................................................................................................ 45

6.1.3

User Data Protection ........................................................................................................................... 46

6.1.4

Identification and Authentication ........................................................................................................ 47

6.1.5

Security Management .......................................................................................................................... 47

6.1.6

Protection of the TOE Security Functions ........................................................................................... 48

6.1.7

Trusted Path/Channels ........................................................................................................................ 49

6.2

TOE

S

ECURITY

A

SSURANCE

M

EASURES

...................................................................................................... 49

Advertising
This manual is related to the following products: