Security Target, Version 3.9
Nortel VPN Router v7.05 and Client Workstation v7.11
Table of Contents
REVISION HISTORY ................................................................................................................................................ 2
TABLE OF CONTENTS ............................................................................................................................................ 3
TABLE OF FIGURES ................................................................................................................................................ 4
TABLE OF TABLES .................................................................................................................................................. 4
1 SECURITY TARGET INTRODUCTION ........................................................................................................ 5
1.1 PURPOSE ......................................................................................................................................................... 5
1.2 SECURITY TARGET, TOE AND CC IDENTIFICATION AND CONFORMANCE ...................................................... 5
1.3 CONVENTIONS, ACRONYMS, AND TERMINOLOGY .......................................................................................... 6
1.3.1 Conventions ........................................................................................................................................... 6
1.3.2 Terminology ........................................................................................................................................... 6
2 TOE DESCRIPTION .......................................................................................................................................... 8
2.1 PRODUCT TYPE ............................................................................................................................................... 8
2.2 PRODUCT DESCRIPTION .................................................................................................................................. 8
2.3 TOE BOUNDARIES AND SCOPE ..................................................................................................................... 10
2.3.1 Physical Boundary ............................................................................................................................... 10
2.3.2 Logical Boundary ................................................................................................................................ 11
2.3.3 Excluded TOE Functionality................................................................................................................ 15
3 TOE SECURITY ENVIRONMENT ............................................................................................................... 16
3.1 ASSUMPTIONS .............................................................................................................................................. 16
3.2 THREATS TO SECURITY................................................................................................................................. 16
3.2.1 Threats Addressed by the TOE ............................................................................................................ 17
3.2.2 Threats Addressed by the TOE Environment ....................................................................................... 17
4 SECURITY OBJECTIVES .............................................................................................................................. 18
4.1 SECURITY OBJECTIVES FOR THE TOE ........................................................................................................... 18
4.2 SECURITY OBJECTIVES FOR THE ENVIRONMENT ........................................................................................... 19
4.2.1 IT Security Objectives .......................................................................................................................... 19
4.2.2 Non-IT Security Objectives .................................................................................................................. 19
5 IT SECURITY REQUIREMENTS .................................................................................................................. 20
5.1 TOE SECURITY FUNCTIONAL REQUIREMENTS ............................................................................................. 20
5.1.1 Class FAU: Security Audit ................................................................................................................... 22
5.1.2 Class FCS: Cryptographic Support ..................................................................................................... 24
5.1.3 Class FDP: User Data Protection ....................................................................................................... 27
5.1.4 Class FIA: Identification and Authentication ...................................................................................... 31
5.1.5 Class FMT: Security Management ...................................................................................................... 33
5.1.6 Class FPT: Protection of the TSF ........................................................................................................ 37
5.1.7 Class FTP: Trusted Path/Channels ..................................................................................................... 38
5.2 SECURITY FUNCTIONAL REQUIREMENTS ON THE IT ENVIRONMENT ............................................................ 39
5.3 ASSURANCE REQUIREMENTS ........................................................................................................................ 41
6 TOE SUMMARY SPECIFICATION .............................................................................................................. 42
6.1 TOE SECURITY FUNCTIONS .......................................................................................................................... 42
6.1.1 Security Audit ....................................................................................................................................... 43
6.1.2 Cryptographic Support ........................................................................................................................ 45
6.1.3 User Data Protection ........................................................................................................................... 46
6.1.4 Identification and Authentication ........................................................................................................ 47
6.1.5 Security Management .......................................................................................................................... 47
6.1.6 Protection of the TOE Security Functions ........................................................................................... 48
6.1.7 Trusted Path/Channels ........................................................................................................................ 49
6.2 TOE SECURITY ASSURANCE MEASURES ...................................................................................................... 49