Nortel Networks 7.11 Network Router User Manual


 
Security Target, Version 3.9
March 18, 2008
Nortel VPN Router v7.05 and Client Workstation v7.11
Page 4 of 67
© 2008 Nortel Networks
7 PROTECTION PROFILE CLAIMS ............................................................................................................... 51
7.1 PROTECTION PROFILE REFERENCE ............................................................................................................... 51
8 RATIONALE ..................................................................................................................................................... 52
8.1 SECURITY OBJECTIVES RATIONALE .............................................................................................................. 52
8.2 SECURITY FUNCTIONAL REQUIREMENTS RATIONALE .................................................................................. 55
8.3 SECURITY ASSURANCE REQUIREMENTS RATIONALE .................................................................................... 60
8.4 RATIONALE FOR STRENGTH OF FUNCTION ................................................................................................... 60
8.5 DEPENDENCY RATIONALE ............................................................................................................................ 60
8.6 TOE SUMMARY SPECIFICATION RATIONALE ................................................................................................ 62
8.6.1 TOE Summary Specification Rationale for the Security Functional Requirements ............................. 62
8.6.2 TOE Summary Specification Rationale for the Security Assurance Requirements .............................. 63
8.7 STRENGTH OF FUNCTION .............................................................................................................................. 65
9 ACRONYMS ...................................................................................................................................................... 66
Table of Figures
FIGURE 1 VPN CLIENT DEPLOYMENT CONFIGURATION OF THE TOE.......................................................................... 8
FIGURE 2 BRANCH OFFICE DEPLOYMENT CONFIGURATION OF THE TOE .................................................................... 9
FIGURE 3 - PHYSICAL TOE BOUNDARY ........................................................................................................................ 10
FIGURE 4 - PHYSICAL TOE BOUNDARY IN BRANCH OFFICE TUNNEL MODE ................................................................ 10
FIGURE 5 - TOE LOGICAL BOUNDARY ......................................................................................................................... 12
FIGURE 6 - TOE LOGICAL BOUNDARY IN BRANCH OFFICE TUNNEL MODE ................................................................. 12
Table of Tables
TABLE 1 - ST, TOE, AND CC IDENTIFICATION AND CONFORMANCE .............................................................................. 5
TABLE 2 - TERMINOLOGY ............................................................................................................................................... 6
TABLE 3 - TOE SECURITY FUNCTIONAL REQUIREMENTS ............................................................................................. 20
TABLE 4 - AUDITABLE EVENTS .................................................................................................................................... 22
TABLE 5 - IT ENVIRONMENT SECURITY FUNCTIONAL REQUIREMENTS ........................................................................ 39
TABLE 6 - ASSURANCE COMPONENTS .......................................................................................................................... 41
TABLE 7 - MAPPING OF TOE SECURITY FUNCTIONS TO SECURITY FUNCTIONAL REQUIREMENTS ............................... 42
TABLE 8 - FIPS-VALIDATED CRYPTOGRAPHIC ALGORITHMS ...................................................................................... 45
TABLE 9 - ASSURANCE MEASURES MAPPING TO TOE SECURITY ASSURANCE REQUIREMENTS (SARS) ...................... 49
TABLE 10 - RELATIONSHIP OF SECURITY THREATS TO OBJECTIVES ............................................................................. 52
TABLE 11 - RELATIONSHIP OF SECURITY REQUIREMENTS TO OBJECTIVES ................................................................... 56
TABLE 12 - FUNCTIONAL REQUIREMENTS DEPENDENCIES ........................................................................................... 60
TABLE 13 - MAPPING OF SECURITY FUNCTIONAL REQUIREMENTS TO TOE SECURITY FUNCTIONS ............................. 62
TABLE 14 - ACRONYMS ................................................................................................................................................ 66