Specifications

Security Target Version 1.0 9/29/2014
7
1.2 Conformance Claims
This TOE is conformant to the following CC specifications:
Protection Profile for Wireless Local Area Network (WLAN) Access Systems, version 1.0, 01 December
2011 (WLASPP)
Common Criteria for Information Technology Security Evaluation Part 2: Security functional components,
Version 3.1, Revision 3, July 2009.
Part 2 Extended
Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components,
Version 3.1 Revision 3, July 2009.
Part 3 Conformant
Assurance Level: EAL 1
1.3 Conventions
The following conventions have been applied in this document:
Security Functional Requirements Part 2 of the CC defines the approved set of operations that may be
applied to functional requirements: iteration, assignment, selection, and refinement.
o Iteration: allows a component to be used more than once with varying operations. In the ST,
iteration is indicated by a letter placed at the end of the component. For example FDP_ACC.1a
and FDP_ACC.1b indicate that the ST includes two iterations of the FDP_ACC.1 requirement, a
and b.
o Assignment: allows the specification of an identified parameter. Assignments are indicated using
bold and are surrounded by brackets (e.g., [assignment]). Note that an assignment within a
selection would be identified in italics and with embedded bold brackets (e.g., [[selected-
assignment]]).
o Selection: allows the specification of one or more elements from a list. Selections are indicated
using bold italics and are surrounded by brackets (e.g., [selection]).
o Refinement: allows the addition of details. Refinements are indicated using bold, for additions,
and strike-through, for deletions (e.g., “… all objects …” or “… some
big things …”).
o Extended Requirements are allowed to create requirements should the Common Criteria not offer
suitable requirements to meet the ST needs. To ensure these requirements are explicitly identified,
the ending "_EXT" is appended to the newly created short name and the component.
The WLASPP uses an additional convention the ‘case’ which defines parts of an SFR that apply only
when corresponding selections are made or some other identified conditions exist. Only the applicable
cases are identified in this ST and they are identified using bold text.
Other sections of the ST Other sections of the ST use bolding to highlight text of special interest, such as
captions.
1.3.1 Acronyms
AAA
Authentication, Authorization, and Accounting
AES
Advanced Encryption Standard
AP
Access Point
BOC
Branch Office Controller
CC
Common Criteria