Specifications
Aruba 6000 and Aruba 800 series Mobility Controller Security Target
Version 1.8
Page 2 of 101
TABLE OF CONTENTS
SECTION PAGE
1 Security Target Introduction.................................................................................. 7
1.1 Security Target Identification.....................................................................................7
1.2 Security Target Overview ...........................................................................................7
1.3 Common Criteria Conformance.................................................................................8
1.4 Document Conventions..............................................................................................8
1.5 Document Organization..............................................................................................8
2 TOE Description.................................................................................................... 10
2.1 Product Type.............................................................................................................10
2.1.1
Security features included in the evaluation ...............................................................................10
2.1.2
Security features not included in the evaluation .........................................................................10
2.1.3
TOE design and operation ...........................................................................................................11
2.2 TOE Physical Boundary ...........................................................................................13
2.3 TOE Logical Boundary .............................................................................................14
2.4 IT Environment..........................................................................................................16
3 TOE Security Environment .................................................................................. 18
3.1 Assumptions .............................................................................................................18
3.2 Threats.......................................................................................................................18
3.3 Organizational Security Policies..............................................................................19
4 Security Objectives .............................................................................................. 20
4.1 Security Objectives for the TOE ..............................................................................20
4.2 Security Objectives for the Environment ................................................................21
4.2.1
Security Objectives for the IT Environment ................................................................................21
4.2.2
Non-IT Security Objectives ..........................................................................................................21
5 IT Security Requirements .................................................................................... 23
5.1 TOE Security Functional Requirements..................................................................23
5.1.1
Security Audit ................................................................................................................................24
5.1.1.1
FAU_ARP.1 Security alarms........................................................................................................24
5.1.1.2
FAU_SAA.3 Simple attack heuristics ..........................................................................................25
5.1.1.3
FAU_GEN.1a Audit Data Generation..........................................................................................26
5.1.1.4
FAU_GEN.2 User identity association ........................................................................................29
5.1.1.5
FAU_SEL.1 Selective audit..........................................................................................................29
5.1.2
Identification and authentication ..................................................................................................30
5.1.2.1
FIA_UAU.1a Timing of authentication .........................................................................................30
5.1.2.2
FIA_UAU_EXP.5a Multiple authentication mechanisms ...........................................................30
5.1.2.3
FIA_UID.2a User identification before any action ......................................................................30
5.1.2.4
FIA_ATD.1a Administrator attribute definition ............................................................................30
5.1.2.5
FIA_ATD.1b User attribute definition...........................................................................................31
5.1.2.6
FIA_USB.1 User-subject binding.................................................................................................31










