Hardware manual
Version 1.1, 03/31/2015
GSS CCT Evaluation Technical Report Page 34 of 56 © 2015 Gossamer Security Solutions, Inc.
Document: AAR-BrocadeNetIron5.8 All rights reserved.
2.5.1 MANAGEMENT OF TSF DATA (FOR GENERAL TSF DATA) (FMT_MTD.1)
2.5.1.1 FMT_MTD.1.1
TSS Assurance Activities: The evaluator shall examine the TSS to determine that, for each administrative function
identified in the operational guidance; those that are accessible through an interface prior to administrator log-in
are identified. For each of these functions, the evaluator shall also confirm that the TSS details how the ability to
manipulate the TSF data through these interfaces is disallowed for non-administrative users.
Section 6.4 indicates that the TOE doesn’t offer any functions prior to logging in.
Section 6.5 explains that there are privilege levels and the Super User privilege is used to denote an Authorized
Administrator. The TSF data manipulation commands are restricted to that privilege level.
The evaluators have not identified any additional commands available prior to logging in.
See FMT_SMF.1. The evaluator has found guidance for each of the identified management functions. All
management functions are available only after having logged in and if the user has the appropriate management
privilege level. The functions available prior to login – network traffic and warning banner – are configurable, but
otherwise the evaluator found no evidence that other function, particularly the management functions, would be
available without first logging in.
Guidance Assurance Activities: The evaluator shall review the operational guidance to determine that each of the
TSF-data-manipulating functions implemented in response to the requirements of this PP is identified, and that
configuration information is provided to ensure that only administrators have access to the functions.
The ST identifies the following as restricted: audit configuration data, information flow policy ACLs, user and
administrator security attributes (including passwords and privilege levels), authentication method lists, the logon
failure threshold, the remote access user list; and cryptographic support settings.
The following functions are identified in FMT_SMF.1 in the ST: remote and local administration, update the TOE,
Configure TOE-provided services available before authentication (routing and warning banner), configure
cryptographic functionality.
As such, instructions have been identified by the evaluators for the following list of functions suggested by the ST:
Audit configuration data
o The FIPS Guide includes instructions for “Configuring an encrypted syslog server”.
o The Security Configuration Guide includes instructions for “ACL deny logging” and “ACL
accounting”.
o The Administration Guide includes instructions for “Configuring the Syslog service”.