Hardware manual
Version 1.1, 03/31/2015
GSS CCT Evaluation Technical Report Page 50 of 56 © 2015 Gossamer Security Solutions, Inc.
Document: AAR-BrocadeNetIron5.8 All rights reserved.
Test 2 – The evaluator was unable to find a method of using SSH without invoking the trusted path. The
communications path was always encrypted and used the servers key. Likewise the HTTPS connection already
required encryption.
Test 3 – The evaluator tested the correctness of the SSH encryption when testing the FCS_SSH_EXT.1 requirement
and tested HTTPS when testing the FCS_HTTPS_EXT.1 requirement.