Specifications
Brocade MLXe® and NetIron® Family Devices with Multi-Service IronWare R05.7.00
Security Target Version 1., July 15, 2014
Page 16 of 50
FTA: TOE access
FTA_SSL.3: TSF-initiated Termination
FTA_SSL.4: User-initiated Termination
FTA_SSL_EXT.1: TSF-initiated Session Locking
FTA_TAB.1: Default TOE Access Banners
FTP: Trusted
path/channels
FTP_ITC.1: Trusted Channel
FTP_TRP.1: Trusted Path
Table 1 TOE Security Functional Components
5.1.1 Security Audit (FAU)
5.1.1.1 Audit Data Generation (FAU_GEN.1)
FAU_GEN.1.1
The TSF shall be able to generate an audit record of the following auditable events:
a) Start-up of the audit functions;
b) All auditable events for the not specified level of audit; and
c) All administrative actions;
d) Specifically defined auditable events listed in Table 2 Auditable Events.
Assurance Activity:
The evaluator shall check the administrative guide and ensure that it lists all of the auditable
events and provides a format for audit records. Each audit record format type must be covered,
along with a brief description of each field. The evaluator shall check to make sure that every
audit event type mandated by the NDPP is described and that the description of the fields contains
the information required in FAU_GEN.1.2, and the additional information specified in Table 2
Auditable Events.
The evaluator shall also make a determination of the administrative actions that are relevant in the
context of the NDPP. The evaluator shall examine the administrative guide and make a
determination of which administrative commands, including subcommands, scripts, and
configuration files, are related to the configuration (including enabling or disabling) of the
mechanisms implemented in the TOE that are necessary to enforce the requirements specified in
the NDPP. The evaluator shall document the methodology or approach taken while determining
which actions in the administrative guide are security relevant with respect to the NDPP. The
evaluator may perform this activity as part of the activities associated with ensuring the
AGD_OPE guidance satisfies the requirements.
The evaluator shall test the TOE’s ability to correctly generate audit records by having the TOE
generate audit records for the events listed in Table 2 Auditable Events and administrative
actions. This should include all instances of an event--for instance, if there are several different
I&A mechanisms for a system, the FIA_UIA_EXT.1 events must be generated for each
mechanism. The evaluator shall test that audit records are generated for the establishment and
termination of a channel for each of the cryptographic protocols contained in the ST. If HTTPS is
implemented, the test demonstrating the establishment and termination of a TLS session can be
combined with the test for an HTTPS session. For administrative actions, the evaluator shall test
that each action determined by the evaluator above to be security relevant in the context of the
NDPP is auditable. When verifying the test results, the evaluator shall ensure the audit records
generated during testing match the format specified in the administrative guide, and that the fields
in each audit record have the proper entries.
Note that the testing here can be accomplished in conjunction with the testing of the security
mechanisms directly. For example, testing performed to ensure that the administrative guidance