Specifications
49
mechanism for administrators and wireless LAN users.
Application note: Local authentication mechanisms are used for all authentication of SNMPv3 Users, and
optionally for authentication of wireless users. Remote authentication is used for all
authentication of Management Users connecting to the SSH CLI or the TLS GUI, and
optionally for authentication of wireless users.
6.1.22 FIA_UID.2 User Identification Before any Action
FIA_UID.2.1 The TSF shall require each user to be successfully identified before allowing any other TSF-
mediated actions on behalf of that user.
6.1.23 FIA_USB.1(1) User-Subject Binding (Administrator)
FIA_USB.1.1(1) The TSF shall associate the following administrator user security attributes with subjects
acting on the behalf of that user: [username, session ID, access mode].
FIA_USB.1.2(1) The TSF shall enforce the following rules on the initial association of user security attributes
with subjects acting on the behalf of users: [the username role will be bound to the
administrative session upon successful authentication with the TOE].
FIA_USB.1.3(1) The TSF shall enforce the following rules governing changes to the user security attributes
associated with subjects acting on the behalf of users: [none].
Application note: An āaccess modeā such as ReadOnly, and ReadWrite is assigned to each administrative
user account (Management User account or SNMPv3 User account).
6.1.24 FIA_USB.1(2) User-Subject Binding (Wireless User)
FIA_USB.1.1(2) The TSF shall associate the following wireless user security attributes with subjects acting on
the behalf of that user: [host MAC address].
FIA_USB.1.2(2) The TSF shall enforce the following rules on the initial association of user security attributes
with subjects acting on the behalf of users: [a wireless user will have their MAC address
associated with their session after successful authentication with the TOE].
FIA_USB.1.3(2) The TSF shall enforce the following rules governing changes to the user security attributes
associated with subjects acting on the behalf of users: [none].
6.1.25 FMT_MOF.1(1) Management of Cryptographic Security Functions
Behavior
FMT_MOF.1.1(1) The TSF shall restrict the ability to modify the behavior of the cryptographic functions