Specifications
5
List of Tables
Table 1 Acronyms, Abbreviations & Definitions .......................................................................................................... 8
Table 2 Terms & Definitions ....................................................................................................................................... 11
Table 3 Required Number & Versions ........................................................................................................................ 14
Table 4 Cisco Access Point Model, Hardware Configuration, and Part Number ........................................................ 16
Table 5 Cisco Wireless LAN Controllers, Hardware Configuration, and Part Numbers ............................................ 22
Table 6 ACS/ISE I&A Methods Included in the TOE Physical Boundary ................................................................. 28
Table 7 TOE Component Communication Methods ................................................................................................... 30
Table 8 TOE Assumptions........................................................................................................................................... 33
Table 9 Threats ............................................................................................................................................................ 34
Table 10 Organizational Security Policies ................................................................................................................... 35
Table 11 Security Objectives for the TOE ................................................................................................................... 36
Table 12 Security Objectives for the Environment ...................................................................................................... 38
Table 13 TOE Security Functional Requirements ....................................................................................................... 40
Table 14 SFR Auditable Events .................................................................................................................................. 42
Table 15 TOE IT Environment Auditable Events ....................................................................................................... 56
Table 16 TOE Assurance Requirements ...................................................................................................................... 60
Table 17 TOE Security Functions ............................................................................................................................... 61
Table 18 Assurance Measures ..................................................................................................................................... 76
Table 19 Threats, Assumptions & Policies to Security Objectives Mapping .............................................................. 78
Table 20 Threats, Assumptions & Policies to Security Objectives Rationale ............................................................. 79
Table 21 TOE Security Functional Requirement to TOE Security Objectives Mapping ............................................ 85
Table 22 TOE Security Functional Requirement to TOE Security Objectives Rationale .......................................... 87
Table 23 TOE Security Functional Requirements Dependency Rationale .................................................................. 93
Table 24 Unsupported Dependency Rationale ............................................................................................................ 96
Table 25 Rationale for Explicit Requirements for the TOE ........................................................................................ 97
1 Security Target Introduction
This section presents Security Target (ST) identification information and an overview of the
ST. The structure and content of this ST complies with the requirements specified in the
Common Criteria (CC), Part 1, Annex A, and Part 3, Chapter 4.
1.1 ST & TOE Identification
This section provides information needed to identify and control this ST and its TOE. This ST
targets Evaluation Assurance Level EAL4 augmented with ALC_FLR.2.
ST Title
Cisco Wireless Local Area Network (WLAN) Access
System with Integrated Wireless Intrusion Prevention
System (wIPS) Security Target
ST Version
3.1
Publication Date
August 2013