Specifications
53
6.1.43 FTP_ITC_(EXT).1 Extended: Inter-TSF Trusted Channel
FTP_ITC_(EXT).1.1 The TOE shall provide an encrypted communication channel between itself and entities in
TOE IT Environment that is logically distinct from other communication channels and
provides assured identification of its end points and protection of the channel data from
modification or disclosure.
FTP_ITC_(EXT).1.2 The TSF shall permit the TSF, or the IT Environment entities to initiate communication via
the trusted channel.
FTP_ITC_(EXT).1.3 The TSF shall initiate communication via the trusted channel for all authentication functions,
remote logging, time, [remote administration, communications with MSE, communications
with WCS or NCS ].
6.1.44 FTP_TRP.1 Trusted Path
FTP_TRP.1.1 The TSF shall provide a communication path between itself and wireless users client devices
that is logically distinct from other communication paths and provides assured identification
of its end points and protection of the communicated data from modification, replay or
disclosure.
FTP_TRP.1.2 The TSF shall permit wireless client devices to initiate communication via the trusted path.
FTP_TRP.1.3 The TSF shall require the use of the trusted path for wireless user client authentication,
[none].
6.1.45 IPS_SDC_(EXT).1 Extended: wIPS Data Collection
IPS_SDC_(EXT).1.1 The TSF shall be able to collect the following information from wireless networks:
a) wireless network traffic.
IPS_SDC_(EXT).1.2 The TSF shall be able to collect and record the following information, and transmit the
information to the MSE for further analysis and reporting:
a) date and time of the event;
b) identity of the source and destination of the traffic;
c) AP identity;
d) wireless signal strength; and
e) the wireless network traffic details indicative of the following advanced wIPS events:
a. DoS Attack Detection including:
i. Association flood
ii. Association table overflow
iii. Authentication flood
iv. EAPOL-Start attack
v. PS-Poll flood
vi. CTS Flood
vii. Queensland University of Technology Exploit
viii. RF jamming attack
ix. RTS flood