Specifications
Cisco Aggregation Services Router (ASR) 901 Series Security Target
Page 2 of 50
Table of Contents
1 SECURITY TARGET INTRODUCTION .............................................................................................8
1.1 ST AND TOE REFERENCE ................................................................................................................... 8
1.2 TOE OVERVIEW ............................................................................................................................... 8
1.2.1 TOE Product Type .................................................................................................................... 9
1.2.2 Supported non-TOE Hardware/ Software/ Firmware ............................................................. 9
1.3 TOE DESCRIPTION ...................................................................................................................... 10
1.4 TOE EVALUATED CONFIGURATION .................................................................................................... 10
1.5 PHYSICAL SCOPE OF THE TOE ........................................................................................................... 12
1.6 LOGICAL SCOPE OF THE TOE ............................................................................................................ 14
1.6.1 Security audit ......................................................................................................................... 14
1.6.2 Cryptographic support ........................................................................................................... 15
1.6.1 User Data Protection ............................................................................................................. 16
1.6.2 Identification and Authentication ......................................................................................... 16
1.6.3 Security Management ........................................................................................................... 17
1.6.4 Protection of the TSF ............................................................................................................. 17
1.6.5 TOE Access ............................................................................................................................. 18
1.6.6 Trusted path/Channels .......................................................................................................... 18
1.7 EXCLUDED FUNCTIONALITY .............................................................................................................. 18
2 CONFORMANCE CLAIMS .......................................................................................................... 19
2.1 COMMON CRITERIA CONFORMANCE CLAIM ....................................................................................... 19
2.2 PROTECTION PROFILE CONFORMANCE ............................................................................................... 19
2.3 PROTECTION PROFILE CONFORMANCE CLAIM RATIONALE ..................................................................... 19
2.3.1 TOE Appropriateness ............................................................................................................. 19
2.3.2 TOE Security Problem Definition Consistency ........................................................................ 19
2.3.3 Statement of Security Requirements Consistency ................................................................. 20
3 SECURITY PROBLEM DEFINITION .............................................................................................. 21
3.1 ASSUMPTIONS ............................................................................................................................... 21
3.2 THREATS ....................................................................................................................................... 21
3.3 ORGANIZATIONAL SECURITY POLICIES ................................................................................................ 22
4 SECURITY OBJECTIVES .............................................................................................................. 23
4.1 SECURITY OBJECTIVES FOR THE TOE .................................................................................................. 23
4.2 SECURITY OBJECTIVES FOR THE ENVIRONMENT ................................................................................... 24
5 SECURITY REQUIREMENTS........................................................................................................ 25
5.1 CONVENTIONS ............................................................................................................................... 25
5.2 TOE SECURITY FUNCTIONAL REQUIREMENTS ...................................................................................... 25
5.2.1 Security audit (FAU) ............................................................................................................... 26
5.2.2 Cryptographic Support (FCS) ................................................................................................. 28
5.2.3 User data protection (FDP) .................................................................................................... 31
5.2.4 Identification and authentication (FIA) ................................................................................. 31
5.2.5 Security management (FMT) ................................................................................................. 32
5.2.6 Protection of the TSF (FPT) .................................................................................................... 33
5.2.7 TOE Access (FTA) ................................................................................................................... 34