System information
Cisco Cat3K ST    6 June 2012 
2 
Table of Contents 
1  SECURITY TARGET INTRODUCTION ............................................................................. 6 
1.1  ST and TOE Reference ........................................................................................ 6 
1.2  Acronyms and Abbreviations ............................................................................... 6 
1.3  TOE Overview ..................................................................................................... 8 
1.3.1  TOE Product Type ........................................................................................ 8 
1.3.2  Supported non-TOE Hardware/ Software/ Firmware ................................... 8 
1.4  TOE DESCRIPTION ........................................................................................... 8 
1.5  TOE Evaluated Configuration .............................................................................. 9 
1.6  Physical Scope of the TOE................................................................................. 10 
1.7  Logical Scope of the TOE .................................................................................. 14 
1.7.1  Security audit .............................................................................................. 14 
1.7.2  Cryptographic support ................................................................................ 14 
1.7.3  Traffic Filtering and Switching (VLAN Processing and ACLs) ................ 15 
1.7.4  Identification and authentication................................................................. 16 
1.7.5  Security management .................................................................................. 16 
1.7.6  Protection of the TSF .................................................................................. 17 
1.7.7  TOE Access ................................................................................................ 18 
1.8  Excluded Functionality ...................................................................................... 18 
1.9  TOE Documentation .......................................................................................... 19 
2  Conformance Claims ............................................................................................................. 20 
2.1  Common Criteria Conformance Claim .............................................................. 20 
2.2  Protection Profile Conformance Claim .............................................................. 20 
3  SECURITY PROBLEM DEFINITION ................................................................................ 21 
3.1  Assumptions ....................................................................................................... 21 
3.2  Threats ................................................................................................................ 21 
3.3  Organizational Security Policies ........................................................................ 22 
4  SECURITY OBJECTIVES ................................................................................................... 23 
4.1  Security Objectives for the TOE ........................................................................ 23 
4.2  Security Objectives for the Environment ........................................................... 24 
5  SECURITY REQUIREMENTS ........................................................................................... 25 
5.1  Conventions ........................................................................................................ 25 
5.2  TOE Security Functional Requirements ............................................................ 25 
5.2.1  Security audit (FAU)................................................................................... 27 
5.2.2  Cryptographic Support (FCS) ..................................................................... 29 
5.2.3  User data protection (FDP) ......................................................................... 31 
5.2.4  Identification and authentication (FIA) ...................................................... 37 
5.2.5  Security management (FMT) ...................................................................... 38 
5.2.6  Protection of the TSF (FPT) ....................................................................... 40 
5.2.7  TOE Access (FTA) ..................................................................................... 40 
5.3  Extended Components Definition ...................................................................... 40 
5.4  TOE SFR Dependencies Rationale .................................................................... 41 
5.5  Security Assurance Requirements ...................................................................... 43 
5.5.1  SAR Requirements...................................................................................... 43 










