System information
Cisco Cat3K ST 6 June 2012
2
Table of Contents
1 SECURITY TARGET INTRODUCTION ............................................................................. 6
1.1 ST and TOE Reference ........................................................................................ 6
1.2 Acronyms and Abbreviations ............................................................................... 6
1.3 TOE Overview ..................................................................................................... 8
1.3.1 TOE Product Type ........................................................................................ 8
1.3.2 Supported non-TOE Hardware/ Software/ Firmware ................................... 8
1.4 TOE DESCRIPTION ........................................................................................... 8
1.5 TOE Evaluated Configuration .............................................................................. 9
1.6 Physical Scope of the TOE................................................................................. 10
1.7 Logical Scope of the TOE .................................................................................. 14
1.7.1 Security audit .............................................................................................. 14
1.7.2 Cryptographic support ................................................................................ 14
1.7.3 Traffic Filtering and Switching (VLAN Processing and ACLs) ................ 15
1.7.4 Identification and authentication................................................................. 16
1.7.5 Security management .................................................................................. 16
1.7.6 Protection of the TSF .................................................................................. 17
1.7.7 TOE Access ................................................................................................ 18
1.8 Excluded Functionality ...................................................................................... 18
1.9 TOE Documentation .......................................................................................... 19
2 Conformance Claims ............................................................................................................. 20
2.1 Common Criteria Conformance Claim .............................................................. 20
2.2 Protection Profile Conformance Claim .............................................................. 20
3 SECURITY PROBLEM DEFINITION ................................................................................ 21
3.1 Assumptions ....................................................................................................... 21
3.2 Threats ................................................................................................................ 21
3.3 Organizational Security Policies ........................................................................ 22
4 SECURITY OBJECTIVES ................................................................................................... 23
4.1 Security Objectives for the TOE ........................................................................ 23
4.2 Security Objectives for the Environment ........................................................... 24
5 SECURITY REQUIREMENTS ........................................................................................... 25
5.1 Conventions ........................................................................................................ 25
5.2 TOE Security Functional Requirements ............................................................ 25
5.2.1 Security audit (FAU)................................................................................... 27
5.2.2 Cryptographic Support (FCS) ..................................................................... 29
5.2.3 User data protection (FDP) ......................................................................... 31
5.2.4 Identification and authentication (FIA) ...................................................... 37
5.2.5 Security management (FMT) ...................................................................... 38
5.2.6 Protection of the TSF (FPT) ....................................................................... 40
5.2.7 TOE Access (FTA) ..................................................................................... 40
5.3 Extended Components Definition ...................................................................... 40
5.4 TOE SFR Dependencies Rationale .................................................................... 41
5.5 Security Assurance Requirements ...................................................................... 43
5.5.1 SAR Requirements...................................................................................... 43