Installation guide
Motorola WS5100 Wireless Switch and RFS7000 RF Switch Security Target
Page 15 of 85
4 Security Objectives
4.1 Security Objectives for the TOE
Table 4-1 Security Objectives for TOE identifies the security objectives of the TOE. These security
objectives reflect the stated intent to counter identified threats and/or comply with any
organizational security policies identified. The table also shows the corresponding threats and
policies that are addressed by the objectives. An explanation of the relationship between the
objectives and the threats/policies is provided in the rationale section of this document. The
Security Objectives for the TOE are identical to those of WLANAS PP.
Table 4-1 Security Objectives for TOE
Name TOE Security Objective
O.AUDIT_GENERATION The TOE will provide the capability to detect and create
records of security-relevant events associated with users.
O.CORRECT_TSF_OPERATION The TOE will provide the capability to verify the correct
operation of the TSF.
O.CRYPTOGRAPHY The TOE shall provide cryptographic functions to maintain
the confidentiality and allow for detection of modification of
user data that is transmitted between physically separated
portions of the TOE, or outside of the TOE.
O.CRYPTOGRAPHY_VALIDATED The TOE will use NIST FIPS 140-1/2 validated crypto
modules for cryptographic services implementing NIST-
approved security functions and random number generation
services used by cryptographic functions.
O.DISPLAY_BANNER The TOE will display an advisory warning prior to
establishing an administrator session regarding use of the
TOE prior to permitting the use of any TOE services that
requires authentication.
O.MANAGE The TOE will provide functions and facilities necessary to
support the administrators in their management of the
security of the TOE, and restrict these functions and facilities
from unauthorized use.
O.MEDIATE The TOE must mediate the flow of information to and from
wireless clients communicating via the TOE in accordance
with its security policy.