Installation guide

Motorola WS5100 Wireless Switch and RFS7000 RF Switch Security Target
Page 40 of 85
6 TOE Summary Specification
This chapter describes the security functions and associated assurance measures.
6.1 TOE Security Functions
The following security functions are implemented by the TOE
a) Security Audit
b) Cryptographic Support
c) User Data Protection
d) Identification and Authentication
e) Security Management
f) Protection of the TSF
g) TOE Access
h) Trusted Path/Channels
6.1.1 Security Audit
The Security Audit function includes generation of audit events for startup/shutdown of audit
functions, modifications to the audit configuration, manual load of a key, cryptographic key transfer
errors, cryptographic key destruction, enabling/disabling wireless encryption, reaching of the
unsuccessful authentication attempts threshold and re-enabling the user, user authentication
attempts, authentication server failures, configuration of security functions, execution of self tests,
initiation/closure of a trusted channel, and initiation of a trusted path. The specific events are listed
as a part of FAU_GEN.1(1) definition. Audit events include at least date and time of the event, type
of event, subject identify (if applicable), and outcome (success or failure) of the event. For some
events additional information is included, as specified in FAU_GEN.1(1). For each identified user,
the username is included in the audit event record. The TOE provides an ability to include/exclude
events based on username, threshold syslog level, device interface and wireless client MAC
address.
The following syslog levels are supported:
Syslog level Description
LOG_EMERG An emergency condition. The system is unusable
LOG_ALERT This message warrants an immediate action
LOG_CRIT Critical Condition
LOG_ERR Error
LOG_WARNING Warning
LOG_NOTICE Normal but a significant condition
LOG_INFO Information only
LOG_DEBUG This message appears only during debug mode