Installation guide
Motorola WS5100 Wireless Switch and RFS7000 RF Switch Security Target
Page 84 of 85
9 Appendix
Table 9-1 Abbreviations and Acronyms
AES
Advanced Encryption Standard
CC
Common Criteria
CBC
Cipher Block Chaining
CCM
Counter with CBC-MAC
EAL
Evaluation Assurance Level
EAP
Extensible Authentication Protocol
EAP-TLS
EAP-Transport Layer Security Protocol
EAP-TTLS
EAP-Tunneled Transport Layer Security Protocol
FIPS 140-2
Federal Information Processing Standard Publication 140-2
IKE
Internet Key Exchange Protocol
IP
Internet Protocol
IPSec
IP Security Protocol
IT
Information Technology
LAN
Local Area Network
NTP
Network Time Protocol
MAC
Media Access Control
PEAP
Protected Extensible Authentication Protocol
PP
Protection Profile
SOF
Strength of Function
SF
Security Function
SFP
Security Function Policy
SSH
Secure Shell Protocol
ST
Security Target
TOE
Target of Evaluation
TLS
Transport Layer Security Protocol
Triple DES
Triple Data Encryption Standard
TSC
TSF Scope of Control
TSF
TOE Security Functions
TSP
TOE Security Policy
WLAN
Wireless Local Area Network
WLANAS
PP
US Government Wireless Local Area Network (WLAN)
Access System Protection Profile for Basic Robustness
Environments, Version 1.0, April 2006.
Table 9-2 References
[1] Common Criteria for Information Technology Security Evaluation, Part 1, Version 2.3, August 2005,
CCMB-2005-08-001
[2] Common Criteria for Information Technology Security Evaluation, Part 2, Version 2.3, August 2005,
CCMB-2005-08-002
[3] Common Criteria for Information Technology Security Evaluation, Part 3, Version 2.3, August 2005,
CCMB-2005-08-003
[4] Common Methodology for Information Technology Security Evaluation, Version 2.3, August 2005, CCMB-
2005-08-004
[5] US Government Wireless Local Area Network (WLAN) Access System Protection Profile For Basic
Robustness Environments, Version 1.0, April 2006