Specifications

Samsung MFP Security Kit Type_B V1.5 Security Target
25
Copyright
2010 Samsung Electronics Co., Ltd., All rights reserved
Network access control (TSF_NAC)
The TOE can control access to the TOE resources through the network
from outside TOE by changing the port number and enabling/disabling
protocol. The administrator only allows access from the port configured by
changing the protocol’s port number in the interface used to configure the
network protocol. The administrator can also control service access from
outside of TOE by enabling/disabling protocol. It can be configured by
only a certificated administrator through authentication.
1.5 Conventions
This section describes the conventions used to denote Common Criteria
(CC) operations on security functional components and to distinguish text
with special meaning. The notation, formatting, and conventions used in
this ST are largely consistent with those used in the CC. Four presentation
choices are discussed here.
Refinement
The refinement operation is used to add detail to a requirement, and
thus further restricts a requirement. Refinement of security
requirements is denoted by bold text.
Selection
The selection operation is used to select one or more options provided
by the CC in stating a requirement. Selections are denoted by
underlined italicized text
.
Assignment
The assignment operation is used to assign a specific value to an
unspecified parameter such as the length of a password. Showing the
value in square brackets [assignment_value(s)] indicates an
assignment.
Iteration
Iterated functional components are given unique identifiers by
appending to the component name, short name, and functional
element name from the CC an iteration number inside parenthesis, i.e.,
FIA_AFL.1(1) and FIA_AFL.1(2).
The following is an additional convention used to denote this Security
Target:
Application note
Application note clarifies the definition of requirement. It also
can be used used for an additional statement that cannot be
covered by the four presentations previously mentioned.
Application notes are denoted by underlined text
.