
Cisco ISR-800 Security Target
Table of Contents
1 SECURITY TARGET INTRODUCTION ............................................................................. 7
1.1 ST and TOE Reference .................................................................................................... 7
1.2 TOE Overview ................................................................................................................. 8
1.2.1 TOE Product Type .................................................................................................... 8
1.2.2 Supported non-TOE Hardware/ Software/ Firmware ............................................... 8
1.3 TOE DESCRIPTION ....................................................................................................... 9
1.4 TOE Evaluated Configuration ........................................................................................ 11
1.5 Physical Scope of the TOE............................................................................................. 11
1.6 Logical Scope of the TOE .............................................................................................. 18
1.6.1 Security Audit ......................................................................................................... 18
1.6.2 Cryptographic Support ............................................................................................ 19
1.6.3 Full Residual Information Protection...................................................................... 20
1.6.4 Identification and authentication............................................................................. 20
1.6.5 Security Management ............................................................................................. 20
1.6.6 Packet Filtering ....................................................................................................... 21
1.6.7 Protection of the TSF .............................................................................................. 21
1.6.8 TOE Access ............................................................................................................ 22
1.6.9 Trusted path/Channels ............................................................................................ 22
1.7 Excluded Functionality .................................................................................................. 22
2 Conformance Claims ............................................................................................................. 23
2.1 Common Criteria Conformance Claim .......................................................................... 23
2.2 Protection Profile Conformance ..................................................................................... 23
2.3 Protection Profile Conformance Claim Rationale .......................................................... 23
2.3.1 TOE Appropriateness.............................................................................................. 23
2.3.2 TOE Security Problem Definition Consistency ...................................................... 23
2.3.3 Statement of Security Requirements Consistency .................................................. 24
3 SECURITY PROBLEM DEFINITION ................................................................................ 25
3.1 Assumptions ................................................................................................................... 25
3.2 Threats ............................................................................................................................ 25
3.3 Organizational Security Policies .................................................................................... 26
4 SECURITY OBJECTIVES ................................................................................................... 28
4.1 Security Objectives for the TOE .................................................................................... 28
4.2 Security Objectives for the Environment ....................................................................... 29
5 SECURITY REQUIREMENTS ........................................................................................... 30
5.1 Conventions .................................................................................................................... 30
5.2 TOE Security Functional Requirements ........................................................................ 30
5.3 SFRs from NDPP and VPN Gateway EP ...................................................................... 32
5.3.1 Security audit (FAU)............................................................................................... 32
5.3.2 Cryptographic Support (FCS) ................................................................................. 35
5.3.3 User data protection (FDP) ..................................................................................... 39
5.3.4 Identification and authentication (FIA) .................................................................. 39
5.3.5 Security management (FMT) .................................................................................. 41
5.3.6 Packet Filtering (FPF) ............................................................................................. 42
Comentarios a estos manuales