
Cisco Cat4K NDPP ST 11 March 2014
EDCS-1228241
2
Table of Contents
1Security Target Introduction................................................................................................... 6
1.1 Security Target and TOE Identification............................................................... 6
1.2 Acronyms and Abbreviations............................................................................... 6
1.3 TOE Overview ..................................................................................................... 8
1.3.1 TOE Evaluated Configuration ...................................................................... 8
1.3.2 TOE Type...................................................................................................... 9
1.3.3 Required non-TOE Hardware/Software/Firmware....................................... 9
1.4 TOE Description ................................................................................................ 10
1.4.1 TOE Architecture and Security Capabilities............................................... 10
1.5 TOE Environment and Configuration................................................................ 11
1.6 Physical Scope of the TOE................................................................................. 13
1.6.1 USB Console Port....................................................................................... 23
1.6.2 Network Ports ............................................................................................. 23
1.6.3 Serial Port.................................................................................................... 23
1.6.4 Compact Flash Slot..................................................................................... 24
1.6.5 Physical Scope of the TOE......................................................................... 24
1.7 Logical Scope of the TOE.................................................................................. 24
1.7.1 Security Audit............................................................................................. 25
1.7.2 Cryptographic Support................................................................................ 25
1.7.3 User Data Protection................................................................................... 25
1.7.4 Identification and Authentication ............................................................... 26
1.7.5 Security Management ................................................................................. 26
1.7.6 Protection of the TSF.................................................................................. 27
1.7.7 Resource Utilization.................................................................................... 28
1.7.8 TOE Access ................................................................................................ 28
1.7.9 Trusted Path/Channels ................................................................................ 28
1.8 Excluded Functionality ...................................................................................... 28
2Conformance Claims ............................................................................................................ 30
2.1 Common Criteria Conformance Claim .............................................................. 30
2.2 Protection Profile Conformance Claim.............................................................. 30
2.3 Protection Profile Conformance Claim Rationale.............................................. 30
2.3.1 TOE Appropriateness.................................................................................. 30
2.3.2 TOE Security Problem Definition Conformance........................................ 30
2.3.3 Statement of Security Objectives Conformance......................................... 30
2.3.4 Statement of Security Requirements Conformance.................................... 31
3Security Problem Definition................................................................................................. 32
3.1 Introduction........................................................................................................ 32
3.2 External Entities................................................................................................. 32
3.3 Assets ................................................................................................................. 32
3.3.1 Primary Assets ............................................................................................ 32
3.3.2 Secondary Assets ........................................................................................ 33
3.4 Assumptions....................................................................................................... 33