
Security Target, Version 3.9
Nortel VPN Router v7.05 and Client Workstation v7.11
Table of Contents
REVISION HISTORY................................................................................................................................................2
TABLE OF CONTENTS............................................................................................................................................3
TABLE OF FIGURES ................................................................................................................................................4
TABLE OF TABLES ..................................................................................................................................................4
1SECURITY TARGET INTRODUCTION........................................................................................................5
1.1 PURPOSE.........................................................................................................................................................5
1.2 SECURITY TARGET,TOE AND CC IDENTIFICATION AND CONFORMANCE ......................................................5
1.3 CONVENTIONS,ACRONYMS,AND TERMINOLOGY ..........................................................................................6
1.3.1 Conventions ...........................................................................................................................................6
1.3.2 Terminology...........................................................................................................................................6
2TOE DESCRIPTION..........................................................................................................................................8
2.1 PRODUCT TYPE...............................................................................................................................................8
2.2 PRODUCT DESCRIPTION..................................................................................................................................8
2.3 TOE BOUNDARIES AND SCOPE.....................................................................................................................10
2.3.1 Physical Boundary...............................................................................................................................10
2.3.2 Logical Boundary ................................................................................................................................11
2.3.3 Excluded TOE Functionality................................................................................................................15
3TOE SECURITY ENVIRONMENT ...............................................................................................................16
3.1 ASSUMPTIONS ..............................................................................................................................................16
3.2 THREATS TO SECURITY.................................................................................................................................16
3.2.1 Threats Addressed by the TOE ............................................................................................................17
3.2.2 Threats Addressed by the TOE Environment.......................................................................................17
4SECURITY OBJECTIVES ..............................................................................................................................18
4.1 SECURITY OBJECTIVES FOR THE TOE...........................................................................................................18
4.2 SECURITY OBJECTIVES FOR THE ENVIRONMENT...........................................................................................19
4.2.1 IT Security Objectives..........................................................................................................................19
4.2.2 Non-IT Security Objectives..................................................................................................................19
5IT SECURITY REQUIREMENTS..................................................................................................................20
5.1 TOE SECURITY FUNCTIONAL REQUIREMENTS .............................................................................................20
5.1.1 Class FAU: Security Audit...................................................................................................................22
5.1.2 Class FCS: Cryptographic Support.....................................................................................................24
5.1.3 Class FDP: User Data Protection.......................................................................................................27
5.1.4 Class FIA: Identification and Authentication ......................................................................................31
5.1.5 Class FMT: Security Management ......................................................................................................33
5.1.6 Class FPT: Protection of the TSF........................................................................................................37
5.1.7 Class FTP: Trusted Path/Channels .....................................................................................................38
5.2 SECURITY FUNCTIONAL REQUIREMENTS ON THE IT ENVIRONMENT ............................................................39
5.3 ASSURANCE REQUIREMENTS........................................................................................................................41
6TOE SUMMARY SPECIFICATION..............................................................................................................42
6.1 TOE SECURITY FUNCTIONS..........................................................................................................................42
6.1.1 Security Audit.......................................................................................................................................43
6.1.2 Cryptographic Support ........................................................................................................................45
6.1.3 User Data Protection...........................................................................................................................46
6.1.4 Identification and Authentication ........................................................................................................47
6.1.5 Security Management ..........................................................................................................................47
6.1.6 Protection of the TOE Security Functions...........................................................................................48
6.1.7 Trusted Path/Channels ........................................................................................................................49
6.2 TOE SECURITY ASSURANCE MEASURES......................................................................................................49