beautypg.com

Table of figures, Table of tables – Nortel Networks Nortel Network VPN Router and Client Workstation 7.05 User Manual

Page 4

background image

Security Target, Version 3.9

March 18, 2008

Nortel VPN Router v7.05 and Client Workstation v7.11

Page 4 of 67

© 2008 Nortel Networks

7

PROTECTION PROFILE CLAIMS ............................................................................................................... 51

7.1

P

ROTECTION

P

ROFILE

R

EFERENCE

............................................................................................................... 51

8

RATIONALE ..................................................................................................................................................... 52

8.1

S

ECURITY

O

BJECTIVES

R

ATIONALE

.............................................................................................................. 52

8.2

S

ECURITY

F

UNCTIONAL

R

EQUIREMENTS

R

ATIONALE

.................................................................................. 55

8.3

S

ECURITY

A

SSURANCE

R

EQUIREMENTS

R

ATIONALE

.................................................................................... 60

8.4

R

ATIONALE FOR

S

TRENGTH OF

F

UNCTION

................................................................................................... 60

8.5

D

EPENDENCY

R

ATIONALE

............................................................................................................................ 60

8.6

TOE

S

UMMARY

S

PECIFICATION

R

ATIONALE

................................................................................................ 62

8.6.1

TOE Summary Specification Rationale for the Security Functional Requirements ............................. 62

8.6.2

TOE Summary Specification Rationale for the Security Assurance Requirements .............................. 63

8.7

S

TRENGTH OF

F

UNCTION

.............................................................................................................................. 65

9

ACRONYMS ...................................................................................................................................................... 66

Table of Figures

F

IGURE

1

VPN

C

LIENT

D

EPLOYMENT

C

ONFIGURATION OF THE

TOE.......................................................................... 8

F

IGURE

2

B

RANCH

O

FFICE

D

EPLOYMENT

C

ONFIGURATION OF THE

TOE .................................................................... 9

F

IGURE

3

-

P

HYSICAL

TOE

B

OUNDARY

........................................................................................................................ 10

F

IGURE

4

-

P

HYSICAL

TOE

B

OUNDARY IN

B

RANCH

O

FFICE

T

UNNEL

M

ODE

................................................................ 10

F

IGURE

5

-

TOE

L

OGICAL

B

OUNDARY

......................................................................................................................... 12

F

IGURE

6

-

TOE

L

OGICAL

B

OUNDARY IN

B

RANCH

O

FFICE

T

UNNEL

M

ODE

................................................................. 12

Table of Tables

T

ABLE

1

-

ST,

TOE,

AND

CC

I

DENTIFICATION AND

C

ONFORMANCE

.............................................................................. 5

T

ABLE

2

-

T

ERMINOLOGY

............................................................................................................................................... 6

T

ABLE

3

-

TOE

S

ECURITY

F

UNCTIONAL

R

EQUIREMENTS

............................................................................................. 20

T

ABLE

4

-

A

UDITABLE

E

VENTS

.................................................................................................................................... 22

T

ABLE

5

-

IT

E

NVIRONMENT

S

ECURITY

F

UNCTIONAL

R

EQUIREMENTS

........................................................................ 39

T

ABLE

6

-

A

SSURANCE

C

OMPONENTS

.......................................................................................................................... 41

T

ABLE

7

-

M

APPING OF

TOE

S

ECURITY

F

UNCTIONS TO

S

ECURITY

F

UNCTIONAL

R

EQUIREMENTS

............................... 42

T

ABLE

8

-

FIPS-V

ALIDATED

C

RYPTOGRAPHIC

A

LGORITHMS

...................................................................................... 45

T

ABLE

9

-

A

SSURANCE

M

EASURES

M

APPING TO

TOE

S

ECURITY

A

SSURANCE

R

EQUIREMENTS

(SAR

S

) ...................... 49

T

ABLE

10

-

R

ELATIONSHIP OF

S

ECURITY

T

HREATS TO

O

BJECTIVES

............................................................................. 52

T

ABLE

11

-

R

ELATIONSHIP OF

S

ECURITY

R

EQUIREMENTS TO

O

BJECTIVES

................................................................... 56

T

ABLE

12

-

F

UNCTIONAL

R

EQUIREMENTS

D

EPENDENCIES

........................................................................................... 60

T

ABLE

13

-

M

APPING OF

S

ECURITY

F

UNCTIONAL

R

EQUIREMENTS TO

TOE

S

ECURITY

F

UNCTIONS

............................. 62

T

ABLE

14

-

A

CRONYMS

................................................................................................................................................ 66

This manual is related to the following products: