EasyManua.ls Logo

Cisco Catalyst 4503-E - Page 3

Cisco Catalyst 4503-E
88 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Cisco Cat4K NDPP ST 11 March 2014
EDCS-1228241
3
3.5 Threats ................................................................................................................ 34
3.6 Organizational Security Policies ........................................................................ 35
3.6.1 OSPs enforced by TOE ............................................................................... 35
4 Security Objectives ............................................................................................................... 36
4.1 Security Objectives for the TOE ........................................................................ 36
4.2 Security Objectives for the Environment ........................................................... 37
5 Security Requirements .......................................................................................................... 37
5.1 Conventions ........................................................................................................ 38
5.2 TOE Security Functional Requirements ............................................................ 38
5.2.1 Security audit (FAU)................................................................................... 40
5.2.2 Cryptographic Support (FCS) ..................................................................... 43
5.2.3 User data protection (FDP) ......................................................................... 47
5.2.4 Identification and authentication (FIA) ...................................................... 47
5.2.5 Security management (FMT) ...................................................................... 48
5.2.6 Protection of the TSF (FPT) ....................................................................... 49
5.2.7 FRU Resource Utilization ........................................................................ 50
5.2.8 TOE Access (FTA) ..................................................................................... 51
5.2.9 Trusted Path/Channel (FTP) ....................................................................... 51
5.3 Extended Components Definition ...................................................................... 52
5.4 TOE SFR Dependencies Rationale .................................................................... 54
5.5 Security Assurance Requirements ...................................................................... 56
5.5.1 SAR Requirements...................................................................................... 56
5.5.2 Security Assurance Requirements Rationale .............................................. 57
5.6 Assurance Measures ........................................................................................... 57
6 TOE Summary Specification ................................................................................................ 59
6.1 TOE Security Functional Requirement Measures .............................................. 59
6.2 TOE Bypass and interference/logical tampering Protection Measures .............. 79
7 Rationale ............................................................................................................................... 81
7.1 Rationale for TOE Security Objectives .............................................................. 81
7.2 Rationale for the Security Objectives for the Environment ............................... 83
7.3 Rationale for TOE Security Functional Requirements ...................................... 84
Annex A: References ..................................................................................................................... 88

Table of Contents

Related product manuals