Xerox  Multi-Function Device Security Target 
 
48 
Copyright
 2013 Xerox Corporation. All rights reserved. 
-  Information: IP Packet 
o  Source  IP  address,  protocol  used  (TCP  or 
UDP), destination TCP or UDP port]. 
FDP_IFF.1.2 (FILTER)  The TSF shall permit an information flow between 
a  controlled  subject  and  controlled  information  via  a 
controlled operation if the following rules hold: [ 
-  The  source  IP  address  matches  a  rule  in  the  TOE’s 
rule base 
-  If  configured,  the  destination  transport  layer  port 
matches a rule in the TOE’s rule base.] 
FDP_IFF.1.3 (FILTER)  The TSF shall enforce the [implicit allow if no rules 
have been defined]. 
FDP_IFF.1.4 (FILTER)  The  TSF  shall  explicitly  authorize  an  information 
flow based on the following rules: [if the rule is the default 
all]. 
FDP_IFF.1.5 (FILTER)  The TSF shall explicitly deny an information flow 
based  on the following rules:  [if  there are  no  rules with 
matching security attributes or if a rule explicitly denies an 
information flow]. 
Application Note:  When custom rules have not been defined by the system 
administrator,  the  default  rule  (allow  all  traffic)  will  apply.    Because  it  is  a 
wildcard rule, all IP addresses, ports and protocols (either TCP or UDP) will 
be a match for allowed traffic. 
6.3.4.7.  FDP_RIP.1 Subset residual information protection  
Hierarchical to:  No other components. 
Dependencies:  No dependencies 
FDP_RIP.1.1  The  TSF  shall  ensure  that  any  previous  information 
content  of  a  resource  is  made  unavailable  upon  the 
deallocation  of  the  resource  from  the  following  objects: 
[D.DOC].  
6.3.5.  Class FIA: Identification and authentication 
6.3.5.1.  FIA_ATD.1  User attribute definition  
Hierarchical to:  No other components 
Dependencies:  No dependencies 
FIA_ATD.1.1  The  TSF  shall  maintain  the  following  list  of  security 
attributes  belonging  to  individual  users:  [username, 
password, role].