Version | Date | Comment |
---|---|---|
1.3 | 2023-08-16 | Incorporation of NIAP Technical Decisions, TC feedback |
1.2 | 2022-03-31 | Format conversion, incorporation of NIAP Technical Decisions, TC feedback |
1.1 | 2020-06-18 | Compatibility with CPP_ND_V2.2E, incorporation of NIAP Technical Decisions |
1.0 | 2019-09-17 | Initial publication |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Extended Package (EP) | A deprecated document form for collecting SFRs that implement a particular protocol, technology, or functionality. See Functional Packages. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Headend | A VPN use case where the VPN gateway is establishing VPN connectivity with endpoint VPN clients as opposed to other infrastructure devices (e.g., site-to-site). |
Packet Filtering | The process by which an edge network device determines if traffic bound to or from its external network is passed to its destination or dropped. |
VPN Gateway | A type of network device that resides at the edge of a private network and permits the establishment of VPN connectivity from computers residing in an external network. |
Virtual Private Network (VPN) | A mechanism for overlaying a cryptographically secured network over distributed wide-area networks. |
An organization deploying the TOE is expected to satisfy the organizational security policy listed below in addition to all organizational security policies defined by the claimed Base-PP.
This document does not define any additional OSPs.Threat, Assumption, or OSP | Security Objectives | Rationale |
T.DATA_INTEGRITY | O.ADDRESS_FILTERING | The TOE’s ability to provide address filtering helps mitigate the threat of data integrity violations by reducing the amount of potentially malicious network traffic that could potentially exploit the threat. |
O.AUTHENTICATION | The TOE’s ability to authenticate entities requesting network access helps mitigate the threat of integrity violations by establishing or exchanging keys that are used to maintain data integrity. | |
O.CRYPTOGRAPHIC_FUNCTIONS | The modification of data without authorization can be prevented by cryptography that ensures the confidentiality and integrity of the data. | |
O.FAIL_SECURE | The TOE's ability to protect against unauthorized modifications to itself helps ensure that its functionality cannot be altered in such a way that it fails to maintain integrity of its communications. | |
O.PORT_FILTERING | The TOE’s ability to provide port filtering helps mitigate the threat of data integrity violations by reducing the amount of potentially malicious network traffic that could potentially exploit the threat. | |
T.NETWORK_ACCESS | O.ADDRESS_FILTERING | The TOE’s address filtering capability helps mitigate the threat of network access by limiting unauthorized reconnaissance activities that can be performed outside the protected network. |
O.AUTHENTICATION | The TOE’s ability to authenticate entities requesting network access mitigates unauthorized network access by ensuring that unauthenticated connections cannot access the protected network. | |
O.CRYPTOGRAPHIC_FUNCTIONS | The TOE’s use of cryptography prevents unauthorized network access by encrypting data transmitted to and from an entity on an untrusted network that is accessing a protected resource. | |
O.FAIL_SECURE | The TOE's ability to protect against unauthorized modifications to itself helps ensure that its functionality cannot be altered in such a way that it permits network access that it would ordinarily disallow. | |
O.PORT_FILTERING | The TOE’s port filtering capability helps mitigate the threat of network access by limiting unauthorized reconnaissance activities that can be performed outside the protected network. | |
T.NETWORK_DISCLOSURE | O.ADDRESS_FILTERING | The TOE’s address filtering capability helps mitigate the threat of network disclosure by limiting unauthorized reconnaissance activities that can be performed outside the protected network. |
O.FAIL_SECURE | The TOE's ability to protect against unauthorized modifications to itself helps ensure that its functionality cannot be altered to allow unauthorized disclosure of protected network traffic. | |
O.PORT_FILTERING | The TOE’s port filtering capability helps mitigate the threat of network access by limiting unauthorized reconnaissance activities that can be performed outside the protected network. | |
T.NETWORK_MISUSE | O.ADDRESS_FILTERING | The TOE’s ability to provide address filtering helps mitigate the threat of network misuse by reducing the amount of potentially malicious network traffic that could potentially exploit the threat. |
O.CRYPTOGRAPHIC_FUNCTIONS | The TOE’s use of cryptography prevents network misuse by ensuring that an unauthorized attacker cannot inject their own actions into the protected network. | |
O.FAIL_SECURE | The TOE's ability to protect against unauthorized modifications to itself helps ensure that its functionality to detect potential misuse of network resources is not compromised. | |
O.PORT_FILTERING | The TOE’s ability to provide port filtering helps mitigate the threat of network misuse by reducing the amount of potentially malicious network traffic that could potentially exploit the threat. | |
O.SYSTEM_MONITORING | The TOE’s system monitoring function helps mitigate the threat of network misuse by providing a method to detect when potential misuse is occurring. | |
O.TOE_ADMINISTRATION | The TOE implements a management interface that allows for authorized usage of the TOE so that unprivileged users do not have the ability to misuse its functions. | |
T.REPLAY_ATTACK | O.AUTHENTICATION | The TOE’s ability to enforce authentication helps mitigate replay attacks by making it more difficult for an attacker to impersonate a valid entity. |
O.CRYPTOGRAPHIC_FUNCTIONS | The TOE’s use of cryptography prevents replay attacks by ensuring that network data that is modified and retransmitted will not be parsed as valid traffic. | |
O.FAIL_SECURE | The TOE's ability to protect against unauthorized modifications to itself helps ensure that it always enforces requirements for confidentiality and integrity of network traffic in the intended manner. | |
A.CONNECTIONS | OE.CONNECTIONS | The OE objective OE.CONNECTIONS is realized through A.CONNECTIONS. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_GEN.1/VPN | ||
No events specified | N/A | |
FCS_CKM.1/IKE | ||
No events specified | N/A | |
FMT_SMF.1/VPN | ||
All administrative actions | No additional information. | |
FPF_RUL_EXT.1 | ||
Application of rules configured with the 'log' operation |
| |
FPT_FLS.1/SelfTest | ||
No events specified | N/A | |
FPT_TST_EXT.3 | ||
No events specified | N/A | |
FTP_ITC.1/VPN | ||
Initiation of the trusted channel | No additional information. | |
Termination of the trusted channel | No additional information. | |
Failure of the trusted channel functions | Identification of the initiator and target of failed trusted channel establishment attempt |
The following rationale provides justification for each security objective for the TOE,
showing that the SFRs are suitable to meet and achieve the security objectives:
Objective | Addressed by | Rationale |
---|---|---|
O.ADDRESS_FILTERING | FPF_RUL_EXT.1 | This SFR supports the objective by requiring the TSF to filter network traffic based on network address information. |
FTA_VCM_EXT.1 (optional) | This SFR supports the objective by optionally allowing the TOE to assign a private IP address to a VPN client so that traffic bound for an alternative address can be flagged as invalid. | |
O.AUTHENTICATION | FCS_IPSEC_EXT.1 (refined from Base-PP) | This SFR supports the objective by requiring the TOE's implementation of IPsec to include requirements for how the VPN client is authenticated. |
FIA_X509_EXT.1/Rev (from Base-PP) | This SFR supports the objective by requiring the TOE to implement X.509 validation functions so that it can authenticate remote entities that assert their identity using X.509 certificates. | |
FIA_X509_EXT.2 (refined from Base-PP) | This SFR supports the objective by requiring the TOE to implement X.509 authentication functions so that it can authenticate remote entities that assert their identity using X.509 certificates. | |
FIA_X509_EXT.3 (from Base-PP) | This SFR supports the objective by requiring the TOE to have the ability to generate a certificate request so that it can be issued an X.509 certificate that allows the TSF to offer proof of its own authenticity to external entities. | |
FTP_ITC.1/VPN | This SFR supports the objective by requiring the TOE to use an IPsec trusted channel to communicate with external entities so that these entities may be authenticated. | |
FTA_SSL.3/VPN (optional) | This SFR supports the objective by optionally allowing the TSF to terminate inactive VPN sessions so that an unattended session cannot be used to bypass authentication mechanisms. | |
FTA_TSE.1 (optional) | This SFR supports the objective by optionally defining alternative mechanisms to determine the validity of a subject to reject unauthorized or impersonated authentication attempts | |
FPF_MFA_EXT.1 (optional) | This SFR supports the objective by optionally enforcing a multifactor authentication requirement on an IPsec connection. | |
FCS_EAP_EXT.1 (selection-based) | This SFR supports the objective by optionally using an external authentication server to facilitate EAP-TLS or EAP-TTLS. | |
FIA_HOTP_EXT.1 (selection-based) | This SFR supports the objective by optionally defining the implementation of HOTP as an authentication mechanism. | |
FIA_PSK_EXT.1 (selection-based) | This SFR supports the objective by optionally supporting the use of pre-shared keys. | |
FIA_PSK_EXT.2 (selection-based) | This SFR supports the objective by optionally specifying whether the TOE generates its own pre-shared keys or accepts them from an external source. | |
FIA_PSK_EXT.3 (selection-based) | This SFR supports the objective by optionally defining the composition and use of password-based pre-shared keys used for authentication. | |
FIA_TOTP_EXT.1 (selection-based) | This SFR supports the objective by optionally defining the implementation of TOTP as an authentication mechanism. | |
O.CRYPTOGRAPHIC_FUNCTIONS | FCS_COP.1/DataEncryption (refined from Base-PP) | This SFR supports the objective by requiring the TOE to implement AES in a specified manner. |
FCS_IPSEC_EXT.1 (refined from Base-PP) | This SFR supports the objective by requiring the TOE to implement the IPsec protocol in a specified manner | |
FCS_CKM.1/IKE | This SFR supports the objective by requiring the TOE to generate cryptographic keys used for Internet Key Exchange (IKE) in a specified manner. | |
FCS_EAP_EXT.1 (selection-based) | This SFR supports the objective by optionally using an MSK computed by an external authentication server via the EAP-TLS or EAP-TTLS method. | |
FIA_PSK_EXT.1 (selection-based) | This SFR supports the objective by supporting a mechanism by which PSKs can be used to fortify encryption. | |
FIA_PSK_EXT.2 (selection-based) | This SFR supports the objective by optionally specifying whether the TOE generates its own pre-shared keys or accepts them from an external source.. | |
O.FAIL_SECURE | FPT_TST_EXT.1 (refined from Base-PP) | This SFR supports the objective by requiring the TOE to execute self-tests that allow the TSF to determine if it is in a failed state. |
FPT_TUD_EXT.1 (refined from Base-PP) | This SFR supports the objective by requiring the TOE to validate software updates before applying them to reduce the risk of the TOE entering a failed state. | |
FPT_FLS.1/SelfTest | This SFR supports the objective by requiring the TOE to preserve a secure state if a self-test failure is detected. | |
FPT_TST_EXT.3 | This SFR supports the objective by requiring the TOE to verify the integrity of its executable code to ensure that it will operate in a known state. | |
O.PORT_FILTERING | FPF_RUL_EXT.1 | This SFR supports the objective by requiring the TSF to filter network traffic based on port information. |
O.SYSTEM_MONITORING | FAU_GEN.1/VPN | This SFR supports the objective by requiring the TOE to generate security-relevant audit events related to VPN gateway functionality. |
FPF_RUL_EXT.1 | This SFR supports the objective by requiring the TOE to have the ability to log network traffic that matches certain characteristics. | |
O.TOE_ADMINISTRATION | FMT_MTD.1/CryptoKeys (refined from Base-PP) | This SFR supports the objective by requiring the TOE to implement a key management function and ensure that only authorized users can use it. |
FMT_SMF.1/VPN | This SFR supports the objective by specifying the management functions required specifically for VPN gateway functionality. |
PP-Module Threat, Assumption, OSP | Consistency Rationale |
---|---|
T.DATA_INTEGRITY | The threat of data integrity compromise is a specific example of the T.WEAK_CRYPTOGRAPHY threat defined in the Base-PP. |
T.NETWORK_ACCESS | The threat of a malicious entity accessing protected network resources without authorization is a specific example of the T.UNTRUSTED_COMMUNICATION_CHANNELS threat defined in the Base-PP. |
T.NETWORK_DISCLOSURE | Exposure of network devices due to insufficient protection is a specific example of the T.UNTRUSTED_COMMUNICATION_CHANNELS threat defined in the Base-PP. |
T.NETWORK_MISUSE | Depending on the specific nature of the misuse of network resources, this threat is a specific manifestation of either the T.UNTRUSTED_COMMUNICATION_CHANNELS or T.WEAK_AUTHENTICATION_ENDPOINTS threat defined in the Base-PP. |
T.REPLAY_ATTACK | A replay attack is mentioned in the Base-PP as a specific type of attack based on the T.UNTRUSTED_COMMUNICATION_CHANNELS threat. |
A.CONNECTIONS | This assumption defines the TOE’s placement in a network such that it is able to perform its required security functionality. The Base-PP does not define any assumptions about the TOE’s architectural deployment so there is no conflict here. |
The objectives for the TOEs are consistent with the NDcPP based on the following rationale:
PP-Module TOE Objective | Consistency Rationale |
---|---|
O.ADDRESS_FILTERING | The Base-PP does not define any TOE objectives so PP-Module objectives do not conflict with it. |
O.AUTHENTICATION | The Base-PP does not define any TOE objectives so PP-Module objectives do not conflict with it. |
O.CRYPTOGRAPHIC_FUNCTIONS | The Base-PP does not define any TOE objectives so PP-Module objectives do not conflict with it. |
O.FAIL_SECURE | The Base-PP does not define any TOE objectives so PP-Module objectives do not conflict with it. |
O.PORT_FILTERING | The Base-PP does not define any TOE objectives so PP-Module objectives do not conflict with it. |
O.SYSTEM_MONITORING | The Base-PP does not define any TOE objectives so PP-Module objectives do not conflict with it. |
O.TOE_ADMINISTRATION | The Base-PP does not define any TOE objectives so PP-Module objectives do not conflict with it. |
The objectives for the TOE's OE are consistent with the NDcPP based on the following rationale:
PP-Module OE Objective | Consistency Rationale |
---|---|
OE.CONNECTIONS | This objective intends for the TOE to be connected to environmental networks in such a way that its primary functionality can be appropriately enforced. There is no inconsistency here with respect to the Base-PP because the Base-PP does not define any restrictions on how a network device is connected to its environment. |
PP-Module Requirement | Consistency Rationale |
---|---|
Modified SFRs | |
FCS_COP.1/DataEncryption | This PP-Module restricts the Base-PP SFR to a subset of existing permissible functionality and does not introduce any new behavior. |
FCS_IPSEC_EXT.1 | This PP-Module restricts the Base-PP SFR to a subset of existing permissible functionality and does not introduce any new behavior. |
FIA_X509_EXT.1/Rev | This PP-Module does not modify the Base-PP SFR; it only mandates the inclusion of the SFR because a conformant TOE will always require this functionality that is only conditional in the Base-PP. |
FIA_X509_EXT.2 | This PP-Module restricts the Base-PP SFR to a subset of existing permissible functionality and does not introduce any new behavior. |
FIA_X509_EXT.3 | This PP-Module does not modify the Base-PP SFR; it only mandates the inclusion of the SFR because a conformant TOE will always require this functionality that is only conditional in the Base-PP. |
FMT_MTD.1/CryptoKeys | This PP-Module applies the key management functionality already defined in the Base-PP specifically to functionality related to VPN gateways. |
FPT_TST_EXT.1 | This PP-Module refines the Base-PP SFR to mandate a specific type of self-test. This is consistent with the Base-PP because the execution of this self-test is already implied by the Base-PP through its entropy requirements. |
FPT_TUD_EXT.1 | This PP-Module restricts the Base-PP SFR to a subset of existing permissible functionality and does not introduce any new behavior. |
Additional SFRs | |
This PP-Module does not add any requirements when the NDcPP is the base. | |
Mandatory SFRs | |
FAU_GEN.1/VPN | This SFR adds new auditable events for the TOE that relate to the functionality that is introduced by the PP-Module. |
FCS_CKM.1/IKE | This PP-Module specifies a method of key generation that is not defined in the Base-PP. This is used for functionality defined in the Base-PP (IKE) that this PP-Module chooses to represent in greater detail. |
FMT_SMF.1/VPN | This SFR defines management functions that are specific to the functionality required by this PP-Module and were therefore not already defined in the Base-PP iteration of it. |
FPF_RUL_EXT.1 | This SFR defines specific behavior for the processing of network traffic, specifically which communications channel is used based on certain attributes of the traffic. The Base-PP does not apply any constraints on how usage of a trusted channel is controlled so this does not contradict anything presented in the Base-PP. |
FPT_FLS.1/SelfTest | The Base-PP already requires the TOE to specify the self-tests that are performed. This PP-Module simply goes one step further and requires the TSF to behave in a certain way upon failure of those self-tests. |
FPT_TST_EXT.3 | This PP-Module adds to the self-testing requirements from the Base-PP by mandating that a specific self-test be performed and that it be performed in a certain manner. This does not conflict with the Base-PP because the method used to perform the self-test is a cryptographic function already mandated by the Base-PP. |
FTP_ITC.1/VPN | This PP-Module iterates a Base-PP SFR to refer to an interface that is unique to the PP-Module. This does not affect the ability of the Base-PP iteration of the SFR to be satisfied. |
Optional SFRs | |
FPF_MFA_EXT.1 | This SFR relates specifically to the handling of traffic that is used for the establishment of IPsec connections. |
Objective SFRs | |
This PP-Module does not define any Objective requirements. | |
Implementation-based SFRs | |
FTA_SSL.3/VPN | This SFR refers to a specific condition under which a trusted channel is terminated by the TSF. The Base-PP supports termination of trusted channels and does not mandate this be done in any particular method. |
FTA_TSE.1 | This SFR refers to a specific condition under which a trusted channel is terminated by the TSF. The Base-PP supports termination of trusted channels and does not mandate this be done in any particular method. |
FTA_VCM_EXT.1 | This SFR refers to network addressing, which is outside the scope of the Base-PP and therefore not prohibited by it. |
Selection-based SFRs | |
FCS_EAP_EXT.1 | This SFR defines the use of EAP-TLS/TTLS; the Base-PP already defines requirements for TLS so potential support for EAP-TLS is consistent with functionality that the Base-PP already expects the TOE may have. |
FIA_HOTP_EXT.1 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_PSK_EXT.1 | This SFR defines the use of pre-shared keys, which is behavior that only relates to the establishment of IPsec connections. |
FIA_PSK_EXT.2 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_PSK_EXT.3 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_TOTP_EXT.1 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FPF_MFA_EXT.1 | ||
No events specified | N/A |
This PP-Module does not define any Objective SFRs.
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FTA_SSL.3/VPN | ||
No events specified | N/A | |
FTA_TSE.1 | ||
No events specified | N/A | |
FTA_VCM_EXT.1 | ||
No events specified | N/A |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_EAP_EXT.1 | ||
No events specified | N/A | |
FIA_HOTP_EXT.1 | ||
No events specified | N/A | |
FIA_PSK_EXT.1 | ||
No events specified | N/A | |
FIA_PSK_EXT.2 | ||
No events specified | N/A | |
FIA_PSK_EXT.3 | ||
No events specified | N/A | |
FIA_TOTP_EXT.1 | ||
No events specified | N/A |
Functional Class | Functional Components |
---|---|
Cryptographic Support (FCS) | FCS_EAP_EXT EAP-TLS/TTLS |
Identification and Authentication (FIA) | FIA_HOTP_EXT HMAC-Based One-Time Password Pre-Shared Keys FIA_PSK_EXT Pre-Shared Key Composition FIA_TOTP_EXT Time-Based One-Time Password Pre-Shared Keys |
Packet Filtering (FPF) | FPF_MFA_EXT Multifactor Authentication Filtering FPF_RUL_EXT Packet Filtering Rules |
Protection of the TSF (FPT) | FPT_TST_EXT TSF Self-Test |
TOE Access (FTA) | FTA_VCM_EXT VPN Client Management |
FCS_EAP_EXT.1, EAP-TLS/TTLS, defines the use of EAP-TLS/TTLS.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_IPSEC_EXT.1 IPsec Protocol |
FIA_HOTP_EXT.1, HMAC-Based One-Time Password Pre-Shared Keys, defines the implementation of HOTP.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation |
FIA_PSK_EXT.1, Pre-Shared Key Composition, defines the use and composition of pre-shared keys used for IPsec.
FIA_PSK_EXT.2, Generated Pre-Shared Keys, defines the use and composition of generated pre-shared keys used for IPsec.
FIA_PSK_EXT.3, Password-Based Pre-Shared Keys, defines the use and composition of password-based pre-shared keys used for IPsec.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_IPSEC_EXT.1 IPsec Protocol |
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FIA_PSK_EXT.1 Pre-Shared Key Composition |
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FIA_PSK_EXT.1 Pre-Shared Key Composition |
FIA_TOTP_EXT.1, Time-Based One-Time Password Pre-Shared Keys, defines the implementation of TOTP.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FPT_STM.1 Reliable Time Stamps |
FPF_RUL_EXT.1, Packet Filtering Rules, requires the TSF to enforce a given set of packet filtering rules in an administrator-defined order against one or more TOE interfaces.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPF_MFA_EXT.1, Multifactor Authentication Filtering, defines the use and composition of multifactor authentication filtering.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_TST_EXT.3, Self-Test with Defined Methods, requires the TSF to specify the methods by which self-testing is performed in addition to identifying the self-tests that are executed and the circumstances in which this execution occurs.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FTA_VCM_EXT.1, VPN Client Management, requires the TSF to assign private (internal) IP addresses to VPN clients that successfully establish IPsec connections with it.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_IPSEC_EXT.1 IPsec Protocol [FTP_ITC.1 Inter-TSF Trusted Channel, or FTP_TRP.1 Trusted Path] |
This appendix lists requirements that should be considered satisfied by products successfully evaluated against this PP-Module. These requirements are not featured explicitly as SFRs and should not be included in the ST. They are not included as standalone SFRs because it would increase the time, cost, and complexity of evaluation. This approach is permitted by [CC] Part 1, 8.2 Dependencies between components.
This information benefits systems engineering activities which call for inclusion of particular security controls. Evaluation against the PP-Module provides evidence that these controls are present and have been evaluated.
All SFR dependencies in this PP-Module are addressed by appropriate SFRs, either from elsewhere in the PP-Module or inherited from the Base-PP.Acronym | Meaning |
---|---|
Base-PP | Base Protection Profile |
CA | Certificate Authority |
CC | Common Criteria |
CEM | Common Evaluation Methodology |
CN | Common Name |
cPP | Collaborative Protection Profile |
DH | Diffie-Hellman |
DN | Distinguished Name |
EP | Extended Package |
FP | Functional Package |
FQDN | Fully Qualified Domain Name |
ICMP | Internet Control Message Protocol |
IKE | Internet Key Exchange |
OE | Operational Environment |
PBKDF | Password-Based Key Derivation Function |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
SA | Security Association |
SAN | Subject Alternative Name |
SAR | Security Assurance Requirement |
SFP | Small Form-Factor Pluggable |
SFR | Security Functional Requirement |
ST | Security Target |
TOE | Target of Evaluation |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |
VPN | Virtual Private Network |
Identifier | Title |
---|---|
[CC] | Common Criteria for Information Technology Security Evaluation -
|
[ND-SD] | Supporting Document - Mandatory Technical Document - Evaluation Activities for Network Device cPP, Version 2.2, December 2019 |
[NDcPP] | collaborative Protection Profile for Network Devices, Version 2.2E, March 2020 |