
Security Target, Version 3.9
Nortel VPN Router v7.05 and Client Workstation v7.11
6 TOE Summary Specification
This section presents information to detail how the TOE meets the functional and assurance requirements described
in previous sections of this ST.
6.1 TOE Security Functions
Each of the security function descriptions is organized by the security requirements corresponding to the security
function. Hence, each function is described by how it specifically satisfies each of its related requirements. This
serves to both describe the security functions and rationalize that the security functions are suitable to satisfy the
necessary requirements.
Table 7 - Mapping of TOE Security Functions to Security Functional Requirements
Cryptographic Key Generation
Cryptographic Key Generation
Cryptographic Key Destruction
Security Attribute Based Access Control
Complete Information Flow Control
Complete Information Flow Control
Simple Security Attributes
Simple Security Attributes
Basic Data Exchange Confidentiality
Identification and
Authentication
Multiple Authentication Mechanisms
User Identification Before any Action
Management of Security Functions Behavior
Management of Security Functions Behavior
Management of Security Attributes
Management of Security Attributes
Management of Security Attributes
Secure Security Attributes
Static Attribute Initialization
Komentarze do niniejszej Instrukcji