Installation guide

Brocade FastIron SX, ICX, and FCX Series Switch/Router 08.0.01 Security Target Version 1.1, May 13, 2014
Page 3 of 48
1. Security Target Introduction
This section identifies the Security Target (ST) and Target of Evaluation (TOE) identification, ST conventions, ST
conformance claims, and the ST organization. The TOE is the Brocade Communications Systems, Inc. Brocade
FastIron SX, ICX, and FCX Series Switch/Router 08.0.01.
The Security Target contains the following additional sections:
Conformance Claims (Section 2)
Security Objectives (Section 3)
Extended Components Definition (Section 4)
Security Requirements (Section 5)
TOE Summary Specification (Section 6)
Conventions
The following conventions have been applied in this document:
Security Functional Requirements Part 2 of the CC defines the approved set of operations that may be
applied to functional requirements: iteration, assignment, selection, and refinement.
o Iteration: allows a component to be used more than once with varying operations. In the ST,
iteration is indicated by a letter placed at the end of the component. For example FDP_ACC.1a
and FDP_ACC.1b indicate that the ST includes two iterations of the FDP_ACC.1 requirement, a
and b.
o Assignment: allows the specification of an identified parameter. Assignments are indicated using
bold and are surrounded by brackets (e.g., [assignment]). Note that an assignment within a
selection would be identified in italics and with embedded bold brackets (e.g., [[selected-
assignment]]).
o Selection: allows the specification of one or more elements from a list. Selections are indicated
using bold italics and are surrounded by brackets (e.g., [selection]).
o Refinement: allows the addition of details. Refinements are indicated using bold, for additions,
and strike-through, for deletions (e.g., “… all objects …” or “… some big things …”).
The NDPP uses an additional convention the ‘case’ – which defines parts of an SFR that apply only when
corresponding selections are made or some other identified conditions exist. Only the applicable cases are
identified in this ST and they are identified using bold text.
Other sections of the ST Other sections of the ST use bolding to highlight text of special interest, such as
captions.
Terminology
User
Any entity (human or otherwise) outside the TOE that interacts with the TOE.
Unauthorized User
An entity that interacts (or attempts to interact) with the TOE Security Function
(TSF) in an unapproved manner.
Authorized Administrator
A role with which a trusted TOE user is associated to administer both the
functionality and security parameters of the TOE and its operational
Environment. Such users are trusted not to compromise the security policy
enforced by the TOE.
TOE User
Any person who interacts with the TOE.