Brocade Communications Systems FCX Series User Manual Page 41

  • Download
  • Add to my manuals
  • Print
  • Page
    / 53
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 40
Version 1.1, 05/19/2014
GSS CCT Evaluation Technical Report Page 41 of 53
© 2014 Gossamer Security Solutions, Inc.
Document: AAR-BrocadeFastIron8010
All rights reserved.
2.6.5.3 FPT_TUD_EXT.1.3
TSS Assurance Activities: None Defined
Guidance Assurance Activities: None Defined
Testing Assurance Activities: None Defined
Component Assurance Activities: Updates to the TOE either have a hash associated with them, or are signed by an
authorized source. If digital signatures are used, the definition of an authorized source is contained in the TSS,
along with a description of how the certificates used by the update verification mechanism are contained on the
device. The evaluator ensures this information is contained in the TSS. The evaluator also ensures that the TSS (or
the operational guidance) describes how the candidate updates are obtained; the processing associated with
verifying the digital signature or calculating the hash of the updates; and the actions that take place for successful
(hash or signature was verified) and unsuccessful (hash or signature could not be verified) cases.
Section 6.6 of the ST discusses TOE software updates. Updates can either be obtained automatically (when so
configured) or manually by the administrator using CLI commands. If automatic, the TOE checks for updates when
it boots. If manual, the administrator can check for updates using SCP or TFTP. In either case, prior to actually
installing and using the new software image, its digital certificate is verified by the TOE using the public key in the
certificate configured in the TOE. An unverified image cannot be installed. Note that the TOE comes preinstalled
with an applicable Brocade public certificate.
The FIPS Configuration Guide states in Table 2 that TFTP is disabled in FIPS mode. It provides commands for using
SCP in Table 3.
The evaluator shall perform the following tests:
Test 1: The evaluator performs the version verification activity to determine the current version of the product.
The evaluator obtains a legitimate update using procedures described in the operational guidance and verifies that
it is successfully installed on the TOE. Then, the evaluator performs a subset of other assurance activity tests to
demonstrate that the update functions as expected. After the update, the evaluator performs the version
verification activity again to verify the version correctly corresponds to that of the update.
Test 2: The evaluator performs the version verification activity to determine the current version of the product.
The evaluator obtains or produces an illegitimate update, and attempts to install it on the TOE. The evaluator
verifies that the TOE rejects the update.
Page view 40
1 2 ... 36 37 38 39 40 41 42 43 44 45 46 ... 52 53

Comments to this Manuals

No comments