Cisco Cat4K NDPP ST
11 March 2014
EDCS-1228241
61
TOE SFRs
How the SFR is Met
in the log record.
Any use of the
authentication
mechanism.
Events will be generated for
attempted identification/
authentication, and the
username attempting to
authenticate will be included
in the log record, along with
the origin or source of the
attempt.
Management functions
The use of the security
management functions is
logged; modifications of the
behavior of the functions in
the TSF and modifications of
default settings.
Detection of replay
attacks
Attempts of replaying data
previously transmitted and
terminated at the TOE are
logged, along with the origin
or source of the attempt.
Changes to the time.
Changes to the time are
logged.
Updates (software)
An audit record will be
generated on the initiation of
updates (software/firmware)
Failure to establish
and/or
establishment/failure
of an SSH and IPsec
session
Attempts to establish an
SSH and IPsec session or
the failure of an established
SSH and/or IPsec is logged.
Resources quotas are
exceeded
If the threshold for the
number of concurrent
administrative sessions is
exceeded, and audit record
is generated
Locking and
unlocking interactive
sessions
Any attempt to unlock an
inactive sessions is logged,
as is an inactive session
when it exceeds the time
limit of inactivity
Indication that TSF
self-test was
completed.
During bootup, if the self-
test fails, the failure is
logged.
Trusted channels
The initiation, termination,