Fortinet Firewall - ST
Fortinet Firewall - ST
Security Target
Evaluation Assurance Level (EAL): EAL4+
Fortinet, Incorporated
899 Kifer Road
Sunnyvale, California, USA
94086
Prepared by:
EWA-Canada, An Intertek Company
1223 Michael Street North, Suite 200
Ottawa, Ontario, Canada
K1J 7T2
CONTENTS
1 SECURITY TARGET INTRODUCTION ............................................. 4
1.1 DOCUMENT ORGANIZATION ............................................................ 4
1.2 SECURITY TARGET REFERENCE ........................................................ 5
1.3 TOE REFERENCE ............................................................................. 5
1.4 TOE OVERVIEW .............................................................................. 5
TOE Features ................................................................................. 6
TOE Environment ........................................................................... 8
1.5 TOE DESCRIPTION ......................................................................... 8
Physical Scope ............................................................................... 8
TOE Interfaces ............................................................................... 9
Single-Unit Configuration ................................................................ 9
High-Availability Configuration ....................................................... 10
TOE Delivery ............................................................................... 11
Logical Scope............................................................................... 12
Functionality Excluded from the Evaluated Configuration ................... 13
4 SECURITY OBJECTIVES.............................................................. 17
4.1 SECURITY OBJECTIVES FOR THE TOE ............................................. 17
4.2 SECURITY OBJECTIVES FOR THE OPERATIONAL ENVIRONMENT ......... 17
4.3 SECURITY OBJECTIVES RATIONALE ................................................ 18
Security Objectives Rationale Related to Threats .............................. 18
Security Objectives Rationale Related to OSPs ................................. 21
Security Objectives Rationale Related to Assumptions ....................... 22
LIST OF TABLES
Table 1 - TOE Features ................................................................................. 8
Table 2 – Non-TOE Hardware and Software ..................................................... 8
Table 3 – Logical Scope of the TOE ............................................................... 13
Table 4 – Threats ....................................................................................... 15
Table 5 – Organizational Security Policies ...................................................... 16
Table 6 – Assumptions ................................................................................ 16
Table 7 – Security Objectives for the TOE...................................................... 17
Table 8 – Security Objectives for the Operational Environment ........................ 18
Table 9 – Mapping Between Objectives, Threats, OSPs, and Assumptions .......... 18
Table 10 – Summary of Security Functional Requirements............................... 28
Table 11 - Auditable Events ......................................................................... 29
Table 12 - Cryptographic Operations............................................................. 32
Table 13 – Security Assurance Requirements ................................................. 40
Table 14 – Mapping of SFRs to Security Objectives ......................................... 41
Table 15 – Functional Requirement Dependencies .......................................... 47
Table 16 – Terminology .............................................................................. 55
Table 17 – Acronyms .................................................................................. 57
Table 18 - Hardware Models, Guides and Entropy Source ................................ 61
Table 19 - Virtual Models, Guides and Entropy Source .................................... 62
LIST OF FIGURES
Figure 1 – Single-Unit Configuration ............................................................. 10
Figure 2 - HA Configuration ......................................................................... 11
Figure 3 – FAV_ACT_EXT: Anti-Virus Actions Component Levelling ................... 24
Figure 4 – FIP_DOS_EXT: Denial of Service Component Levelling ..................... 25
Figure 5 – FIP_SIG_EXT: Signature Protection Component Levelling ................. 26
TOE Features
The function of the FortiGate Series is to isolate two or more networks from each
other and arbitrate the information transfers between these networks. Arbitration
is based on a set of policies (rules) that are established by an authorized
administrator and applied to each data packet that flows through the system. The
TOE arbitrates all data that travels through it from one network to another.
The FortiGate has a FIPS-CC Mode of operation which, when enabled by an
authorized administrator, provides the capability claimed in this ST. FIPS-CC Mode
provides initial default values and enforces the FIPS-CC configuration
requirements.
The following table summarizes the most security-relevant FortiGate features.
Feature Description
Access Control FortiGate Next Generation Firewalls provide a role-based
access control capability to ensure that only authorized
administrators are able to administer the FortiGate unit.
Administration (Local The FortiGate provides management capabilities via the text-
Console CLI) based Local Console Command Line Interface (CLI).
Administration The FortiGate provides a Network Web-based Graphical User
(Network Web-Based Interface (GUI), accessed via HyperText Transfer Protocol
GUI) Secure (HTTPS), for system management and configuration.
Administration (SSH) The FortiGate provides remote administration services over
Secure Shell (SSH) for system management and configuration.
Anti-Virus The FortiGate Series provides anti-virus protection for
HyperText Transfer Protocol (HTTP), File Transfer Protocol
(FTP), Simple Mail Transfer Protocol (SMTP), Post-Office
Protocol Version 3 (POP3), and Internet Message Access
Protocol (IMAP) Web content as it passes through the
FortiGate unit.
Authentication The FortiGate implements a username and password
mechanism for identification and authentication.
1
The term ‘Protection Profile’ is the name given to a set of Fortinet security rules and
should not be confused with Common Criteria PPs.
TOE Environment
The following components are required for operation of the TOE in the evaluated
configuration.
TOE Interfaces
FortiGate units may be securely administered over the external or internal
networks, or locally within the secure area. FortiGate units provide the following
administration options:
• A dedicated RS-232 console port is available on all models, with a DB-9
connector. When connected to a terminal which supports VT100 emulation,
the console port allows access to the FortiGate unit via the Local Console
CLI. This permits an authorized administrator to configure the FortiGate
unit, monitor its operation, and examine the audit logs that are created.
• Remote administration may be performed on all models through any
network port that has been configured by an authorized administrator to
allow HTTPS for the Network Web-Based GUI.
• Remote administration may be performed on all models using Secure Shell
(SSH) on port 22.
• All models are equipped with a Universal Serial Bus (USB) port that may be
used by an authorized administrator to connect the hardware entropy
source.
• On all models, an authorized administrator may configure automatic Anti-
Virus and Intrusion Prevention System (IPS) updates from the FortiGuard
Distribution Server.
FortiGate units are designed to be installed and used in an environment that is
configured and controlled in accordance with the administrator guidance that is
supplied with the product.
Single-Unit Configuration
In the single-unit configuration, which is supported by all of the FortiGate series,
the TOE consists of a single FortiGate unit. The FortiGate unit controls network
access by implementing classic firewall concepts, in which the firewall is linked to
two or more networks and controls the transfer of data between them. The
configuration supports additional networks, each of which is physically connected
to one of the included network interfaces. Figure 1 shows an example of a single
FortiGate unit mediating information flow between two networks. One of the
networks provides access to the FortiGuard Distribution Server, which permits
Anti-Virus and IPS updates to be downloaded and facilitates access to Web
filtering data.
The Management Workstation is a general-purpose computer with a standard
network interface used to administer the TOE remotely using the Network Web-
based GUI or over SSH. A standard serial interface may also be used to administer
the TOE locally.
The TOE accesses the FortiGuard Distribution Server, which permits Anti-Virus and
Intrusion Detection System/Intrusion Prevention System (IDS/IPS) updates to be
downloaded by the TOE.
High-Availability Configuration
In the High Availability (HA) configuration, which is supported by all FortiGate
units, the TOE consists of two or more FortiGate units interconnected to form a
FortiGate Cluster. The FortiGate Cluster controls network access by implementing
classic firewall concepts, in which the firewall is linked to two or more networks
and controls the transfer of data between them. The configuration supports
additional networks, each of which is physically connected to one of the included
network interfaces.
Figure 2 shows two FortiGate units of the same type configured in HA mode to
form a FortiGate Cluster. A FortiGate Cluster may be configured to work in active-
passive mode for failover protection, or in active-active mode for failover
protection and load balancing. Both active-passive mode and active-active mode
are part of the evaluated configuration of the TOE. The cluster units share state
and configuration information over a dedicated High Availability Link. The TOE
accesses the FortiGuard Distribution Server, which permits Anti-Virus and
Intrusion Detection System/Intrusion Prevention System (IDS/IPS) updates to be
downloaded.
The Management Workstation is present as per the single-unit configuration.
TOE Delivery
FortiGate units are shipped directly to customers, but the certified FortiOS image
is not preinstalled. Customers can download the correct version by logging in to
the Fortinet Customer Support website (https://support.fortinet.com
[support.fortinet.com]) and navigating to Download > Firmware Images.
Due to having different device drivers, each model offered in the FortiGate Series
has its own unique firmware image created from the same common firmware
build. For each series, the hardware model identifier changes (e.g. 301E).
Customers can download the image based on their FortiGate hardware model. The
images are provided to customers as a .out file. An example of a filename is as
follows:
• FGT_301E-v6-build1190-FORTINET.out
T.AUDACC Persons may not be accountable for the actions that they conduct because the
audit records are not created, thus allowing an attacker to escape detection.
T.COMDIS An unauthorized user may attempt to disclose the data collected by the TOE
by bypassing a security mechanism.
T.NOAUTH An unauthorized person may attempt to bypass the security of the TOE so as
to access and use security functions and/or non-security functions provided
by the TOE.
T.NOHALT An unauthorized user may attempt to compromise the continuity of the TOE
functionality by halting execution of the TOE.
T.PRIVILEGE An unauthorized user may attempt to gain access to the TOE and exploit
system privileges to gain access to TOE security functions and data.
T.VIRUS A malicious agent may attempt to pass a virus through or to the TOE.
Table 4 – Threats
OSP Description
P.ACCACT Users of the TOE shall be accountable for their actions.
3.3 ASSUMPTIONS
The assumptions required to ensure the security of the TOE are listed in Table 6.
Assumptions Description
A.LOCATE The hardware appliances will be located within controlled access facilities and
protected from unauthorized physical modification.
A.MANAGE There will be one or more competent individuals assigned to manage the TOE
and the security of the information it contains.
A.SINGEN Information cannot flow among the internal and external networks unless it
passes through the TOE.
Table 6 – Assumptions
O.AUDIT The TOE must provide user accountability for information flows
through the TOE and for authorized administrator use of security
functions by providing a means to record an audit trail of security-
related events, with accurate dates and times.
O.ENCRYPT The TOE must protect the confidentiality and integrity of data passed
between itself and an authorized administrator, between itself and
VPN peers, or between TOE devices using cryptographic functions.
O.IDENTAUTH The TOE must be able to identify and authenticate authorized users
prior to allowing access to TOE security management functions or, if
required, to a connected network.
O.MEDIATE The TOE must mediate the flow of all information between clients
and servers located on internal and external networks governed by
the TOE.
O.PROTECT The TOE must protect itself and the designated network against
attempts by unauthorized users to bypass, deactivate, or tamper
with TOE security functions in such a way as to cause unauthorized
access to its functions and data, or to deny access to legitimate
users.
O.VIRUS The TOE will detect and block viruses contained within an information
flow which arrives at any of the TOE network interfaces.
OE.PHYSICAL Those responsible for the TOE must ensure that the TOE is protected
from any physical attack.
OE.SINGEN Information cannot flow among the internal and external networks
unless it passes through the TOE.
T.PRIVILEGE
T.MEDIATE
A.MANAGE
P.MANAGE
T.PROCOM
T.NOAUTH
T.AUDACC
T.NOHALT
T.COMDIS
A.SINGEN
P.ACCACT
A.LOCATE
P.DETECT
T.ACCESS
T.VIRUS
O.ACCESS X X X X
O.ADMIN X X
O.AUDIT X X X
O.ENCRYPT X X
O.IDENTAUTH X X X X X X
O.MEDIATE X X
O.PROTECT X X X X
O.TIME X X
O.VIRUS X
OE.ADMIN X X
OE.PHYSICAL X
OE.SINGEN X
Objectives: O.MEDIATE The TOE must mediate the flow of all information
between clients and servers located on internal and
external networks governed by the TOE.
Threat: T.AUDACC Persons may not be accountable for the actions that they conduct
because the audit records are not created, thus allowing an attacker to
escape detection.
Threat: T.COMDIS An unauthorized user may attempt to disclose the data collected by the
TOE by bypassing a security mechanism.
Objectives: O.ACCESS The TOE must allow only authorized users to access only
appropriate TOE functions and data.
O.IDENTAUT The TOE must be able to identify and authenticate
H authorized users prior to allowing access to TOE security
management functions or, if required, to a connected
network.
O.PROTECT The TOE must protect itself and the designated network
against attempts by unauthorized users to bypass,
deactivate, or tamper with TOE security functions in
such a way as to cause unauthorized access to its
functions and data, or to deny access to legitimate
users.
Objectives: O.MEDIATE The TOE must mediate the flow of all information
between clients and servers located on internal and
external networks governed by the TOE.
Rationale: O.MEDIATE requires that all information that passes through the
networks is mediated by the TOE, blocking unauthorized users, and
impermissible information.
Threat: An unauthorized person may attempt to bypass the security of the TOE
T.NOAUTH so as to access and use security functions and/or non-security functions
provided by the TOE.
Threat: T.NOHALT An unauthorized user may attempt to compromise the continuity of the
TOE functionality by halting execution of the TOE.
Objectives: O.ACCESS The TOE must allow authorized users to access only
appropriate TOE functions and data.
O.IDENTAUTH The TOE must be able to identify and authenticate
authorized users prior to allowing access to TOE
security management functions or, if required, to a
connected network.
O.PROTECT The TOE must protect itself and the designated
network against attempts by unauthorized users to
bypass, deactivate, or tamper with TOE security
functions in such a way as to cause unauthorized
access to its functions and data, or to deny access to
legitimate users.
Threat: An unauthorized user may attempt to gain access to the TOE and
T.PRIVILEGE exploit system privileges to gain access to TOE security functions and
data.
Objectives: O.ACCESS The TOE must allow authorized users to access only
appropriate TOE functions and data.
O.IDENTAUTH The TOE must be able to identify and authenticate
authorized users prior to allowing access to TOE
functions, data or, for certain specified services, to a
connected network.
O.PROTECT The TOE must protect itself from unauthorized
modifications and access to its functions and data.
Objectives: O.ENCRYPT The TOE must protect the confidentiality and integrity
of data passed between itself and an authorized
administrator, between itself and VPN peers, or
between TOE devices using cryptographic functions.
Threat: T.VIRUS A malicious agent may attempt to pass a virus through or to the TOE.
Objectives: O.VIRUS The TOE will detect and block viruses contained within
an information flow which arrives at any of the TOE
network interfaces.
Rationale: The O.VIRUS objective ensures that the TOE detects and blocks viruses
which are contained in any information flow which reaches one of the
TOE network interfaces.
Policy: P.ACCACT Users of the TOE shall be accountable for their actions.
Rationale: The O.AUDIT objective implements this policy by requiring auditing of all
data accesses and use of TOE functions.
The O.IDENTAUTH objective supports this objective by ensuring each
user is uniquely identified and authenticated.
O.TIME supports the audit trail with reliable time stamps.
Policy: P.DETECT All events that are indicative of inappropriate activity that may have
resulted from misuse, access, or malicious activity must be collected.
Rationale: The O.AUDIT objective supports this policy by ensuring the collection of
data on security relevant events.
Objectives: O.ACCESS The TOE must allow authorized users to access only
appropriate TOE functions and data.
O.ADMIN The TOE must provide functionality that enables an
authorized administrator to manage TOE security
functions, and must ensure that only authorized
administrators are able to access such functionality.
O.IDENTAUTH The TOE must be able to identify and authenticate
authorized users prior to allowing access to TOE
security management functions or, if required, to a
connected network.
O.PROTECT The TOE must protect itself and the designated
network against attempts by unauthorized users to
bypass, deactivate, or tamper with TOE security
functions in such a way as to cause unauthorized
access to its functions and data, or to deny access to
legitimate users.
OE.ADMIN Those responsible for the TOE must ensure that the
TOE is delivered, installed, managed, and operated in a
manner which is consistent with IT security. There are
an appropriate number of authorized administrators
trained to maintain the TOE, including its security
policies and practices. Authorized administrators are
non-hostile and follow all administrator guidance.
Rationale: The OE.ADMIN objective supports the assumption by ensuring that all
authorized administrators are qualified and trained to manage the TOE.
Assumption: Information cannot flow among the internal and external networks
unless it passes through the TOE.
A.SINGEN
Objectives: OE.SINGEN Information cannot flow among the internal and external
networks unless it passes through the TOE.
Rationale: This objective supports the assumption by requiring that the information
flow subject to security policy is made to pass through the TOE.
Management
The following actions could be considered for the management functions in FMT:
a) The management of actions on the information flow when a virus is
detected;
b) The management of actions on virus signatures.
Audit
The following actions should be auditable:
a) Minimal: actions taken on the information flow when virus is detected.
FAV_ACT_EXT.1 Anti-Virus Actions
Hierarchical to: No other components.
Dependencies: No dependencies
FAV_ACT_EXT.1.1 The TSF shall provide an authorized administrator the capability to
select one or more of the following actions: [selection: quarantine the
Management
The following actions could be considered for the management functions in FMT:
a. Basic: Configuring of DoS policy.
Audit
The following actions should be auditable:
a. Basic: Detection of a possible DoS attack.
Management
The following actions could be considered for the management functions in FMT:
a. Configuring of IPS policies; and
b. Update of IPS signatures.
Audit
The following actions should be auditable:
b. Basic: Detection of a possible attack incident; and
c. Basic: Update of the signature protection profile.
FIP_SIG_EXT.1 Signature Protection
Hierarchical to: No other components.
Dependencies: No dependencies
FIP_SIG_EXT.1.1 The TSF shall detect and block potential attacks based on similarities
to known attack signatures.
6.1 CONVENTIONS
The CC permits four types of operations to be performed on functional
requirements: selection, assignment, refinement, and iteration. These operations,
when performed on requirements that derive from CC Part 2, are identified in this
ST in the following manner:
• Selection: Indicated by surrounding brackets, e.g., [selected item].
• Assignment: Indicated by surrounding brackets and italics, e.g., [assigned
item].
• Refinement: Refined components are identified by using bold for additional
information, or strikeout for deleted text.
• Iteration: Indicated by assigning a number in parenthesis to the end of the
functional component identifier as well as by modifying the functional
component title to distinguish between iterations, e.g., ‘FDP_ACC.1(1),
Subset access control (administrators)’ and ‘FDP_ACC.1(2) Subset access
control (devices)’.
2
Users and IT entities that exchange information via the TOE
3
Any network traffic sent through the TOE from one subject to another
FDP_IFF.1.4(1) The TSF shall explicitly authorize an information flow based on the
following rules: [none].
FDP_IFF.1.5(1) The TSF shall explicitly deny an information flow based on the following
rules: [none].
FDP_IFF.1.4(2) The TSF shall explicitly authorize an information flow based on the
following rules: [
a) An override has been set for the URL].
FDP_IFF.1.5(2) The TSF shall explicitly deny an information flow based on the following
rules: [none].
Application Note: The FortiGuard web filtering service assigns all websites to a category
based on content. Those not assigned to other categories are assigned to the ‘Unrated’
category. For example, the cached content classification indicates that the site caches
content, but provides no indication of the content type.
Assurance Components
Assurance Class
Identifier Name
Development (ADV) ADV_ARC.1 Security architecture description
ADV_FSP.4 Complete functional specification
ADV_IMP.1 Implementation representation of the TSF
ADV_TDS.3 Basic modular design
Guidance Documents AGD_OPE.1 Operational user guidance
(AGD)
AGD_PRE.1 Preparative procedures
Life-Cycle Support Production support, acceptance procedures
ALC_CMC.4
(ALC) and automation
ALC_CMS.4 Problem tracking CM coverage
ALC_DEL.1 Delivery procedures
ALC_DVS.1 Identification of security measures
ALC_FLR.3 Systematic flaw remediation
ALC_LCD.1 Developer defined life-cycle model
ALC_TAT.1 Well-defined development tools
O.PROTECT
O.ENCRYPT
O.MEDIATE
O.ACCESS
O.ADMIN
O.REUSE
O.AUDIT
O.VIRUS
O.TIME
FAU_GEN.1 X
FAU_GEN.2 X
FCS_CKM.1(1) X
FCS_CKM.1(2) X
FCS_CKM.4 X
FCS_COP.1 X
FDP_IFC.1(1) X
FDP_IFC.1(2) X
FDP_IFF.1(1) X
FDP_IFF.1(2) X
FIA_AFL.1 X
FIA_ATD.1 X
FIA_UAU.2 X X X
O.PROTECT
O.ENCRYPT
O.MEDIATE
O.ACCESS
O.ADMIN
O.REUSE
O.AUDIT
O.VIRUS
O.TIME
FIA_UAU.4 X X
FIA_UAU.5 X
FIA_UID.2 X X
FMT_MOF.1 X X X
FMT_MSA.1(1) X X X
FMT_MSA.1(2) X X X
FMT_MSA.3(1) X X
FMT_MSA.3(2) X X
FMT_SMF.1 X X
FMT_SMR.1 X X
FPT_FLS.1 X
FPT_STM.1 X
FTP_ITC.1 X
FTP_TRP.1 X
FIP_DOS_EXT.1 X X
FIP_SIG_EXT.1 X X
FAV_ACT_EXT.1 X X
Rationale: FIA_UID.2 and FIA_UAU.2 ensure that users are identified and
authenticated prior to being allowed access to TOE security management
functionality.
FMT_MOF.1 ensures that only authorized administrators have access to IPS
security management functions. FMT_MSA.1(1) and FMT_MSA.1(2) ensure
that only authorized administrators have access to the security attributes
associated with the firewall and web filtering security functional policies.
Objective: The TOE must provide user accountability for information flows through the
TOE and for authorized administrator use of security functions by providing
O.AUDIT
a means to record an audit trail of security-related events, with accurate
dates and times.
Objective: The TOE must protect the confidentiality and integrity of data passed
between itself and an authorized administrator, between itself and VPN
O.ENCRYPT
peers, or between TOE devices using cryptographic functions.
Objective: The TOE must be able to identify and authenticate authorized users prior to
allowing access to TOE security management functions or, if required, to a
O.IDENTAUTH
connected network.
Rationale: FIA_ATD.1 supports this objective by ensuring that the data required to
identify and authenticate users is maintained by the TOE.
FIA_UID.2 and FIA_UAU.2 ensure that users are identified and
authenticated prior to being granted access to TOE security management
functions, or to a connected network.
FIA_UAU.4 supports the objective by providing a single use authentication
mechanism. FIA_UAU.5 provides multiple possible authentication
mechanisms that may be used to support the objective.
FMT_SMR.1 supports the objective by providing roles which are used to
provide users access to TOE security functionality.
Objective: The TOE must mediate the flow of all information between clients and
servers located on internal and external networks governed by the TOE.
O.MEDIATE
Security FDP_IFC.1(1) Subset information flow control (Firewall SFP)
Functional FDP_IFC.1(2) Subset information flow control (Web Filtering SFP)
Requirements:
FDP_IFF.1(1) Simple security attributes (Firewall SFP)
Rationale: FDP_IFC.1(1) and FDP_IFF.1(1) support the objective by detailing how the
TOE mediates the flow of information for the firewall policy.
FDP_IFC.1(2) and FDP_IFF.1(2) support the objective by detailing how the
TOE mediates the flow of information for the web filtering policy.
FIP_DOS_EXT.1 and FIP_SIG_EXT.1 support the objective by detecting and
preventing denial of service attacks and attacks with known signatures
present in the information flow.
FAV_ACT_EXT.1 supports the objective by taking specific actions when a
virus is detected in the flow of information.
Objective: The TOE must protect itself and the designated network against attempts
by unauthorized users to bypass, deactivate, or tamper with TOE security
O.PROTECT
functions in such a way as to cause unauthorized access to its functions
and data, or to deny access to legitimate users.
Objective: The TOE must provide a means to prevent the reuse of authentication data
for users attempting to authenticate to the TOE from a connected network.
O.REUSE
Security FIA_UAU.2 User authentication before any action
Functional FIA_UAU.4 Single-use authentication mechanisms
Objective: The TOE will detect and block viruses contained within an information flow
which arrives at any of the TOE network interfaces.
O.VIRUS
Security FAV_ACT_EXT.1 Anti-virus actions
Functional
Requirements:
Rationale: FAV_ACT_EXT.1 supports this objective by ensuring that the TOE can
detect and block information that may contain a virus.
Dependency Rationale
Table 15 identifies the Security Functional Requirements from Part 2 of the CC and
their associated dependencies. It also indicates whether the ST explicitly
addresses each dependency.
SFR Dependency Dependency Satisfied Rationale
FAU_GEN.1 FPT_STM.1
FAU_GEN.2 FAU_GEN.1
FCS_CKM.4
FCS_CKM.4
FCS_CKM.4 FDP_ITC.1 or
FDP_ITC.2 or
FCS_CKM.1
FCS_CKM.4
FMT_MOF.1 FMT_SMR.1
FMT_SMF.1
FMT_SMR.1
FMT_SMF.1
FMT_SMR.1
FMT_SMF.1
FMT_SMR.1
FMT_SMR.1
Term Description
Network Management A computer located remotely from the TOE but which is able
Station to establish a network connection to the TOE. The Network
Management Station falls outside the TOE Boundary.
Presumed Address The TOE can make no claim as to the real address of any
source or destination subject; the TOE can only suppose that
these addresses are accurate. Therefore, a ‘presumed
address’ is used to identify source and destination addresses.
Protection Profile Both the Common Criteria and Fortinet use the term
Protection Profile. Within this ST, the context generally makes
it clear which usage is appropriate. However, for clarity, the
CC usage is generally noted by the abbreviation PP while the
Fortinet usage is always denoted by spelling out the complete
term.
Table 16 – Terminology
Acronym Definition
AES Advanced Encryption Standard
ASIC Application-specific Integrated Circuit
AV Anti-Virus
CA Certificate Authority
CAVP Cryptographic Algorithm Validation Program
CBC Cipher-block Chaining
CC Common Criteria
CLI Command Line Interface
CM Configuration Management
CMVP Cryptographic Module Validation Program
CRL Certificate Revocation List
CTR Counter-mode
DH Diffie-Hellman
DoS Denial of Service
EAL Evaluation Assurance Level
ESP Encapsulating Security Protocol
FGCP FortiGate Clustering Protocol
FIPS Federal Information Processing Standards
FTP File Transfer Protocol
GUI Graphical User Interface
HA High Availability
HMAC Keyed Hash Message Authentication Code
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol Secure
IDS Intrusion Detection System
IFC Integer Factorization Cryptography
IKE Internet Key Exchange
IMAP Internet Message Access Protocol
IP Internet Protocol
IPS Intrusion Prevention System
IPsec Internet Protocol Security
Ipv4, Ipv6 Internet Protocol version 4, Internet Protocol version 6
IT Information Technology
MIME Multi-Purpose Internet Mail Extensions
MODP Modular Exponential
NAT Network Address Translation
NGFW Next Generation Firewall
NIST National Institute of Standards and Technology
Table 17 – Acronyms
FG-40F Guide: FortiGate/FortiWifi 40F & 60F Series QuickStart Guide CP9Xlite CP9Xlite
File: FG-FWF-40F-60F-Series-QSG.pdf
FG-40F-3G4G Guide: FortiGate/FortiWifi 40F & 60F Series QuickStart Guide CP9Xlite CP9Xlite
File: FG-FWF-40F-60F-Series-QSG.pdf
FG-60F Guide: FortiGate/FortiWifi 40F & 60F Series QuickStart Guide CP9Xlite CP9Xlite
File: FG-FWF-40F-60F-Series-QSG.pdf
FG-60F-3G4G Guide: FortiGate/FortiWifi 40F & 60F Series QuickStart Guide CP9Xlite CP9Xlite
File: FG-FWF-40F-60F-Series-QSG.pdf
FortiGate-VM02
FortiGate-VM04
FortiGate-VM08
FortiGate-VM16
FortiGate-VM32
FortiGate-VMUL