 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
¨ |
Justify
suitability of each objective, e.g.
|
|
|
|
– |
O1 The firewall must limit the valid range
of
|
|
|
|
addresses
expected on each of the private and
|
|
|
|
hostile
networks
|
|
|
|
– |
FTA_TSE.1
provides the capability of limiting
|
|
|
access
in the manner required by O1, and
|
|
|
|
FPT_RVM.1
ensures that this function is
|
|
|
|
always
invoked when required.
|
|