Cisco IPS4345 Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Networking Cisco IPS4345. Security Target - Common Criteria Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - July, 2013

Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA © 2013 Cisco Systems, Inc. This document can be repr

Strona 2 - Table of Contents

Cisco Intrusion Prevention

Strona 3

Cisco Intrusion Prevention System Security Target 11 1.2.3.2 Cisco ASA 5500-X The Cisco ASA 5500-X Series midrange security appliances includ

Strona 4 - List of Figures

Cisco Intrusion Prevention

Strona 5 - List of Acronyms

Cisco Intrusion Prevention System Security Target 13 Figure 1 Example TOE Deployment The figure above includes the following:  Several e

Strona 6 - DOCUMENT INTRODUCTION

Cisco Intrusion Prevention

Strona 7 - 1.1 ST and TOE Reference

Cisco Intrusion Prevention System Security Target 15 Hardware/Software Picture Size (H x W X D) Interfaces Cisco ASA 5555-X IPS Note: This is

Strona 8 - 1.2.1 TOE Product Type

Cisco Intrusion Prevention

Strona 9 - 1.2.2 TOE Components

Cisco Intrusion Prevention System Security Target 17 1.6.6 Protection of the TSF The TOE protects against interference and tampering by untru

Strona 10 - 1.2.3 Non-TOE Components

Cisco Intrusion Prevention

Strona 11

Cisco Intrusion Prevention System Security Target 19 2 CONFORMANCE CLAIMS 2.1 Common Criteria Conformance Claim The TOE and ST are compliant

Strona 12 - 1.3 TOE DESCRIPTION

Cisco Intrusion Prevention

Strona 13

Cisco Intrusion Prevention

Strona 14

Cisco Intrusion Prevention System Security Target 21 3 SECURITY PROBLEM DEFINITION This chapter identifies the following:  Significant ass

Strona 15 - Security audit

Cisco Intrusion Prevention

Strona 16 - Security Management

Cisco Intrusion Prevention System Security Target 23 4 SECURITY OBJECTIVES This Chapter identifies the security objectives of the TOE and th

Strona 17 - 1.6.7 TOE Access

Cisco Intrusion Prevention

Strona 18

Cisco Intrusion Prevention System Security Target 25 A.NO_GENERAL_PURPOSE A.PHYSICAL A.TRUSTED_ADMIN T.UNAUTHORIZED_ACCESS T.UNAUTHORIZED_UPD

Strona 19 - 2 CONFORMANCE CLAIMS

Cisco Intrusion Prevention

Strona 20

Cisco Intrusion Prevention System Security Target 27 5 SECURITY REQUIREMENTS This section identifies the Security Functional Requirements for

Strona 21 - 3.1 Assumptions

Cisco Intrusion Prevention

Strona 22 - 3.2 Threats

Cisco Intrusion Prevention System Security Target 29 Table 17 Auditable Events SFR Auditable Event Additional Audit Record Contents Security

Strona 23 - 4 SECURITY OBJECTIVES

Cisco Intrusion Prevention System Security Target 3 4.3.2 Justification of tracing...

Strona 24

Cisco Intrusion Prevention

Strona 25

Cisco Intrusion Prevention System Security Target 31 5.2.2.3 FCS_COP.1(1) Cryptographic Operation (for data encryption/decryption) FCS_COP.1

Strona 26

Cisco Intrusion Prevention

Strona 27 - 5 SECURITY REQUIREMENTS

Cisco Intrusion Prevention System Security Target 33 5.2.3 User data protection (FDP) 5.2.3.1 FDP_RIP.2 Full Residual Information Protectio

Strona 28 - 5.2.1 Security audit (FAU)

Cisco Intrusion Prevention

Strona 29

Cisco Intrusion Prevention System Security Target 35 5.2.6.4 FPT_TUD_(EXT).1 Extended: Trusted Update FPT_TUD_(EXT).1.1 The TSF shall provide

Strona 30

Cisco Intrusion Prevention

Strona 31 - "The Keyed-Hash

Cisco Intrusion Prevention System Security Target 37 5.4 SFR Dependencies Rationale Functional component FCS_COP.1 depends on the following

Strona 32

Cisco Intrusion Prevention

Strona 33

Cisco Intrusion Prevention System Security Target 39 5.5 Security Assurance Requirements 5.5.1 SAR Requirements The TOE assurance requiremen

Strona 34

Cisco Intrusion Prevention

Strona 35

Cisco Intrusion Prevention

Strona 36

Cisco Intrusion Prevention System Security Target 41 6 TOE SUMMARY SPECIFICATION 6.1 Security Requirements Rationale Table 22: Security Re

Strona 37

Cisco Intrusion Prevention

Strona 38

Cisco Intrusion Prevention System Security Target 43 TOE SFRs How the SFR is Satisfied the event occurred, the outcome of the event, and the t

Strona 39 - 5.5.3 Assurance Measures

Cisco Intrusion Prevention

Strona 40

Cisco Intrusion Prevention System Security Target 45 TOE SFRs How the SFR is Satisfied password length is settable by the Authorized Administr

Strona 42

Cisco Intrusion Prevention System Security Target 47 TOE SFRs How the SFR is Satisfied tests will cause the device to shut down and restart th

Strona 43

Cisco Intrusion Prevention

Strona 44

Cisco Intrusion Prevention System Security Target 49 7 SUPPLEMENTAL CRYPTOGRAPHIC INFORMATION 7.1 Key Zeroization The following table descri

Strona 45

Cisco Intrusion Prevention System Security Target 5 List of Acronyms The following acronyms and abbreviations are common and may be used in t

Strona 46

Cisco Intrusion Prevention

Strona 47

Cisco Intrusion Prevention System Security Target 51 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant

Strona 48

Cisco Intrusion Prevention

Strona 49 - 7.1 Key Zeroization

Cisco Intrusion Prevention System Security Target 53 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant

Strona 50

Cisco Intrusion Prevention

Strona 51

Cisco Intrusion Prevention System Security Target 55 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant

Strona 52

Cisco Intrusion Prevention

Strona 53

Cisco Intrusion Prevention System Security Target 57 Section Shall/Shall Not Statement(s) Should (Not) Statements2 TOE Compliant? Rationale 6.

Strona 54

Cisco Intrusion Prevention

Strona 55

Cisco Intrusion Prevention System Security Target 59 Section Shall/Shall Not Statement(s) Should (Not) Statements2 TOE Compliant? Rationale Sc

Strona 56

Cisco Intrusion Prevention

Strona 57

Cisco Intrusion Prevention

Strona 58

Cisco Intrusion Prevention System Security Target 61 8 ANNEX A: REFERENCES The following documentation was used to prepare this ST. Table 2

Strona 59

Cisco Intrusion Prevention System Security Target 7 1 SECURITY TARGET INTRODUCTION The Security Target contains the following sections:  Se

Strona 60

Cisco Intrusion Prevention

Strona 61 - 8 ANNEX A: REFERENCES

Cisco Intrusion Prevention System Security Target 9 functionality independent of another traffic filtering device such as a firewall or router

Komentarze do niniejszej Instrukcji

Brak uwag