Cisco IPS4345 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Sítě Cisco IPS4345. Security Target - Common Criteria Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk

Shrnutí obsahu

Strany 1 - July, 2013

Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA © 2013 Cisco Systems, Inc. This document can be repr

Strany 2 - Table of Contents

Cisco Intrusion Prevention

Strany 3

Cisco Intrusion Prevention System Security Target 11 1.2.3.2 Cisco ASA 5500-X The Cisco ASA 5500-X Series midrange security appliances includ

Strany 4 - List of Figures

Cisco Intrusion Prevention

Strany 5 - List of Acronyms

Cisco Intrusion Prevention System Security Target 13 Figure 1 Example TOE Deployment The figure above includes the following:  Several e

Strany 6 - DOCUMENT INTRODUCTION

Cisco Intrusion Prevention

Strany 7 - 1.1 ST and TOE Reference

Cisco Intrusion Prevention System Security Target 15 Hardware/Software Picture Size (H x W X D) Interfaces Cisco ASA 5555-X IPS Note: This is

Strany 8 - 1.2.1 TOE Product Type

Cisco Intrusion Prevention

Strany 9 - 1.2.2 TOE Components

Cisco Intrusion Prevention System Security Target 17 1.6.6 Protection of the TSF The TOE protects against interference and tampering by untru

Strany 10 - 1.2.3 Non-TOE Components

Cisco Intrusion Prevention

Strany 11

Cisco Intrusion Prevention System Security Target 19 2 CONFORMANCE CLAIMS 2.1 Common Criteria Conformance Claim The TOE and ST are compliant

Strany 12 - 1.3 TOE DESCRIPTION

Cisco Intrusion Prevention

Strany 13

Cisco Intrusion Prevention

Strany 14

Cisco Intrusion Prevention System Security Target 21 3 SECURITY PROBLEM DEFINITION This chapter identifies the following:  Significant ass

Strany 15 - Security audit

Cisco Intrusion Prevention

Strany 16 - Security Management

Cisco Intrusion Prevention System Security Target 23 4 SECURITY OBJECTIVES This Chapter identifies the security objectives of the TOE and th

Strany 17 - 1.6.7 TOE Access

Cisco Intrusion Prevention

Strany 18

Cisco Intrusion Prevention System Security Target 25 A.NO_GENERAL_PURPOSE A.PHYSICAL A.TRUSTED_ADMIN T.UNAUTHORIZED_ACCESS T.UNAUTHORIZED_UPD

Strany 19 - 2 CONFORMANCE CLAIMS

Cisco Intrusion Prevention

Strany 20

Cisco Intrusion Prevention System Security Target 27 5 SECURITY REQUIREMENTS This section identifies the Security Functional Requirements for

Strany 21 - 3.1 Assumptions

Cisco Intrusion Prevention

Strany 22 - 3.2 Threats

Cisco Intrusion Prevention System Security Target 29 Table 17 Auditable Events SFR Auditable Event Additional Audit Record Contents Security

Strany 23 - 4 SECURITY OBJECTIVES

Cisco Intrusion Prevention System Security Target 3 4.3.2 Justification of tracing...

Strany 24

Cisco Intrusion Prevention

Strany 25

Cisco Intrusion Prevention System Security Target 31 5.2.2.3 FCS_COP.1(1) Cryptographic Operation (for data encryption/decryption) FCS_COP.1

Strany 26

Cisco Intrusion Prevention

Strany 27 - 5 SECURITY REQUIREMENTS

Cisco Intrusion Prevention System Security Target 33 5.2.3 User data protection (FDP) 5.2.3.1 FDP_RIP.2 Full Residual Information Protectio

Strany 28 - 5.2.1 Security audit (FAU)

Cisco Intrusion Prevention

Strany 29

Cisco Intrusion Prevention System Security Target 35 5.2.6.4 FPT_TUD_(EXT).1 Extended: Trusted Update FPT_TUD_(EXT).1.1 The TSF shall provide

Strany 30

Cisco Intrusion Prevention

Strany 31 - "The Keyed-Hash

Cisco Intrusion Prevention System Security Target 37 5.4 SFR Dependencies Rationale Functional component FCS_COP.1 depends on the following

Strany 32

Cisco Intrusion Prevention

Strany 33

Cisco Intrusion Prevention System Security Target 39 5.5 Security Assurance Requirements 5.5.1 SAR Requirements The TOE assurance requiremen

Strany 34

Cisco Intrusion Prevention

Strany 35

Cisco Intrusion Prevention

Strany 36

Cisco Intrusion Prevention System Security Target 41 6 TOE SUMMARY SPECIFICATION 6.1 Security Requirements Rationale Table 22: Security Re

Strany 37

Cisco Intrusion Prevention

Strany 38

Cisco Intrusion Prevention System Security Target 43 TOE SFRs How the SFR is Satisfied the event occurred, the outcome of the event, and the t

Strany 39 - 5.5.3 Assurance Measures

Cisco Intrusion Prevention

Strany 40

Cisco Intrusion Prevention System Security Target 45 TOE SFRs How the SFR is Satisfied password length is settable by the Authorized Administr

Strany 42

Cisco Intrusion Prevention System Security Target 47 TOE SFRs How the SFR is Satisfied tests will cause the device to shut down and restart th

Strany 43

Cisco Intrusion Prevention

Strany 44

Cisco Intrusion Prevention System Security Target 49 7 SUPPLEMENTAL CRYPTOGRAPHIC INFORMATION 7.1 Key Zeroization The following table descri

Strany 45

Cisco Intrusion Prevention System Security Target 5 List of Acronyms The following acronyms and abbreviations are common and may be used in t

Strany 46

Cisco Intrusion Prevention

Strany 47

Cisco Intrusion Prevention System Security Target 51 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant

Strany 48

Cisco Intrusion Prevention

Strany 49 - 7.1 Key Zeroization

Cisco Intrusion Prevention System Security Target 53 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant

Strany 50

Cisco Intrusion Prevention

Strany 51

Cisco Intrusion Prevention System Security Target 55 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant

Strany 52

Cisco Intrusion Prevention

Strany 53

Cisco Intrusion Prevention System Security Target 57 Section Shall/Shall Not Statement(s) Should (Not) Statements2 TOE Compliant? Rationale 6.

Strany 54

Cisco Intrusion Prevention

Strany 55

Cisco Intrusion Prevention System Security Target 59 Section Shall/Shall Not Statement(s) Should (Not) Statements2 TOE Compliant? Rationale Sc

Strany 56

Cisco Intrusion Prevention

Strany 57

Cisco Intrusion Prevention

Strany 58

Cisco Intrusion Prevention System Security Target 61 8 ANNEX A: REFERENCES The following documentation was used to prepare this ST. Table 2

Strany 59

Cisco Intrusion Prevention System Security Target 7 1 SECURITY TARGET INTRODUCTION The Security Target contains the following sections:  Se

Strany 60

Cisco Intrusion Prevention

Strany 61 - 8 ANNEX A: REFERENCES

Cisco Intrusion Prevention System Security Target 9 functionality independent of another traffic filtering device such as a firewall or router

Komentáře k této Příručce

Žádné komentáře