Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA © 2013 Cisco Systems, Inc. This document can be repr
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 11 1.2.3.2 Cisco ASA 5500-X The Cisco ASA 5500-X Series midrange security appliances includ
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 13 Figure 1 Example TOE Deployment The figure above includes the following: Several e
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 15 Hardware/Software Picture Size (H x W X D) Interfaces Cisco ASA 5555-X IPS Note: This is
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 17 1.6.6 Protection of the TSF The TOE protects against interference and tampering by untru
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 19 2 CONFORMANCE CLAIMS 2.1 Common Criteria Conformance Claim The TOE and ST are compliant
Cisco Intrusion Prevention
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 21 3 SECURITY PROBLEM DEFINITION This chapter identifies the following: Significant ass
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 23 4 SECURITY OBJECTIVES This Chapter identifies the security objectives of the TOE and th
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 25 A.NO_GENERAL_PURPOSE A.PHYSICAL A.TRUSTED_ADMIN T.UNAUTHORIZED_ACCESS T.UNAUTHORIZED_UPD
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 27 5 SECURITY REQUIREMENTS This section identifies the Security Functional Requirements for
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 29 Table 17 Auditable Events SFR Auditable Event Additional Audit Record Contents Security
Cisco Intrusion Prevention System Security Target 3 4.3.2 Justification of tracing...
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 31 5.2.2.3 FCS_COP.1(1) Cryptographic Operation (for data encryption/decryption) FCS_COP.1
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 33 5.2.3 User data protection (FDP) 5.2.3.1 FDP_RIP.2 Full Residual Information Protectio
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 35 5.2.6.4 FPT_TUD_(EXT).1 Extended: Trusted Update FPT_TUD_(EXT).1.1 The TSF shall provide
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 37 5.4 SFR Dependencies Rationale Functional component FCS_COP.1 depends on the following
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 39 5.5 Security Assurance Requirements 5.5.1 SAR Requirements The TOE assurance requiremen
Cisco Intrusion Prevention
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 41 6 TOE SUMMARY SPECIFICATION 6.1 Security Requirements Rationale Table 22: Security Re
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 43 TOE SFRs How the SFR is Satisfied the event occurred, the outcome of the event, and the t
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 45 TOE SFRs How the SFR is Satisfied password length is settable by the Authorized Administr
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 47 TOE SFRs How the SFR is Satisfied tests will cause the device to shut down and restart th
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 49 7 SUPPLEMENTAL CRYPTOGRAPHIC INFORMATION 7.1 Key Zeroization The following table descri
Cisco Intrusion Prevention System Security Target 5 List of Acronyms The following acronyms and abbreviations are common and may be used in t
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 51 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 53 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 55 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 57 Section Shall/Shall Not Statement(s) Should (Not) Statements2 TOE Compliant? Rationale 6.
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 59 Section Shall/Shall Not Statement(s) Should (Not) Statements2 TOE Compliant? Rationale Sc
Cisco Intrusion Prevention
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 61 8 ANNEX A: REFERENCES The following documentation was used to prepare this ST. Table 2
Cisco Intrusion Prevention System Security Target 7 1 SECURITY TARGET INTRODUCTION The Security Target contains the following sections: Se
Cisco Intrusion Prevention
Cisco Intrusion Prevention System Security Target 9 functionality independent of another traffic filtering device such as a firewall or router
Komentáře k této Příručce