Cisco 4404 - Wireless LAN Controller Spezifikationen

Stöbern Sie online oder laden Sie Spezifikationen nach Vernetzung Cisco 4404 - Wireless LAN Controller herunter. Cisco 4404 - Wireless LAN Controller Specifications Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 99
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
Cisco Wireless Local Area Network (WLAN)
Access System with Integrated Wireless Intrusion
Prevention System (wIPS) Security Target
Version: 3.1
August 2013
This document provides the basis for an evaluation of a specific Target of Evaluation (TOE) .
The evaluated solution is the Cisco Unified Wireless Network (WLAN) & Wireless Intrusion
Prevention System (wIPS) release 7.0.240.0, including: Cisco Aironet 3502i, 3502e, 1262,
1252, 1142 AGN access points, 1242, 1131 AG access points, and 1524, 1522 AG and 1552
outdoor mesh access points; Cisco Wireless LAN Controller 5508; Cisco Wireless LAN
Controllers 4402, 4404 and; Cisco Wireless Integrated Services Module (WiSM), and
WiSM2. This Security Target (ST) defines a set of assumptions about the aspects of the
environment, a list of threats that the product intends to counter, a set of security objectives, a
set of security requirements, and the IT security functions provided by the TOE which meet
the set of requirements.
Seitenansicht 0
1 2 3 4 5 6 ... 98 99

Inhaltsverzeichnis

Seite 1

Cisco Wireless Local Area Network (WLAN) Access System with Integrated Wireless Intrusion Prevention System (wIPS) Security Target Versio

Seite 3

11 TSP TOE Security Policy Wi-Fi Wireless Fidelity WIDS Wireless Intrusion Detection System wIPS

Seite 5 - List of Tables

13 MSE, and syslog server) in the environment for analysis and review, and denial of traffic flo

Seite 7 - 1.3 References

15 Figure 1 depicts a sample TOE configuration, highlighting the physical boundary. The shaded p

Seite 9

17 Cisco Aironet 1131 AG Series Access Point The Cisco Aironet 1131 AG Series IEEE 802.11a/b/g

Seite 11

19 Cisco Aironet 1520 AG Series Access Point The Cisco Aironet 1520 AG Series IEEE 802.11a/b/g

Seite 14

21 succeeds before allowing any other mediate security function dealing with authentication or a

Seite 16

23 Catalyst 6500 Wireless Integrated Service Module (WiSM) and WiSM2 The WiSM and WiSM2 functi

Seite 18

25 external components such as the time server use for Controller clock updates. The APs, and

Seite 20

27 The Controller can be configured to require the APs to use the Controller’s internal database

Seite 22

29 EAP-MD5 Not supported Supported EAP-TLS Supported Not supported EAP-MSCHAPv2 Supported Not su

Seite 23 - 2.4 TOE Logical Boundary

3 6 SECURITY REQUIREMENTS ...

Seite 25 - 2.4.6 Self Protection (FPT)

31 3) FCS_BCM_(EXT).1.2 was deleted to bring the ST in conformance with current cryptography po

Seite 27

33 4 Security Problem Definition This section identifies the following:  Significant assumptio

Seite 29

35 T.UNAUTHORIZED_ACCESS A user may gain access to services (either on the TOE or by sending dat

Seite 31

37 O.CRYPTOGRAPHY_VALIDATED The TOE will use NIST FIPS 140-2 validated cryptomodules for cryptog

Seite 33 - 4.1 Assumptions

39 OE.TOE_NO_BYPASS Wireless clients are configured so that information cannot flow between a wi

Seite 36 - 5 Security Objectives

41 FIA_USB.1(1) User-subject binding (Administrator) FIA_USB.1(2) User-subject binding (Wireles

Seite 38

43 FIA_AFL.1(1) The reaching of the threshold for the unsuccessful authentication attempts and t

Seite 40

45 6.1.2 FAU_GEN.2 User Identity Association FAU_GEN.2.1 For audit events resulting from ac

Seite 42

47 functions Digital Signature Algorithm (DSA) with a key size (modulus) of [2048 bits], RSA D

Seite 44

49 mechanism for administrators and wireless LAN users. Application note: Local authenticati

Seite 45

5 List of Tables Table 1 Acronyms, Abbreviations & Definitions ...

Seite 47

51 6.1.31 FMT_MTD.1(3) Management of Authentication Data (User) FMT_MTD.1.1(3) The TSF shall

Seite 49 - Behavior

53 6.1.43 FTP_ITC_(EXT).1 Extended: Inter-TSF Trusted Channel FTP_ITC_(EXT).1.1 The TOE shall p

Seite 51

55 Application Note This IPS Data Collection SFR (IPS_SDC) is distinct from the wIPS Analysis SF

Seite 53

57 FIA_AFL.1(2) The reaching of the threshold for the unsuccessful authentication attempts and t

Seite 55

59 6.2.11 FIA_UAU_(EXT).5(2) Remote authentication mechanisms FIA_UAU_(EXT).5.1(2) The TOE IT E

Seite 58

61 ALC_TAT.1 Well-defined development tools ASE: Security Target evaluation ASE_CCL.1 Conformanc

Seite 60

63 administrators who have individually authenticated to an external entity prior to trigging an

Seite 62

65 For non-volatile memories other than EEPROM and Flash, the zeroization shall be executed by o

Seite 64

67 • EAP-FAST without client certificate: username and password • EAP-FAST with client c

Seite 66

69 FMT_MOF.1(3) The Controller administrator is able to configure (enable/disable/define/re-de

Seite 67

7 2. The Controller, hereafter referred to as the Controller or the WLC (or WiSM when distincti

Seite 69

71 configuration or in the TOEs evaluated configuration and is covered with a tamper evident lab

Seite 71

73 through the TOE by providing the ability to enable and disable the encryption policy of the T

Seite 73

75 IPS_SDC_(EXT).1 The AP analyzes wireless network traffic, performing signature matching check

Seite 75

77 ALC_DEL.1 Cisco documents the delivery procedure for the TOE to include the procedure on how

Seite 77 - 8 Rationale

79 O.ADMIN_GUIDANCE O.AUDIT_GENERATION O.CONFIGURATION_IDENTIFICATION O.CORRECT_TSF_OPERATION O

Seite 80

81 satisfies the security functional requirements. In order to ensure the TOE's design is c

Seite 82

83 P.ACCOUNTABILITY O.AUDIT_GENERATION addresses this policy by providing the administrator with

Seite 84 - Requirements

85 Table 21 TOE Security Functional Requirement to TOE Security Objectives Mapping O.ADMIN_GUID

Seite 86

87 Table 22 TOE Security Functional Requirement to TOE Security Objectives Rationale Security O

Seite 88

89 O.CRYPTOGRAPHY Baseline cryptographic services are provided in the TOE by FIPS PUB 140-2 comp

Seite 89

9 EAP Extensible Authentication Protocol EAP-TLS Extensible Authentication Protocol-Transport La

Seite 91

91 O.RESIDUAL_ INFORMATION FDP_RIP.1(1) is used to ensure the contents of resources are not avai

Seite 93

93 O.WIPS_FUNCTIONS IPS_SDC_(EXT).1 defines the types of traffic that the AP will be able to col

Seite 95 - FMT_SMF.1

95 FIA_UAU.1 No other components FIA_UID.1 Satisfied by FIA_UID.2 FIA_UAU_(EXT).5(1) No other co

Seite 97

97 FMT_MTD.1(2) FMT_SMR.1 FMT_SMF.1 This ST is based on the PP which was validated as acceptable

Seite 99

99 CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco

Kommentare zu diesen Handbüchern

Keine Kommentare