Cisco IPS4345 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Vernetzung Cisco IPS4345 herunter. Security Target - Common Criteria Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - July, 2013

Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA © 2013 Cisco Systems, Inc. This document can be repr

Seite 2 - Table of Contents

Cisco Intrusion Prevention

Seite 3

Cisco Intrusion Prevention System Security Target 11 1.2.3.2 Cisco ASA 5500-X The Cisco ASA 5500-X Series midrange security appliances includ

Seite 4 - List of Figures

Cisco Intrusion Prevention

Seite 5 - List of Acronyms

Cisco Intrusion Prevention System Security Target 13 Figure 1 Example TOE Deployment The figure above includes the following:  Several e

Seite 6 - DOCUMENT INTRODUCTION

Cisco Intrusion Prevention

Seite 7 - 1.1 ST and TOE Reference

Cisco Intrusion Prevention System Security Target 15 Hardware/Software Picture Size (H x W X D) Interfaces Cisco ASA 5555-X IPS Note: This is

Seite 8 - 1.2.1 TOE Product Type

Cisco Intrusion Prevention

Seite 9 - 1.2.2 TOE Components

Cisco Intrusion Prevention System Security Target 17 1.6.6 Protection of the TSF The TOE protects against interference and tampering by untru

Seite 10 - 1.2.3 Non-TOE Components

Cisco Intrusion Prevention

Seite 11

Cisco Intrusion Prevention System Security Target 19 2 CONFORMANCE CLAIMS 2.1 Common Criteria Conformance Claim The TOE and ST are compliant

Seite 12 - 1.3 TOE DESCRIPTION

Cisco Intrusion Prevention

Seite 13

Cisco Intrusion Prevention

Seite 14

Cisco Intrusion Prevention System Security Target 21 3 SECURITY PROBLEM DEFINITION This chapter identifies the following:  Significant ass

Seite 15 - Security audit

Cisco Intrusion Prevention

Seite 16 - Security Management

Cisco Intrusion Prevention System Security Target 23 4 SECURITY OBJECTIVES This Chapter identifies the security objectives of the TOE and th

Seite 17 - 1.6.7 TOE Access

Cisco Intrusion Prevention

Seite 18

Cisco Intrusion Prevention System Security Target 25 A.NO_GENERAL_PURPOSE A.PHYSICAL A.TRUSTED_ADMIN T.UNAUTHORIZED_ACCESS T.UNAUTHORIZED_UPD

Seite 19 - 2 CONFORMANCE CLAIMS

Cisco Intrusion Prevention

Seite 20

Cisco Intrusion Prevention System Security Target 27 5 SECURITY REQUIREMENTS This section identifies the Security Functional Requirements for

Seite 21 - 3.1 Assumptions

Cisco Intrusion Prevention

Seite 22 - 3.2 Threats

Cisco Intrusion Prevention System Security Target 29 Table 17 Auditable Events SFR Auditable Event Additional Audit Record Contents Security

Seite 23 - 4 SECURITY OBJECTIVES

Cisco Intrusion Prevention System Security Target 3 4.3.2 Justification of tracing...

Seite 24

Cisco Intrusion Prevention

Seite 25

Cisco Intrusion Prevention System Security Target 31 5.2.2.3 FCS_COP.1(1) Cryptographic Operation (for data encryption/decryption) FCS_COP.1

Seite 26

Cisco Intrusion Prevention

Seite 27 - 5 SECURITY REQUIREMENTS

Cisco Intrusion Prevention System Security Target 33 5.2.3 User data protection (FDP) 5.2.3.1 FDP_RIP.2 Full Residual Information Protectio

Seite 28 - 5.2.1 Security audit (FAU)

Cisco Intrusion Prevention

Seite 29

Cisco Intrusion Prevention System Security Target 35 5.2.6.4 FPT_TUD_(EXT).1 Extended: Trusted Update FPT_TUD_(EXT).1.1 The TSF shall provide

Seite 30

Cisco Intrusion Prevention

Seite 31 - "The Keyed-Hash

Cisco Intrusion Prevention System Security Target 37 5.4 SFR Dependencies Rationale Functional component FCS_COP.1 depends on the following

Seite 32

Cisco Intrusion Prevention

Seite 33

Cisco Intrusion Prevention System Security Target 39 5.5 Security Assurance Requirements 5.5.1 SAR Requirements The TOE assurance requiremen

Seite 34

Cisco Intrusion Prevention

Seite 35

Cisco Intrusion Prevention

Seite 36

Cisco Intrusion Prevention System Security Target 41 6 TOE SUMMARY SPECIFICATION 6.1 Security Requirements Rationale Table 22: Security Re

Seite 37

Cisco Intrusion Prevention

Seite 38

Cisco Intrusion Prevention System Security Target 43 TOE SFRs How the SFR is Satisfied the event occurred, the outcome of the event, and the t

Seite 39 - 5.5.3 Assurance Measures

Cisco Intrusion Prevention

Seite 40

Cisco Intrusion Prevention System Security Target 45 TOE SFRs How the SFR is Satisfied password length is settable by the Authorized Administr

Seite 41 - 6 TOE SUMMARY SPECIFICATION

Cisco Intrusion Prevention

Seite 42

Cisco Intrusion Prevention System Security Target 47 TOE SFRs How the SFR is Satisfied tests will cause the device to shut down and restart th

Seite 43

Cisco Intrusion Prevention

Seite 44

Cisco Intrusion Prevention System Security Target 49 7 SUPPLEMENTAL CRYPTOGRAPHIC INFORMATION 7.1 Key Zeroization The following table descri

Seite 45

Cisco Intrusion Prevention System Security Target 5 List of Acronyms The following acronyms and abbreviations are common and may be used in t

Seite 46

Cisco Intrusion Prevention

Seite 47

Cisco Intrusion Prevention System Security Target 51 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant

Seite 48

Cisco Intrusion Prevention

Seite 49 - 7.1 Key Zeroization

Cisco Intrusion Prevention System Security Target 53 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant

Seite 50

Cisco Intrusion Prevention

Seite 51

Cisco Intrusion Prevention System Security Target 55 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant

Seite 52

Cisco Intrusion Prevention

Seite 53

Cisco Intrusion Prevention System Security Target 57 Section Shall/Shall Not Statement(s) Should (Not) Statements2 TOE Compliant? Rationale 6.

Seite 54

Cisco Intrusion Prevention

Seite 55

Cisco Intrusion Prevention System Security Target 59 Section Shall/Shall Not Statement(s) Should (Not) Statements2 TOE Compliant? Rationale Sc

Seite 56

Cisco Intrusion Prevention

Seite 57

Cisco Intrusion Prevention

Seite 58

Cisco Intrusion Prevention System Security Target 61 8 ANNEX A: REFERENCES The following documentation was used to prepare this ST. Table 2

Seite 59

Cisco Intrusion Prevention System Security Target 7 1 SECURITY TARGET INTRODUCTION The Security Target contains the following sections:  Se

Seite 60

Cisco Intrusion Prevention

Seite 61 - 8 ANNEX A: REFERENCES

Cisco Intrusion Prevention System Security Target 9 functionality independent of another traffic filtering device such as a firewall or router

Kommentare zu diesen Handbüchern

Keine Kommentare