
Cisco Intrusion Prevention System Security Target
Table of Contents
1 SECURITY TARGET INTRODUCTION ............................................................................. 7
1.1 ST and TOE Reference ................................................................................................... 7
1.2 TOE Overview ................................................................................................................ 8
1.2.1 TOE Product Type ...................................................................................................... 8
1.2.2 TOE Components........................................................................................................ 9
1.2.3 Non-TOE Components ............................................................................................. 10
1.2.4 Supported non-TOE Hardware/ Software/ Firmware ............................................... 12
1.3 TOE DESCRIPTION .................................................................................................... 12
1.4 TOE Evaluated Configuration ...................................................................................... 14
1.5 Physical Scope of the TOE ........................................................................................... 14
1.6 Logical Scope of the TOE............................................................................................. 15
1.6.1 Security audit ............................................................................................................ 15
1.6.2 Cryptographic support .............................................................................................. 16
1.6.3 Full residual information protection ......................................................................... 16
1.6.4 Identification and authentication............................................................................... 16
1.6.5 Security Management ............................................................................................... 16
1.6.6 Protection of the TSF ................................................................................................ 17
1.6.7 TOE Access .............................................................................................................. 17
1.6.8 Trusted path/Channels .............................................................................................. 17
1.7 Excluded Functionality ................................................................................................. 17
2 Conformance Claims ............................................................................................................. 19
2.1 Common Criteria Conformance Claim ......................................................................... 19
2.2 Protection Profile Conformance ................................................................................... 19
2.2.1 Protection Profile Refinements ................................................................................. 19
2.3 Protection Profile Conformance Claim Rationale ........................................................ 19
2.3.1 TOE Appropriateness................................................................................................ 19
2.3.2 TOE Security Problem Definition Consistency ........................................................ 19
2.3.3 Statement of Security Requirements Consistency .................................................... 20
3 SECURITY PROBLEM DEFINITION ................................................................................ 21
3.1 Assumptions .................................................................................................................. 21
3.2 Threats........................................................................................................................... 22
3.3 Organizational Security Policies ................................................................................... 22
4 SECURITY OBJECTIVES ................................................................................................... 23
4.1 Security Objectives for the TOE ................................................................................... 23
4.2 Security Objectives for the Environment ...................................................................... 24
4.3 Security objectives rationale ......................................................................................... 24
4.3.1 Tracing of security objectives to SPD ...................................................................... 24
Comentarios a estos manuales