Cisco IPS4345 Manual de usuario Pagina 2

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 61
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 1
Cisco Intrusion Prevention System Security Target
2
Table of Contents
1 SECURITY TARGET INTRODUCTION ............................................................................. 7
1.1 ST and TOE Reference ................................................................................................... 7
1.2 TOE Overview ................................................................................................................ 8
1.2.1 TOE Product Type ...................................................................................................... 8
1.2.2 TOE Components........................................................................................................ 9
1.2.3 Non-TOE Components ............................................................................................. 10
1.2.4 Supported non-TOE Hardware/ Software/ Firmware ............................................... 12
1.3 TOE DESCRIPTION .................................................................................................... 12
1.4 TOE Evaluated Configuration ...................................................................................... 14
1.5 Physical Scope of the TOE ........................................................................................... 14
1.6 Logical Scope of the TOE............................................................................................. 15
1.6.1 Security audit ............................................................................................................ 15
1.6.2 Cryptographic support .............................................................................................. 16
1.6.3 Full residual information protection ......................................................................... 16
1.6.4 Identification and authentication............................................................................... 16
1.6.5 Security Management ............................................................................................... 16
1.6.6 Protection of the TSF ................................................................................................ 17
1.6.7 TOE Access .............................................................................................................. 17
1.6.8 Trusted path/Channels .............................................................................................. 17
1.7 Excluded Functionality ................................................................................................. 17
2 Conformance Claims ............................................................................................................. 19
2.1 Common Criteria Conformance Claim ......................................................................... 19
2.2 Protection Profile Conformance ................................................................................... 19
2.2.1 Protection Profile Refinements ................................................................................. 19
2.3 Protection Profile Conformance Claim Rationale ........................................................ 19
2.3.1 TOE Appropriateness................................................................................................ 19
2.3.2 TOE Security Problem Definition Consistency ........................................................ 19
2.3.3 Statement of Security Requirements Consistency .................................................... 20
3 SECURITY PROBLEM DEFINITION ................................................................................ 21
3.1 Assumptions .................................................................................................................. 21
3.2 Threats........................................................................................................................... 22
3.3 Organizational Security Policies ................................................................................... 22
4 SECURITY OBJECTIVES ................................................................................................... 23
4.1 Security Objectives for the TOE ................................................................................... 23
4.2 Security Objectives for the Environment ...................................................................... 24
4.3 Security objectives rationale ......................................................................................... 24
4.3.1 Tracing of security objectives to SPD ...................................................................... 24
Vista de pagina 1
1 2 3 4 5 6 7 ... 60 61

Comentarios a estos manuales

Sin comentarios