Avocent SwitchView(R)SC440 Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Switche sieciowe Avocent SwitchView(R)SC440. Certification Report Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 25
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 0
National Information Assurance Partnership
Common Criteria Evaluation and Validation Scheme
Validation Report
Argon Corp Ruggedized KVM Switch Part Number 90731
Report Number: CCEVS-VR-10435-2011
Dated: 20 May 2011
Version: 1.0
National Institute of Standards and Technology Department of Defense
Information Technology Laboratory National Security Agency
100 Bureau Drive 9800 Savage Road Suite 6940
Gaithersburg, MD 20899 Fort Meade, MD 20755-6940
®
TM
Przeglądanie stron 0
1 2 3 4 5 6 ... 24 25

Podsumowanie treści

Strona 1 -

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Argon Corp Ruggedized KVM

Strona 2

4. ASSUMPTIONS 4.1 Physical Security Assumptions A key environmental assumption is physical security, for it is assumed appropriate phys

Strona 3

GROUP with an ID other than the selected one T.TRANSFER A CONNECTION, via the TOE, between COMPUTERS may allow information transfer. 4.5 Organization

Strona 4 - 1. EXECUTIVE SUMMARY

5. ARCHITECTURAL INFORMATION 5.1 Logical Scope and Boundary The TOE logical scope and boundary consists of the security functions/features

Strona 5 - 1.1 Interpretations

Figure 1: Depiction of TOE Deployment A B C D

Strona 6 - 2. IDENTIFICATION

6. DOCUMENTATION This section details the documentation that is (a) delivered to the customer, and (b) was used as evidence for the evaluation of the

Strona 7

7. IT PRODUCT TESTING This section describes the testing efforts of the Developer and the evaluation team. 7.1 Developer Testing Test procedures

Strona 8 - 3. SECURITY POLICY

Note: 1. Four-button remote set-up is illustrated. Omit computers C and D with two-button remote. 2. Laptop screens serve as

Strona 9

7.2 Evaluation Team Independent Testing The evaluation team conducted independent testing both at the CCTL and the Developer’s facilities.

Strona 10 - 4. ASSUMPTIONS

possible without disassembly of the TOE, thus penetration is not possible via the product control, i.e., user/administrator interfaces. Additional

Strona 11 - T.TRANSFER

8. EVALUATED CONFIGURATION The evaluated configuration of the Argon Corp Ruggedized KVM Switch Part Number 90731, as defined in the Security Target,

Strona 13 - A B C D

9. RESULTS OF THE EVALUATION The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes

Strona 14

10. VALIDATOR COMMENTS It should be noted that Precedent Decision -138 affects the Protection Profile that this TOE conforms with. The customer

Strona 16

12. SECURITY TARGET Argon Corp Ruggedized KVM Switch Security Target, Document Version .11, May 3, 2011

Strona 17 - 7.3 Vulnerability Analysis

13. GLOSSARY  Administrator: Role applied to user with full access to all aspects of the Cybex SwitchView SC Series Switches.  Attack: An atta

Strona 18

14. BIBLIOGRAPHY 1.) Common Criteria for Information Technology Security Evaluation – Part 1: Introduction and general model, dated Septemb

Strona 19 - 8. EVALUATED CONFIGURATION

ACKNOWLEDGEMENTS Validation Team Mario Tinto The Aerospace Corporation Columbia, MD Rick Murphy Noblis Falls Church, VA Common Criteria Testing

Strona 20

1. EXECUTIVE SUMMARY This report is intended to assist the end-user of this product and any security certification Agent for the end-user with determ

Strona 21 - 10. VALIDATOR COMMENTS

The TOE is a peripheral sharing switch. The physical boundary of the TOE consists of one Argon switch and one of three remote controls (see Table 1:

Strona 22 - 11. ANNEXES

2. IDENTIFICATION The CCEVS is a joint National Security Agency (NSA) and National Institute of Standards and Technology (NIST) effort to

Strona 23 - 12. SECURITY TARGET

Table 2: Evaluation Identifiers Item Identifier Evaluation Scheme United States NIAP Common Criteria Evaluation and Validation Scheme Target of Evalu

Strona 24 - 13. GLOSSARY

3. SECURITY POLICY The TOE enforces the following security policies: 3.1 Data Separation Policy The TOE implements the Data Separation Security Fu

Strona 25 - 14. BIBLIOGRAPHY

switches that allow the human user to explicitly determine to which computer the shared set of peripherals is connected. This connection is visually d

Komentarze do niniejszej Instrukcji

Brak uwag