Avocent SwitchView(R)SC440 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Síťové přepínače Avocent SwitchView(R)SC440. Certification Report Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 25
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
National Information Assurance Partnership
Common Criteria Evaluation and Validation Scheme
Validation Report
Argon Corp Ruggedized KVM Switch Part Number 90731
Report Number: CCEVS-VR-10435-2011
Dated: 20 May 2011
Version: 1.0
National Institute of Standards and Technology Department of Defense
Information Technology Laboratory National Security Agency
100 Bureau Drive 9800 Savage Road Suite 6940
Gaithersburg, MD 20899 Fort Meade, MD 20755-6940
®
TM
Zobrazit stránku 0
1 2 3 4 5 6 ... 24 25

Shrnutí obsahu

Strany 1 -

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Argon Corp Ruggedized KVM

Strany 2

4. ASSUMPTIONS 4.1 Physical Security Assumptions A key environmental assumption is physical security, for it is assumed appropriate phys

Strany 3

GROUP with an ID other than the selected one T.TRANSFER A CONNECTION, via the TOE, between COMPUTERS may allow information transfer. 4.5 Organization

Strany 4 - 1. EXECUTIVE SUMMARY

5. ARCHITECTURAL INFORMATION 5.1 Logical Scope and Boundary The TOE logical scope and boundary consists of the security functions/features

Strany 5 - 1.1 Interpretations

Figure 1: Depiction of TOE Deployment A B C D

Strany 6 - 2. IDENTIFICATION

6. DOCUMENTATION This section details the documentation that is (a) delivered to the customer, and (b) was used as evidence for the evaluation of the

Strany 7

7. IT PRODUCT TESTING This section describes the testing efforts of the Developer and the evaluation team. 7.1 Developer Testing Test procedures

Strany 8 - 3. SECURITY POLICY

Note: 1. Four-button remote set-up is illustrated. Omit computers C and D with two-button remote. 2. Laptop screens serve as

Strany 9

7.2 Evaluation Team Independent Testing The evaluation team conducted independent testing both at the CCTL and the Developer’s facilities.

Strany 10 - 4. ASSUMPTIONS

possible without disassembly of the TOE, thus penetration is not possible via the product control, i.e., user/administrator interfaces. Additional

Strany 11 - T.TRANSFER

8. EVALUATED CONFIGURATION The evaluated configuration of the Argon Corp Ruggedized KVM Switch Part Number 90731, as defined in the Security Target,

Strany 13 - A B C D

9. RESULTS OF THE EVALUATION The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes

Strany 14

10. VALIDATOR COMMENTS It should be noted that Precedent Decision -138 affects the Protection Profile that this TOE conforms with. The customer

Strany 16

12. SECURITY TARGET Argon Corp Ruggedized KVM Switch Security Target, Document Version .11, May 3, 2011

Strany 17 - 7.3 Vulnerability Analysis

13. GLOSSARY  Administrator: Role applied to user with full access to all aspects of the Cybex SwitchView SC Series Switches.  Attack: An atta

Strany 18

14. BIBLIOGRAPHY 1.) Common Criteria for Information Technology Security Evaluation – Part 1: Introduction and general model, dated Septemb

Strany 19 - 8. EVALUATED CONFIGURATION

ACKNOWLEDGEMENTS Validation Team Mario Tinto The Aerospace Corporation Columbia, MD Rick Murphy Noblis Falls Church, VA Common Criteria Testing

Strany 20

1. EXECUTIVE SUMMARY This report is intended to assist the end-user of this product and any security certification Agent for the end-user with determ

Strany 21 - 10. VALIDATOR COMMENTS

The TOE is a peripheral sharing switch. The physical boundary of the TOE consists of one Argon switch and one of three remote controls (see Table 1:

Strany 22 - 11. ANNEXES

2. IDENTIFICATION The CCEVS is a joint National Security Agency (NSA) and National Institute of Standards and Technology (NIST) effort to

Strany 23 - 12. SECURITY TARGET

Table 2: Evaluation Identifiers Item Identifier Evaluation Scheme United States NIAP Common Criteria Evaluation and Validation Scheme Target of Evalu

Strany 24 - 13. GLOSSARY

3. SECURITY POLICY The TOE enforces the following security policies: 3.1 Data Separation Policy The TOE implements the Data Separation Security Fu

Strany 25 - 14. BIBLIOGRAPHY

switches that allow the human user to explicitly determine to which computer the shared set of peripherals is connected. This connection is visually d

Komentáře k této Příručce

Žádné komentáře