Motorola S2500 Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Networking Motorola S2500. Motorola Solutions, Inc. Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 22
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 0
National Information Assurance Partnership
Common Criteria Evaluation and Validation Scheme
Validation Report
Motorola Solutions, Inc.
Motorola Network Devices S2500, S6000, GGM 8000
with EOS Version 16.0
Report Number:
CCEVS-VR-VID10378-2012
Dated:
June 30, 2012
Version:
1.0
National Institute of Standards and Technology
Information Technology Laboratory
100 Bureau Drive
Gaithersburg, MD 20899
National Security Agency
Information Assurance Directorate
9800 Savage Road STE 6940
Fort George G. Meade, MD 20755-6940
Przeglądanie stron 0
1 2 3 4 5 6 ... 21 22

Podsumowanie treści

Strona 1 - Validation Report

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Motorola Solutions, Inc. Motorola N

Strona 2 - Acknowledgements

10 TSF data passed during administrative sessions is encrypted to prevent disclosure and is message integrity checked to assure modifications during t

Strona 3

11 T.AUDACC Persons may not be accountable for the actions that they conduct because the audit records are not reviewed, thus allowing an attacker to

Strona 4

12 Implementation Characteristics S2500 GGM 8000 S6000 CPU Internal Operating Frequency 100MHz 1GHz 1GHz Level-1 Instruction Cache Size / Structure 1

Strona 5 - 1 Executive Summary

13 The hardware platforms allow various configurations using pluggable interface modules to allow the end user to customize the available ports. The f

Strona 6

14 6.1.2 TOE Software Figure 1: Architecture Overview – Enterprise OS EOS implements the TOE security functionality. The hardware provides the user w

Strona 7 - 3 Interpretations

15  IP Packet Delay Variation (IPDV)  SCH Service – Event Schedule features (i.e.: automated backup)  Bridge service – provides transparent brid

Strona 8 - 4 Security Policy

16  Documentation that was used as evidence but is not delivered is shown in a normal typeface.  Documentation that is delivered as

Strona 9 - 4.6 Protection of TSF

17 Document Revision Date Motorola Network Router (MNR) S2500 Hardware User Guide N/A March 23, 2011 Motorola Network Router (MNR) S6000 Hardware User

Strona 10 - 5 TOE Security Environment

18 8.4 Test Documentation Document Revision Date NIAP Security Certification of Motorola Network Transport Gateway Functional Test Plan 4.1 January

Strona 11 - 6 Architectural Information

19 9.2 Evaluation Team Independent Testing The Evaluation Team conducted independent testing of the TOE. The Evaluation Team installed the TOE acco

Strona 12

2 Acknowledgements Validation Panel Dr. Patrick W. Mallett, Lead Scientist The MITRE Corporation McLean, VA Dr. Jerome F. Myers, Senior Engineering

Strona 13

20 criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 3. The evaluation methodol

Strona 14 - 7 Clarification of Scope

21 NIST National Institute of Standards and Technology OCSP Online Certificate Status Protocol PP Protection Profile SF Security Functions SFR Se

Strona 15 - 8 Documentation

22 a particular MIB object to perform specific functions and operates at the protocol data unit (PDU) level. 14 Bibliography [1] Common Criteria

Strona 16 - 8.2 Guidance Documentation

3 Table of Contents 1 Executive Summary ... 5 2 Identification o

Strona 17

4 9.1 Developer Testing ... 18 9.2 Evaluation

Strona 18 - 9 IT Product Testing

5 1 Executive Summary This report documents the Validation Panel’s assessment of the CCEVS evaluation of the Motorola Network Devices S25

Strona 19 - 10 Results of the Evaluation

6 The S6000 series can also be used to maintain connectivity among small, midsize, and large Local Area networks via a wide variet

Strona 20 - 13 Terms

7 2 Identification of the TOE Table 2 provides information needed to completely identify the product, including:  The Target of Evaluation (TOE),

Strona 21 - 13.2 Terminology

8 August 27, 2009. 4 Security Policy This section contains the product features and denotes which are within the logical boundaries of the TOE. The f

Strona 22 - 14 Bibliography

9  MotoMaster (full read/write access, except for passphrases) 4.3 User Data Protection: Flow Control The TOE mediates traffic passed through the d

Komentarze do niniejszej Instrukcji

Brak uwag