Avocent SwitchView(R)SC440 Manual do Utilizador Página 1

Consulte online ou descarregue Manual do Utilizador para Comutadores de rede Avocent SwitchView(R)SC440. Certification Report Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 25
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 0
National Information Assurance Partnership
Common Criteria Evaluation and Validation Scheme
Validation Report
Argon Corp Ruggedized KVM Switch Part Number 90731
Report Number: CCEVS-VR-10435-2011
Dated: 20 May 2011
Version: 1.0
National Institute of Standards and Technology Department of Defense
Information Technology Laboratory National Security Agency
100 Bureau Drive 9800 Savage Road Suite 6940
Gaithersburg, MD 20899 Fort Meade, MD 20755-6940
®
TM
Vista de página 0
1 2 3 4 5 6 ... 24 25

Resumo do Conteúdo

Página 1 -

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Argon Corp Ruggedized KVM

Página 2

4. ASSUMPTIONS 4.1 Physical Security Assumptions A key environmental assumption is physical security, for it is assumed appropriate phys

Página 3

GROUP with an ID other than the selected one T.TRANSFER A CONNECTION, via the TOE, between COMPUTERS may allow information transfer. 4.5 Organization

Página 4 - 1. EXECUTIVE SUMMARY

5. ARCHITECTURAL INFORMATION 5.1 Logical Scope and Boundary The TOE logical scope and boundary consists of the security functions/features

Página 5 - 1.1 Interpretations

Figure 1: Depiction of TOE Deployment A B C D

Página 6 - 2. IDENTIFICATION

6. DOCUMENTATION This section details the documentation that is (a) delivered to the customer, and (b) was used as evidence for the evaluation of the

Página 7

7. IT PRODUCT TESTING This section describes the testing efforts of the Developer and the evaluation team. 7.1 Developer Testing Test procedures

Página 8 - 3. SECURITY POLICY

Note: 1. Four-button remote set-up is illustrated. Omit computers C and D with two-button remote. 2. Laptop screens serve as

Página 9

7.2 Evaluation Team Independent Testing The evaluation team conducted independent testing both at the CCTL and the Developer’s facilities.

Página 10 - 4. ASSUMPTIONS

possible without disassembly of the TOE, thus penetration is not possible via the product control, i.e., user/administrator interfaces. Additional

Página 11 - T.TRANSFER

8. EVALUATED CONFIGURATION The evaluated configuration of the Argon Corp Ruggedized KVM Switch Part Number 90731, as defined in the Security Target,

Página 13 - A B C D

9. RESULTS OF THE EVALUATION The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes

Página 14

10. VALIDATOR COMMENTS It should be noted that Precedent Decision -138 affects the Protection Profile that this TOE conforms with. The customer

Página 16

12. SECURITY TARGET Argon Corp Ruggedized KVM Switch Security Target, Document Version .11, May 3, 2011

Página 17 - 7.3 Vulnerability Analysis

13. GLOSSARY  Administrator: Role applied to user with full access to all aspects of the Cybex SwitchView SC Series Switches.  Attack: An atta

Página 18

14. BIBLIOGRAPHY 1.) Common Criteria for Information Technology Security Evaluation – Part 1: Introduction and general model, dated Septemb

Página 19 - 8. EVALUATED CONFIGURATION

ACKNOWLEDGEMENTS Validation Team Mario Tinto The Aerospace Corporation Columbia, MD Rick Murphy Noblis Falls Church, VA Common Criteria Testing

Página 20

1. EXECUTIVE SUMMARY This report is intended to assist the end-user of this product and any security certification Agent for the end-user with determ

Página 21 - 10. VALIDATOR COMMENTS

The TOE is a peripheral sharing switch. The physical boundary of the TOE consists of one Argon switch and one of three remote controls (see Table 1:

Página 22 - 11. ANNEXES

2. IDENTIFICATION The CCEVS is a joint National Security Agency (NSA) and National Institute of Standards and Technology (NIST) effort to

Página 23 - 12. SECURITY TARGET

Table 2: Evaluation Identifiers Item Identifier Evaluation Scheme United States NIAP Common Criteria Evaluation and Validation Scheme Target of Evalu

Página 24 - 13. GLOSSARY

3. SECURITY POLICY The TOE enforces the following security policies: 3.1 Data Separation Policy The TOE implements the Data Separation Security Fu

Página 25 - 14. BIBLIOGRAPHY

switches that allow the human user to explicitly determine to which computer the shared set of peripherals is connected. This connection is visually d

Comentários a estes Manuais

Sem comentários