Avocent SwitchView(R)SC440 Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Commutateurs de réseau Avocent SwitchView(R)SC440. Certification Report Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 25
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
National Information Assurance Partnership
Common Criteria Evaluation and Validation Scheme
Validation Report
Argon Corp Ruggedized KVM Switch Part Number 90731
Report Number: CCEVS-VR-10435-2011
Dated: 20 May 2011
Version: 1.0
National Institute of Standards and Technology Department of Defense
Information Technology Laboratory National Security Agency
100 Bureau Drive 9800 Savage Road Suite 6940
Gaithersburg, MD 20899 Fort Meade, MD 20755-6940
®
TM
Vue de la page 0
1 2 3 4 5 6 ... 24 25

Résumé du contenu

Page 1 -

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Argon Corp Ruggedized KVM

Page 2

4. ASSUMPTIONS 4.1 Physical Security Assumptions A key environmental assumption is physical security, for it is assumed appropriate phys

Page 3

GROUP with an ID other than the selected one T.TRANSFER A CONNECTION, via the TOE, between COMPUTERS may allow information transfer. 4.5 Organization

Page 4 - 1. EXECUTIVE SUMMARY

5. ARCHITECTURAL INFORMATION 5.1 Logical Scope and Boundary The TOE logical scope and boundary consists of the security functions/features

Page 5 - 1.1 Interpretations

Figure 1: Depiction of TOE Deployment A B C D

Page 6 - 2. IDENTIFICATION

6. DOCUMENTATION This section details the documentation that is (a) delivered to the customer, and (b) was used as evidence for the evaluation of the

Page 7

7. IT PRODUCT TESTING This section describes the testing efforts of the Developer and the evaluation team. 7.1 Developer Testing Test procedures

Page 8 - 3. SECURITY POLICY

Note: 1. Four-button remote set-up is illustrated. Omit computers C and D with two-button remote. 2. Laptop screens serve as

Page 9

7.2 Evaluation Team Independent Testing The evaluation team conducted independent testing both at the CCTL and the Developer’s facilities.

Page 10 - 4. ASSUMPTIONS

possible without disassembly of the TOE, thus penetration is not possible via the product control, i.e., user/administrator interfaces. Additional

Page 11 - T.TRANSFER

8. EVALUATED CONFIGURATION The evaluated configuration of the Argon Corp Ruggedized KVM Switch Part Number 90731, as defined in the Security Target,

Page 13 - A B C D

9. RESULTS OF THE EVALUATION The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes

Page 14

10. VALIDATOR COMMENTS It should be noted that Precedent Decision -138 affects the Protection Profile that this TOE conforms with. The customer

Page 16

12. SECURITY TARGET Argon Corp Ruggedized KVM Switch Security Target, Document Version .11, May 3, 2011

Page 17 - 7.3 Vulnerability Analysis

13. GLOSSARY  Administrator: Role applied to user with full access to all aspects of the Cybex SwitchView SC Series Switches.  Attack: An atta

Page 18

14. BIBLIOGRAPHY 1.) Common Criteria for Information Technology Security Evaluation – Part 1: Introduction and general model, dated Septemb

Page 19 - 8. EVALUATED CONFIGURATION

ACKNOWLEDGEMENTS Validation Team Mario Tinto The Aerospace Corporation Columbia, MD Rick Murphy Noblis Falls Church, VA Common Criteria Testing

Page 20

1. EXECUTIVE SUMMARY This report is intended to assist the end-user of this product and any security certification Agent for the end-user with determ

Page 21 - 10. VALIDATOR COMMENTS

The TOE is a peripheral sharing switch. The physical boundary of the TOE consists of one Argon switch and one of three remote controls (see Table 1:

Page 22 - 11. ANNEXES

2. IDENTIFICATION The CCEVS is a joint National Security Agency (NSA) and National Institute of Standards and Technology (NIST) effort to

Page 23 - 12. SECURITY TARGET

Table 2: Evaluation Identifiers Item Identifier Evaluation Scheme United States NIAP Common Criteria Evaluation and Validation Scheme Target of Evalu

Page 24 - 13. GLOSSARY

3. SECURITY POLICY The TOE enforces the following security policies: 3.1 Data Separation Policy The TOE implements the Data Separation Security Fu

Page 25 - 14. BIBLIOGRAPHY

switches that allow the human user to explicitly determine to which computer the shared set of peripherals is connected. This connection is visually d

Commentaires sur ces manuels

Pas de commentaire