Cisco IPS4345 Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Mise en réseau Cisco IPS4345. Security Target - Common Criteria Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer

Résumé du contenu

Page 1 - July, 2013

Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA © 2013 Cisco Systems, Inc. This document can be repr

Page 2 - Table of Contents

Cisco Intrusion Prevention

Page 3

Cisco Intrusion Prevention System Security Target 11 1.2.3.2 Cisco ASA 5500-X The Cisco ASA 5500-X Series midrange security appliances includ

Page 4 - List of Figures

Cisco Intrusion Prevention

Page 5 - List of Acronyms

Cisco Intrusion Prevention System Security Target 13 Figure 1 Example TOE Deployment The figure above includes the following:  Several e

Page 6 - DOCUMENT INTRODUCTION

Cisco Intrusion Prevention

Page 7 - 1.1 ST and TOE Reference

Cisco Intrusion Prevention System Security Target 15 Hardware/Software Picture Size (H x W X D) Interfaces Cisco ASA 5555-X IPS Note: This is

Page 8 - 1.2.1 TOE Product Type

Cisco Intrusion Prevention

Page 9 - 1.2.2 TOE Components

Cisco Intrusion Prevention System Security Target 17 1.6.6 Protection of the TSF The TOE protects against interference and tampering by untru

Page 10 - 1.2.3 Non-TOE Components

Cisco Intrusion Prevention

Page 11

Cisco Intrusion Prevention System Security Target 19 2 CONFORMANCE CLAIMS 2.1 Common Criteria Conformance Claim The TOE and ST are compliant

Page 12 - 1.3 TOE DESCRIPTION

Cisco Intrusion Prevention

Page 13

Cisco Intrusion Prevention

Page 14

Cisco Intrusion Prevention System Security Target 21 3 SECURITY PROBLEM DEFINITION This chapter identifies the following:  Significant ass

Page 15 - Security audit

Cisco Intrusion Prevention

Page 16 - Security Management

Cisco Intrusion Prevention System Security Target 23 4 SECURITY OBJECTIVES This Chapter identifies the security objectives of the TOE and th

Page 17 - 1.6.7 TOE Access

Cisco Intrusion Prevention

Page 18

Cisco Intrusion Prevention System Security Target 25 A.NO_GENERAL_PURPOSE A.PHYSICAL A.TRUSTED_ADMIN T.UNAUTHORIZED_ACCESS T.UNAUTHORIZED_UPD

Page 19 - 2 CONFORMANCE CLAIMS

Cisco Intrusion Prevention

Page 20

Cisco Intrusion Prevention System Security Target 27 5 SECURITY REQUIREMENTS This section identifies the Security Functional Requirements for

Page 21 - 3.1 Assumptions

Cisco Intrusion Prevention

Page 22 - 3.2 Threats

Cisco Intrusion Prevention System Security Target 29 Table 17 Auditable Events SFR Auditable Event Additional Audit Record Contents Security

Page 23 - 4 SECURITY OBJECTIVES

Cisco Intrusion Prevention System Security Target 3 4.3.2 Justification of tracing...

Page 24

Cisco Intrusion Prevention

Page 25

Cisco Intrusion Prevention System Security Target 31 5.2.2.3 FCS_COP.1(1) Cryptographic Operation (for data encryption/decryption) FCS_COP.1

Page 26

Cisco Intrusion Prevention

Page 27 - 5 SECURITY REQUIREMENTS

Cisco Intrusion Prevention System Security Target 33 5.2.3 User data protection (FDP) 5.2.3.1 FDP_RIP.2 Full Residual Information Protectio

Page 28 - 5.2.1 Security audit (FAU)

Cisco Intrusion Prevention

Page 29

Cisco Intrusion Prevention System Security Target 35 5.2.6.4 FPT_TUD_(EXT).1 Extended: Trusted Update FPT_TUD_(EXT).1.1 The TSF shall provide

Page 30

Cisco Intrusion Prevention

Page 31 - "The Keyed-Hash

Cisco Intrusion Prevention System Security Target 37 5.4 SFR Dependencies Rationale Functional component FCS_COP.1 depends on the following

Page 32

Cisco Intrusion Prevention

Page 33

Cisco Intrusion Prevention System Security Target 39 5.5 Security Assurance Requirements 5.5.1 SAR Requirements The TOE assurance requiremen

Page 34

Cisco Intrusion Prevention

Page 35

Cisco Intrusion Prevention

Page 36

Cisco Intrusion Prevention System Security Target 41 6 TOE SUMMARY SPECIFICATION 6.1 Security Requirements Rationale Table 22: Security Re

Page 37

Cisco Intrusion Prevention

Page 38

Cisco Intrusion Prevention System Security Target 43 TOE SFRs How the SFR is Satisfied the event occurred, the outcome of the event, and the t

Page 39 - 5.5.3 Assurance Measures

Cisco Intrusion Prevention

Page 40

Cisco Intrusion Prevention System Security Target 45 TOE SFRs How the SFR is Satisfied password length is settable by the Authorized Administr

Page 41 - 6 TOE SUMMARY SPECIFICATION

Cisco Intrusion Prevention

Page 42

Cisco Intrusion Prevention System Security Target 47 TOE SFRs How the SFR is Satisfied tests will cause the device to shut down and restart th

Page 43

Cisco Intrusion Prevention

Page 44

Cisco Intrusion Prevention System Security Target 49 7 SUPPLEMENTAL CRYPTOGRAPHIC INFORMATION 7.1 Key Zeroization The following table descri

Page 45

Cisco Intrusion Prevention System Security Target 5 List of Acronyms The following acronyms and abbreviations are common and may be used in t

Page 46

Cisco Intrusion Prevention

Page 47

Cisco Intrusion Prevention System Security Target 51 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant

Page 48

Cisco Intrusion Prevention

Page 49 - 7.1 Key Zeroization

Cisco Intrusion Prevention System Security Target 53 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant

Page 50

Cisco Intrusion Prevention

Page 51

Cisco Intrusion Prevention System Security Target 55 Section Exceptions to Shall/Shall Not Statement(s) Should (Not) Statements1 TOE Compliant

Page 52

Cisco Intrusion Prevention

Page 53

Cisco Intrusion Prevention System Security Target 57 Section Shall/Shall Not Statement(s) Should (Not) Statements2 TOE Compliant? Rationale 6.

Page 54

Cisco Intrusion Prevention

Page 55

Cisco Intrusion Prevention System Security Target 59 Section Shall/Shall Not Statement(s) Should (Not) Statements2 TOE Compliant? Rationale Sc

Page 56

Cisco Intrusion Prevention

Page 57

Cisco Intrusion Prevention

Page 58

Cisco Intrusion Prevention System Security Target 61 8 ANNEX A: REFERENCES The following documentation was used to prepare this ST. Table 2

Page 59

Cisco Intrusion Prevention System Security Target 7 1 SECURITY TARGET INTRODUCTION The Security Target contains the following sections:  Se

Page 60

Cisco Intrusion Prevention

Page 61 - 8 ANNEX A: REFERENCES

Cisco Intrusion Prevention System Security Target 9 functionality independent of another traffic filtering device such as a firewall or router

Commentaires sur ces manuels

Pas de commentaire