Motorola S2500 Manuale Utente

Navigare online o scaricare Manuale Utente per Networking Motorola S2500. Motorola Solutions, Inc. Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 22
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 0
National Information Assurance Partnership
Common Criteria Evaluation and Validation Scheme
Validation Report
Motorola Solutions, Inc.
Motorola Network Devices S2500, S6000, GGM 8000
with EOS Version 16.0
Report Number:
CCEVS-VR-VID10378-2012
Dated:
June 30, 2012
Version:
1.0
National Institute of Standards and Technology
Information Technology Laboratory
100 Bureau Drive
Gaithersburg, MD 20899
National Security Agency
Information Assurance Directorate
9800 Savage Road STE 6940
Fort George G. Meade, MD 20755-6940
Vedere la pagina 0
1 2 3 4 5 6 ... 21 22

Sommario

Pagina 1 - Validation Report

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Motorola Solutions, Inc. Motorola N

Pagina 2 - Acknowledgements

10 TSF data passed during administrative sessions is encrypted to prevent disclosure and is message integrity checked to assure modifications during t

Pagina 3

11 T.AUDACC Persons may not be accountable for the actions that they conduct because the audit records are not reviewed, thus allowing an attacker to

Pagina 4

12 Implementation Characteristics S2500 GGM 8000 S6000 CPU Internal Operating Frequency 100MHz 1GHz 1GHz Level-1 Instruction Cache Size / Structure 1

Pagina 5 - 1 Executive Summary

13 The hardware platforms allow various configurations using pluggable interface modules to allow the end user to customize the available ports. The f

Pagina 6

14 6.1.2 TOE Software Figure 1: Architecture Overview – Enterprise OS EOS implements the TOE security functionality. The hardware provides the user w

Pagina 7 - 3 Interpretations

15  IP Packet Delay Variation (IPDV)  SCH Service – Event Schedule features (i.e.: automated backup)  Bridge service – provides transparent brid

Pagina 8 - 4 Security Policy

16  Documentation that was used as evidence but is not delivered is shown in a normal typeface.  Documentation that is delivered as

Pagina 9 - 4.6 Protection of TSF

17 Document Revision Date Motorola Network Router (MNR) S2500 Hardware User Guide N/A March 23, 2011 Motorola Network Router (MNR) S6000 Hardware User

Pagina 10 - 5 TOE Security Environment

18 8.4 Test Documentation Document Revision Date NIAP Security Certification of Motorola Network Transport Gateway Functional Test Plan 4.1 January

Pagina 11 - 6 Architectural Information

19 9.2 Evaluation Team Independent Testing The Evaluation Team conducted independent testing of the TOE. The Evaluation Team installed the TOE acco

Pagina 12

2 Acknowledgements Validation Panel Dr. Patrick W. Mallett, Lead Scientist The MITRE Corporation McLean, VA Dr. Jerome F. Myers, Senior Engineering

Pagina 13

20 criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 3. The evaluation methodol

Pagina 14 - 7 Clarification of Scope

21 NIST National Institute of Standards and Technology OCSP Online Certificate Status Protocol PP Protection Profile SF Security Functions SFR Se

Pagina 15 - 8 Documentation

22 a particular MIB object to perform specific functions and operates at the protocol data unit (PDU) level. 14 Bibliography [1] Common Criteria

Pagina 16 - 8.2 Guidance Documentation

3 Table of Contents 1 Executive Summary ... 5 2 Identification o

Pagina 17

4 9.1 Developer Testing ... 18 9.2 Evaluation

Pagina 18 - 9 IT Product Testing

5 1 Executive Summary This report documents the Validation Panel’s assessment of the CCEVS evaluation of the Motorola Network Devices S25

Pagina 19 - 10 Results of the Evaluation

6 The S6000 series can also be used to maintain connectivity among small, midsize, and large Local Area networks via a wide variet

Pagina 20 - 13 Terms

7 2 Identification of the TOE Table 2 provides information needed to completely identify the product, including:  The Target of Evaluation (TOE),

Pagina 21 - 13.2 Terminology

8 August 27, 2009. 4 Security Policy This section contains the product features and denotes which are within the logical boundaries of the TOE. The f

Pagina 22 - 14 Bibliography

9  MotoMaster (full read/write access, except for passphrases) 4.3 User Data Protection: Flow Control The TOE mediates traffic passed through the d

Commenti su questo manuale

Nessun commento