National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Motorola Solutions, Inc. Motorola N
10 TSF data passed during administrative sessions is encrypted to prevent disclosure and is message integrity checked to assure modifications during t
11 T.AUDACC Persons may not be accountable for the actions that they conduct because the audit records are not reviewed, thus allowing an attacker to
12 Implementation Characteristics S2500 GGM 8000 S6000 CPU Internal Operating Frequency 100MHz 1GHz 1GHz Level-1 Instruction Cache Size / Structure 1
13 The hardware platforms allow various configurations using pluggable interface modules to allow the end user to customize the available ports. The f
14 6.1.2 TOE Software Figure 1: Architecture Overview – Enterprise OS EOS implements the TOE security functionality. The hardware provides the user w
15 IP Packet Delay Variation (IPDV) SCH Service – Event Schedule features (i.e.: automated backup) Bridge service – provides transparent brid
16 Documentation that was used as evidence but is not delivered is shown in a normal typeface. Documentation that is delivered as
17 Document Revision Date Motorola Network Router (MNR) S2500 Hardware User Guide N/A March 23, 2011 Motorola Network Router (MNR) S6000 Hardware User
18 8.4 Test Documentation Document Revision Date NIAP Security Certification of Motorola Network Transport Gateway Functional Test Plan 4.1 January
19 9.2 Evaluation Team Independent Testing The Evaluation Team conducted independent testing of the TOE. The Evaluation Team installed the TOE acco
2 Acknowledgements Validation Panel Dr. Patrick W. Mallett, Lead Scientist The MITRE Corporation McLean, VA Dr. Jerome F. Myers, Senior Engineering
20 criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 3. The evaluation methodol
21 NIST National Institute of Standards and Technology OCSP Online Certificate Status Protocol PP Protection Profile SF Security Functions SFR Se
22 a particular MIB object to perform specific functions and operates at the protocol data unit (PDU) level. 14 Bibliography [1] Common Criteria
3 Table of Contents 1 Executive Summary ... 5 2 Identification o
4 9.1 Developer Testing ... 18 9.2 Evaluation
5 1 Executive Summary This report documents the Validation Panel’s assessment of the CCEVS evaluation of the Motorola Network Devices S25
6 The S6000 series can also be used to maintain connectivity among small, midsize, and large Local Area networks via a wide variet
7 2 Identification of the TOE Table 2 provides information needed to completely identify the product, including: The Target of Evaluation (TOE),
8 August 27, 2009. 4 Security Policy This section contains the product features and denotes which are within the logical boundaries of the TOE. The f
9 MotoMaster (full read/write access, except for passphrases) 4.3 User Data Protection: Flow Control The TOE mediates traffic passed through the d
Commentaires sur ces manuels