Motorola S2500 Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Mise en réseau Motorola S2500. Motorola Solutions, Inc. Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 22
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
National Information Assurance Partnership
Common Criteria Evaluation and Validation Scheme
Validation Report
Motorola Solutions, Inc.
Motorola Network Devices S2500, S6000, GGM 8000
with EOS Version 16.0
Report Number:
CCEVS-VR-VID10378-2012
Dated:
June 30, 2012
Version:
1.0
National Institute of Standards and Technology
Information Technology Laboratory
100 Bureau Drive
Gaithersburg, MD 20899
National Security Agency
Information Assurance Directorate
9800 Savage Road STE 6940
Fort George G. Meade, MD 20755-6940
Vue de la page 0
1 2 3 4 5 6 ... 21 22

Résumé du contenu

Page 1 - Validation Report

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Motorola Solutions, Inc. Motorola N

Page 2 - Acknowledgements

10 TSF data passed during administrative sessions is encrypted to prevent disclosure and is message integrity checked to assure modifications during t

Page 3

11 T.AUDACC Persons may not be accountable for the actions that they conduct because the audit records are not reviewed, thus allowing an attacker to

Page 4

12 Implementation Characteristics S2500 GGM 8000 S6000 CPU Internal Operating Frequency 100MHz 1GHz 1GHz Level-1 Instruction Cache Size / Structure 1

Page 5 - 1 Executive Summary

13 The hardware platforms allow various configurations using pluggable interface modules to allow the end user to customize the available ports. The f

Page 6

14 6.1.2 TOE Software Figure 1: Architecture Overview – Enterprise OS EOS implements the TOE security functionality. The hardware provides the user w

Page 7 - 3 Interpretations

15  IP Packet Delay Variation (IPDV)  SCH Service – Event Schedule features (i.e.: automated backup)  Bridge service – provides transparent brid

Page 8 - 4 Security Policy

16  Documentation that was used as evidence but is not delivered is shown in a normal typeface.  Documentation that is delivered as

Page 9 - 4.6 Protection of TSF

17 Document Revision Date Motorola Network Router (MNR) S2500 Hardware User Guide N/A March 23, 2011 Motorola Network Router (MNR) S6000 Hardware User

Page 10 - 5 TOE Security Environment

18 8.4 Test Documentation Document Revision Date NIAP Security Certification of Motorola Network Transport Gateway Functional Test Plan 4.1 January

Page 11 - 6 Architectural Information

19 9.2 Evaluation Team Independent Testing The Evaluation Team conducted independent testing of the TOE. The Evaluation Team installed the TOE acco

Page 12

2 Acknowledgements Validation Panel Dr. Patrick W. Mallett, Lead Scientist The MITRE Corporation McLean, VA Dr. Jerome F. Myers, Senior Engineering

Page 13

20 criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 3. The evaluation methodol

Page 14 - 7 Clarification of Scope

21 NIST National Institute of Standards and Technology OCSP Online Certificate Status Protocol PP Protection Profile SF Security Functions SFR Se

Page 15 - 8 Documentation

22 a particular MIB object to perform specific functions and operates at the protocol data unit (PDU) level. 14 Bibliography [1] Common Criteria

Page 16 - 8.2 Guidance Documentation

3 Table of Contents 1 Executive Summary ... 5 2 Identification o

Page 17

4 9.1 Developer Testing ... 18 9.2 Evaluation

Page 18 - 9 IT Product Testing

5 1 Executive Summary This report documents the Validation Panel’s assessment of the CCEVS evaluation of the Motorola Network Devices S25

Page 19 - 10 Results of the Evaluation

6 The S6000 series can also be used to maintain connectivity among small, midsize, and large Local Area networks via a wide variet

Page 20 - 13 Terms

7 2 Identification of the TOE Table 2 provides information needed to completely identify the product, including:  The Target of Evaluation (TOE),

Page 21 - 13.2 Terminology

8 August 27, 2009. 4 Security Policy This section contains the product features and denotes which are within the logical boundaries of the TOE. The f

Page 22 - 14 Bibliography

9  MotoMaster (full read/write access, except for passphrases) 4.3 User Data Protection: Flow Control The TOE mediates traffic passed through the d

Commentaires sur ces manuels

Pas de commentaire