EasyManua.ls Logo

Cisco Catalyst 4503-E - Default Chapter; Table of Contents

Cisco Catalyst 4503-E
88 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Cisco Cat4K NDPP ST 11 March 2014
EDCS-1228241
2
Table of Contents
1 Security Target Introduction ................................................................................................... 6
1.1 Security Target and TOE Identification ............................................................... 6
1.2 Acronyms and Abbreviations ............................................................................... 6
1.3 TOE Overview ..................................................................................................... 8
1.3.1 TOE Evaluated Configuration ...................................................................... 8
1.3.2 TOE Type...................................................................................................... 9
1.3.3 Required non-TOE Hardware/Software/Firmware ....................................... 9
1.4 TOE Description ................................................................................................ 10
1.4.1 TOE Architecture and Security Capabilities............................................... 10
1.5 TOE Environment and Configuration ................................................................ 11
1.6 Physical Scope of the TOE................................................................................. 13
1.6.1 USB Console Port ....................................................................................... 23
1.6.2 Network Ports ............................................................................................. 23
1.6.3 Serial Port.................................................................................................... 23
1.6.4 Compact Flash Slot ..................................................................................... 24
1.6.5 Physical Scope of the TOE ......................................................................... 24
1.7 Logical Scope of the TOE .................................................................................. 24
1.7.1 Security Audit ............................................................................................. 25
1.7.2 Cryptographic Support ................................................................................ 25
1.7.3 User Data Protection ................................................................................... 25
1.7.4 Identification and Authentication ............................................................... 26
1.7.5 Security Management ................................................................................. 26
1.7.6 Protection of the TSF .................................................................................. 27
1.7.7 Resource Utilization.................................................................................... 28
1.7.8 TOE Access ................................................................................................ 28
1.7.9 Trusted Path/Channels ................................................................................ 28
1.8 Excluded Functionality ...................................................................................... 28
2 Conformance Claims ............................................................................................................ 30
2.1 Common Criteria Conformance Claim .............................................................. 30
2.2 Protection Profile Conformance Claim .............................................................. 30
2.3 Protection Profile Conformance Claim Rationale .............................................. 30
2.3.1 TOE Appropriateness.................................................................................. 30
2.3.2 TOE Security Problem Definition Conformance ........................................ 30
2.3.3 Statement of Security Objectives Conformance ......................................... 30
2.3.4 Statement of Security Requirements Conformance .................................... 31
3 Security Problem Definition ................................................................................................. 32
3.1 Introduction ........................................................................................................ 32
3.2 External Entities ................................................................................................. 32
3.3 Assets ................................................................................................................. 32
3.3.1 Primary Assets ............................................................................................ 32
3.3.2 Secondary Assets ........................................................................................ 33
3.4 Assumptions ....................................................................................................... 33

Table of Contents

Related product manuals