hit counter script

Table Of Contents - Cisco Catalyst 4503-E Manual

Catalyst 4500 series
Hide thumbs Also See for Catalyst 4503-E:
Table of Contents

Advertisement

Cisco Cat4K NDPP ST
EDCS-1228241
1
Security Target Introduction ................................................................................................... 6
1.1
Security Target and TOE Identification ............................................................... 6
1.2
Acronyms and Abbreviations ............................................................................... 6
1.3
TOE Overview ..................................................................................................... 8
1.3.1
TOE Evaluated Configuration ...................................................................... 8
1.3.2
TOE Type...................................................................................................... 9
1.3.3
Required non-TOE Hardware/Software/Firmware ....................................... 9
1.4
TOE Description ................................................................................................ 10
1.4.1
TOE Architecture and Security Capabilities............................................... 10
1.5
TOE Environment and Configuration ................................................................ 11
1.6
Physical Scope of the TOE................................................................................. 13
1.6.1
USB Console Port ....................................................................................... 23
1.6.2
Network Ports ............................................................................................. 23
1.6.3
Serial Port.................................................................................................... 23
1.6.4
Compact Flash Slot ..................................................................................... 24
1.6.5
Physical Scope of the TOE ......................................................................... 24
1.7
Logical Scope of the TOE .................................................................................. 24
1.7.1
Security Audit ............................................................................................. 25
1.7.2
Cryptographic Support ................................................................................ 25
1.7.3
User Data Protection ................................................................................... 25
1.7.4
Identification and Authentication ............................................................... 26
1.7.5
Security Management ................................................................................. 26
1.7.6
Protection of the TSF .................................................................................. 27
1.7.7
Resource Utilization.................................................................................... 28
1.7.8
TOE Access ................................................................................................ 28
1.7.9
Trusted Path/Channels ................................................................................ 28
1.8
Excluded Functionality ...................................................................................... 28
2
Conformance Claims ............................................................................................................ 30
2.1
Common Criteria Conformance Claim .............................................................. 30
2.2
Protection Profile Conformance Claim .............................................................. 30
2.3
Protection Profile Conformance Claim Rationale .............................................. 30
2.3.1
TOE Appropriateness.................................................................................. 30
2.3.2
TOE Security Problem Definition Conformance ........................................ 30
2.3.3
Statement of Security Objectives Conformance ......................................... 30
2.3.4
Statement of Security Requirements Conformance .................................... 31
3
Security Problem Definition ................................................................................................. 32
3.1
Introduction ........................................................................................................ 32
3.2
External Entities ................................................................................................. 32
3.3
Assets ................................................................................................................. 32
3.3.1
Primary Assets ............................................................................................ 32
3.3.2
Secondary Assets ........................................................................................ 33
3.4
Assumptions ....................................................................................................... 33

Table of Contents

2
11 March 2014

Advertisement

Table of Contents
loading

Table of Contents