Motorola AP-7131N-FGR Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach WLAN-Zugangspunkte Motorola AP-7131N-FGR herunter. Motorola Solutions, Inc. Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 14
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
National Information Assurance Partnership
Common Criteria Evaluation and Validation Scheme
Validation Report
Motorola Solutions, Inc.
AP-7131N Wireless Access Point
Report Number:
CCEVS-VR-VID10473-2014
Dated:
March 27, 2014
Version:
1.0
National Institute of Standards and Technology
Information Technology Laboratory
100 Bureau Drive
Gaithersburg, MD 20899
National Security Agency
Information Assurance Directorate
9800 Savage Road STE 6940
Fort George G. Meade, MD 20755-6940
Seitenansicht 0
1 2 3 4 5 6 ... 13 14

Inhaltsverzeichnis

Seite 1 - Validation Report

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Motorola Solutions, Inc. AP-7131N W

Seite 2 - Acknowledgements

10 protected by those mechanisms. T.MASQUERADE A user or process may masquerade as another entity in order to gain unauthorized access to data or TOE

Seite 3

11 actions within the TOE. P.CRYPTOGRAPHIC The TOE shall provide cryptographic functions for its own use, including encryption/decryption operations

Seite 4 - 1 Executive Summary

12 and adequacy to test the security function under test. The following items represent a subset of the factors considered in selecting the functional

Seite 5

13 functional requirements specified in the Security Target. Other functionality included in the product was not assessed as part of this evaluation.

Seite 6 - 2 Identification of the TOE

14 [3] Common Criteria for Information Technology Security Evaluation – Part 3: Security assurance components, July 2009, Version 3.1, Revision 3, C

Seite 7 - 4 Security Policy

2 Acknowledgements Validation Panel Paul A. Bicknell The MITRE Corporation, Bedford, MA Jean E. Petty The MITRE Corporation, McLean, VA Common Crit

Seite 8 - 4.7 Trusted Path/Channel

3 Table of Contents 1 Executive Summary ... 4 2 Identification o

Seite 9 - 5 TOE Security Environment

4 1 Executive Summary This report documents the NIAP validators’ assessment of the CCEVS evaluation of the AP-7131N Wireless Access Point: Hardware

Seite 10

5 Table 1: Operational Environment Components Component Description Console RS-232 Console Interface for local management of the TOE SSH Client SSHv2

Seite 11 - 7 IT Product Testing

6 2 Identification of the TOE Table 2 provides information needed to completely identify the product, including: • The Target of Evaluation (TOE),

Seite 12 - 8 Results of the Evaluation

7 CCEVS Validators Paul A. Bicknell Jean E. Petty 3 Interpretations The Evaluation Team performed an analysis of the international interpretations of

Seite 13 - 12 Bibliography

8 4.4 Identification and Authentication The TOE requires the system administrators be authenticated before access to the TOE is granted; administra

Seite 14

9 The TOE utilizes IPsec, SSH and SNMP to provide trusted channels to the servers providing authentication services, remote audit, NTP synchronization

Kommentare zu diesen Handbüchern

Keine Kommentare