National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Motorola Solutions, Inc. AP-7131N W
10 protected by those mechanisms. T.MASQUERADE A user or process may masquerade as another entity in order to gain unauthorized access to data or TOE
11 actions within the TOE. P.CRYPTOGRAPHIC The TOE shall provide cryptographic functions for its own use, including encryption/decryption operations
12 and adequacy to test the security function under test. The following items represent a subset of the factors considered in selecting the functional
13 functional requirements specified in the Security Target. Other functionality included in the product was not assessed as part of this evaluation.
14 [3] Common Criteria for Information Technology Security Evaluation – Part 3: Security assurance components, July 2009, Version 3.1, Revision 3, C
2 Acknowledgements Validation Panel Paul A. Bicknell The MITRE Corporation, Bedford, MA Jean E. Petty The MITRE Corporation, McLean, VA Common Crit
3 Table of Contents 1 Executive Summary ... 4 2 Identification o
4 1 Executive Summary This report documents the NIAP validators’ assessment of the CCEVS evaluation of the AP-7131N Wireless Access Point: Hardware
5 Table 1: Operational Environment Components Component Description Console RS-232 Console Interface for local management of the TOE SSH Client SSHv2
6 2 Identification of the TOE Table 2 provides information needed to completely identify the product, including: • The Target of Evaluation (TOE),
7 CCEVS Validators Paul A. Bicknell Jean E. Petty 3 Interpretations The Evaluation Team performed an analysis of the international interpretations of
8 4.4 Identification and Authentication The TOE requires the system administrators be authenticated before access to the TOE is granted; administra
9 The TOE utilizes IPsec, SSH and SNMP to provide trusted channels to the servers providing authentication services, remote audit, NTP synchronization
Komentáře k této Příručce