National Information Assurance Partnership
|
|
- Anissa Garrison
- 6 years ago
- Views:
Transcription
1 Natinal Infrmatin Assurance Partnership TM Cmmn Criteria Evaluatin and Validatin Scheme Validatin Reprt Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Reprt Number: CCEVS-VR-VID Dated: 11 July 2008 Versin: 1.0 Natinal Institute f Standards and Technlgy Natinal Security Agency Infrmatin Technlgy Labratry Infrmatin Assurance Directrate 100 Bureau Drive 9800 Savage Rad STE 6757 Gaithersburg, MD Frt Gerge G. Meade, MD
2 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters ACKNOWLEDGEMENTS Validatin Team Dianne Hale Jerme Myers Cmmn Criteria Testing Labratry SAIC, Inc. Clumbia, Maryland ii
3 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Table f Cntents 1 Executive Summary Interpretatins Threats t Security Identificatin Security Plicy Assumptins Clarificatin f Scpe Architectural Infrmatin Dcumentatin IT Prduct Testing Results f the Evaluatin Validatr Cmments/Recmmendatins Annexes Security Target Glssary...14 Bibligraphy...15 iii
4 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters 1
5 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters 1 Executive Summary The evaluatin f Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters was perfrmed by SAIC, in the United States and was cmpleted in May The evaluatin was carried ut in accrdance with the Cmmn Criteria Evaluatin and Validatin Scheme (CCEVS) prcess and scheme. The criteria against which the Fundry Netwrks TOE was judged are described in the Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin, Versin 2.3 and Internatinal Interpretatins effective n 10, March The evaluatin methdlgy used by the evaluatin team t cnduct the evaluatin is the Cmmn Methdlgy fr Infrmatin Technlgy Security Evaluatin, Versin 1.0. Science Applicatins Internatinal Crpratin (SAIC) determined that the evaluatin assurance level (EAL) fr the prduct is EAL 2 family f assurance requirements augmented with ALC_FLR.1. The prduct, when cnfigured as specified in the installatin guides and user guides, satisfies all f the security functinal requirements stated in the Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Security Target. This Validatin Reprt applies nly t the specific versin f the TOE as evaluated. The evaluatin has been cnducted in accrdance with the prvisins f the NIAP Cmmn Criteria Evaluatin and Validatin Scheme and the cnclusins f the testing labratry in the evaluatin technical reprt are cnsistent with the evidence adduced. This Validatin Reprt is nt an endrsement f the Tripwire prduct by any agency f the US Gvernment and n warranty f the prduct is either expressed r implied. The technical infrmatin included in this reprt was btained frm the Evaluatin Technical Reprt fr Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters (ETR) Parts 1 and 2 prduced by SAIC. Evaluatin Details Evaluated Prduct: Spnsr & Develper: CCTL: Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters: BigIrn RX family with IrnWare OS versin b, NetIrn XMR family with IrnWare OS versin a, NetIrn EdgeX family with IrnWare OS versin ; FastIrn SuperX series with IrnWare OS versin ; FastIrn MLX family with IrnWare OS versin a; FastIrn GS/LS Family with IrnWare OS versin a; FastIrn EdgeSwitch family with IrnWare OS versin a Fundry Netwrks, Inc 4980 Great America Parkway Santa Clara, CA Science Applicatins Internatinal Crpratin Cmmn Criteria Testing Labratry 7125 Clumbia Gateway Drive, Suite 300 Clumbia, MD
6 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Cmpletin Date: May 2008 CC: Interpretatins: CEM: Evaluatin Class: Descriptin Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin, Versin 2.3 There were n applicable interpretatins used fr this evaluatin. Cmmn Methdlgy fr Infrmatin Technlgy Security Evaluatin, Versin 2.3 EAL 2 augmented with ALC_FLR.1 The TOE is cmpsed f a hardware appliance with embedded sftware installed n the management prcessr f all ruters and switches. The hardware appliance is either a switch r a ruter and its sftware is a versin f Fundry Netwrks' prprietary IrnWare Operating System (IOS) and the sftware-based IrnShield Security Mdule. The Fundry IOS cntrls the switching and ruting f layer 2-3 and layer 4-7 netwrk frames and packets thrugh Fundry switch and ruter appliances. All switches and ruters are cnfigured at the factry with default parameters t allw immediate use f the system s basic features thrugh its Cmmand Line Interface (CLI). Hwever, the TOE shuld be cnfigured in accrdance with the evaluated cnfiguratin prir t being placed int peratin. The CLI is a text based interface which is accessible frm a directly cnnected terminal r via a remte terminal using SSH v2. The TOE cnsists f the fllwing prduct families f switches and ruters: FastIrn (Layer 2-3 Switches) NetIrn (IPv4/IPv6 and Multiprtcl Label Switching (MPLS)Ruters) BigIrn (Layer 3 Switches) The hardware platfrms that supprt the TOE have a number f cmmn hardware characteristics: Central prcessr that supprts all system peratins, i.e. PwerPC etc. Dynamic memry, used by the central prcessr fr all system peratins Flash memry, used t stre the perating system image Nn-vlatile memry, which stres cnfiguratin parameters used t initialize the system at system startup Multiple physical netwrk interfaces either fixed in cnfiguratin r remvable as in a chassis based prduct. 2
7 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters The basic peratin f the switches and ruters is as fllws: 1. At system startup the perating system is transferred frm flash memry t dynamic memry using a built-in hardware btstrap. 2. The perating system reads the cnfiguratin parameters frm the cnfiguratin file in nn-vlatile memry and then builds the necessary data structures in dynamic memry and begins peratin. During nrmal peratin, IP packets are sent t the management IP address r thrugh the appliance ver ne r mre f its physical netwrk interfaces, which prcesses them accrding t the system s cnfiguratin and state infrmatin dynamically maintained by the appliance. This prcessing typically results in the frames r packets being frwarded ut f the device ver anther interface, r drpped in accrdance with a cnfigured plicy. Disclaimer PP: Evaluatin Persnnel The infrmatin cntained in this Validatin Reprt is nt an endrsement f the Tripwire prduct by any agency f the U.S. Gvernment and n warranty f the Gatekeeper prduct is either expressed r implied. nne Shukrat Abbas Validatin Team: 1.1 Interpretatins The Evaluatin Team determined that there were n NIAP Interpretatins applicable t this evaluatin: 1.2 Threats t Security The fllwing are the threats that the evaluated prduct addresses: T.ACCESS An attacker may attempt t access the TOE thrugh an external interface in rder t alter the TOE cnfiguratin r therwise circumvent the TOE plicies s they can access netwrks/resurces fr which they are nt authrized. 3
8 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters T.AUDIT Attempts by external entities t vilate TOE security plicies may nt be detected. T.REMOTE Thrugh the interceptin f netwrk traffic, an attacker may attempt t btain r mdify TOE management/administratr secrets and cnfiguratin data that is either a parameter f TOE administrative cmmands, r part f a TOE administrative sessin, in rder t gain access t TOE management functins and/r cnfiguratin data fr the purpse f circumventing and/r altering TOE security plicy. 2 3 Identificatin The prduct being evaluated is Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters. Nte that the actual target f evaluatin is defined t be nly certain parts f the whle prduct. Security Plicy The fllwing security plicies are enfrced by the TOE: Security Audit: TOE generates audit recrds f user s actins that ccur n the TOE. The user actins include management actins, and attempts t lgin int the TOE. The TOE includes a limited strage buffer, but the recrds can be stred n a syslg server in the IT envirnment. Infrmatin Flw: The TOE uses ACLs t cntrl frwarding f netwrk data at specified prts n netwrk equipment t the netwrk and access t the management functins. There are tw types f ACLs that can be cnfigured, standard and extended. Standard ACLs permit r deny packets based n surce IP address nly. Extended ACLs take mre factrs int cnsideratin including IP prtcl infrmatin. The ACLs can be used t limit the hsts that can access the TOE and the netwrks, denying access t all ther hsts. Identificatin and Authenticatin: The TOE requires that all users are identified and authenticated befre any access t the management functins is permitted. The TOE prvides Authenticatin Methd lists, which are used t specify the rder in which the authenticatin mechanisms are emplyed whenever there are ne r mre authenticatin mechanisms available. Authenticatin mechanims are the lcal authenticatin and external authenticatin using RADIUS and TACACS/TACACS+ which is prvided by an external server in the IT envirnment. Security Management: The TOE includes a number f cmmand-line functins t manage its security plicies. These functins can be accessed using the Cmmand 4
9 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Line Interface (CLI) (via a directly cnnected terminal r a remte SSH sessin). The security management functins are cntrlled thrugh the use f privileges assciated with rles that can be assigned t TOE users. Amng the available privileges, nly the Super User can actually manage the security plicies prvided by the TOE and the TOE ffers a cmplete set f functins t facilitate effective management. TSF prtectin: The TOE prtects itself frm tampering and bypass by ffering nly a limited and cntrlled set f functins at each f its physical interfaces t its envirnment. Cmmunicatin via thse interfaces is either directed at the TOE fr the purpse f administratin r is directed thrugh the TOE fr cmmunicatin amng netwrk devices. In bth cases the TOE implements a set f plicies t cntrl the services available and thse services are designed t prtect and ensure the secure peratin f the TOE. 4 Assumptins The fllwing assumptins are identified in the Security Target: A.EAUTH External authenticatin services will be available via RADIUS r TACACS/TACACS+. A.FLOW The TOE will be placed in a netwrk infrastructure such that infrmatin t be cntrlled will always flw thrugh the TOE. A.GOODADM An Authrized Administratr is nt careless, willfully negligent, nr hstile, and will fllw and abide by the instructins prvided by the Administratr dcumentatin. A.INSTALL The TOE has been delivered, installed, and setup in accrdance with dcumented delivery and installatin/setup prcedures. A.MANAGE There will be ne r mre cmpetent Authrized Administratr(s) assigned t manage the TOE and the security functins it perfrms. A.PHYSICAL The TOE will be apprpriately lcated within facilities prviding cntrlled access t prevent unauthrized physical access and t ensure that the TOE cntrls the applicable infrmatin flws. 5
10 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters 4.1 Clarificatin f Scpe All evaluatins (and all prducts) have limitatins, as well as ptential miscnceptins that need clarifying. This text cvers sme f the mre imprtant limitatins and clarificatins f this evaluatin. Nte that: As with any evaluatin, this evaluatin nly shws that the evaluated cnfiguratin meets the security claims made; and meets them with nly a certain level f assurance (EAL 2 augmented with ALC_FLR.1 in this case). As with all EAL 2 evaluatins, this evaluatin did nt specifically search fr vulnerabilities that were nt bvius (as this term is defined in the CC and CEM); seriusly attempt t find cunters t them; nr find vulnerabilities related t bjectives nt claimed in the ST. This evaluatin des nt verify all claims made in the prduct s end-user dcumentatin. The verificatin f the security claims is limited t thse claims made in the TOE SFRs and TOE Summary Specificatin (see ST sectins 5.1 and 6 respectively). The fllwing features must be disabled r restricted in the evaluated cnfiguratin: SNMP is assumed t be disabled in the evaluated cnfiguratin. Web Management Access is assumed t be disabled in the evaluated cnfiguratin. Telnet access is assumed t be used nly fr lcal, wired cnnectins (i.e., it is assumed t be disabled fr remte/netwrk access t the TOE). Strict Passwrd Enfrcement is assumed t be enabled in the evaluated cnfiguratin. The fllwing features were nt evaluated but can be used in the evaluated cnfiguratin: 802.1x Authenticatin, which is an authenticatin prtcl which allws users t be granted r refused access t a lcal area netwrk based n a set f credentials. In mst cases, 802.1x is used with a central RADIUS server. MAC authenticatin, which grants user access t a lcal area netwrk based n the PC s MAC address. BGP Guard, which is a security mechanism assciated with the BGP ruting prtcl. BGP Guard prtects yur BGP ruting tplgy by restricting the number f ruter hps the BGP sessin can traverse. 5 Architectural Infrmatin The TOE cnsists f the fllwing prduct families f switches and ruters: FastIrn (Layer 2-3 Switches) NetIrn (IPv4/IPv6 and Multiprtcl Label Switching (MPLS)Ruters) BigIrn (Layer 3 Switches) 6
11 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters The hardware platfrms that supprt the TOE have a number f cmmn hardware characteristics: Central prcessr that supprts all system peratins, i.e. PwerPC etc. Dynamic memry, used by the central prcessr fr all system peratins Flash memry, used t stre the perating system image Nn-vlatile memry, which stres cnfiguratin parameters used t initialize the system at system startup Multiple physical netwrk interfaces either fixed in cnfiguratin r remvable as in a chassis based prduct. The basic peratin f the switches and ruters is as fllws: 3. At system startup the perating system is transferred frm flash memry t dynamic memry using a built-in hardware btstrap. 4. The perating system reads the cnfiguratin parameters frm the cnfiguratin file in nnvlatile memry and then builds the necessary data structures in dynamic memry and begins peratin. During nrmal peratin, IP packets are sent t the management IP address r thrugh the appliance ver ne r mre f its physical netwrk interfaces, which prcesses them accrding t the system s cnfiguratin and state infrmatin dynamically maintained by the appliance. This prcessing typically results in the frames r packets being frwarded ut f the device ver anther interface, r drpped in accrdance with a cnfigured plicy. Each Irnshield Switch r Ruter frm ne f the Irnshield prduct families (BigIrn, NetIrn, and FastIrn) is a hardware appliance that runs a versin f Fundry Netwrks IrnWare Operating System (IOS) and the sftware-based IrnShield Security Mdule. In additin, each IrnShield Switch r Ruter has physical netwrk cnnectins t its envirnment t facilitate ruting and switching f netwrk traffic and can als be the destinatin f netwrk traffic, where it prvides interfaces fr its wn management. The TOE may be accessed and managed thrugh a PC r terminal in the envirnment which can be remte frm r directly cnnected t the TOE. The TOE can be cnfigured t frward its audit recrds t a syslg server in the envirnment. This is generally advisable given the limited audit lg strage space n the evaluated appliances. The TOE can als be cnfigured t use an external authenticatin service such as a RADIUS r TACACS/TACACS+ using an external server in the envirnment. The fllwing are mdels are the TOE: BigIrn: RX family with IrnWare OS versin b BI-RX-4-AC (4 slt device) BI-RX-8-AC (8 slt device) 7
12 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters BI-RX-16-AC (16 slt device) BI-RX-32-AC (32 slt device) NetIrn XMR family with IrnWare OS versin a NI-XMR-4-AC (4 slt device) NI-XMR-8-AC (8 slt device) NI-XMR-16-AC (16 slt device) NI-XMR-32-AC (32 slt device) MLX family with IrnWare OS versin a NI-MLX-4-AC (4 slt device) NI-MLX-8-AC (8 slt device) NI-MLX-16-AC (16 slt device) NI-MLX-32-AC (32 slt device) FastIrn SuperX series with IrnWare OS versin FI-SX1-AC (8 slt device with single management) FI-SX800-AC (8 slt device with redundant management) FI-SX1600-AC (16 slt device with redundant management) GS/LS Family with IrnWare OS versin a FLS624 (24 prt stackable) FLS648 (48 prt stackable) FGS624P (24 prt stackable) FGS624P-POE (24 prt stackable with Pwer ver Ethernet) FGS624XGP (24 prt stackable with integrated 10 Gig Interface) FGS624XGP-POE ( 24 prt stackable with integrated 10 Gig Interface with Pwer ver Ethernet) FGS648P (48 prt stackable) FGS648P-POE (48 prt stackable with Pwer ver Ethernet) 8
13 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Edge X family with IrnWare OS versin FESX424 (24 prt stackable) FESX424-PREM (24 prt stackable with full L3 supprt) FESX424+1XG (24 prt stackable with ne prt 10 Gig Interface) FESX424+1XG-PREM (24 prt stackable with ne prt 10 Gig Interface with full L3 supprt) FESX424+2XG (24 prt stackable with tw prt 10 Gig Interface) FESX424+2XG-PREM (24 prt stackable with tw prt 10 Gig Interface with full L3 supprt) FESX448 (48 prt stackable) FESX448-PREM (48 prt stackable with full L3 supprt) FESX448+1XG (48 prt stackable with ne prt 10 Gig Interface) FESX448+1XG-PREM (48 prt stackable with ne prt 10 Gig Interface with full L3 supprt) FESX448+2XG (48 prt stackable with tw prt 10 Gig Interface) FESX448+2XG-PREM (48 prt stackable with tw prt 10 Gig Interface with full L3 supprt) FESX424HF (24 prt stackable (100FX/1000X)) FESX424HF-PREM (24 prt stackable (100FX/1000X) with full L3 supprt) FESX424HF+1XG (24 prt stackable (100FX/1000X) with ne 10 Gig Interface) FESX424HF+1XG-PREM (24 prt stackable (100FX/1000X) with ne 10 Gig Interface with full L3 supprt) FESX424HF+2XG (24 prt stackable (100FX/1000X) with tw 10 Gig Interface) FESX424HF+2XG-PREM (24 prt stackable (100FX/1000X) with tw 10 Gig Interface with full L3 supprt) FESX424-POE (24 prt stackable with Pwer ver Ethernet) FESX424-POE+1XG (24 prt stackable with ne prt 10 Gig Interface and Pwer ver Ethernet) FESX424-POE+2XG (24 prt stackable with tw prt 10 Gig Interface and Pwer ver Ethernet) FESX624 (24 prt stackable with hardware based IPv6 supprt) FESX624-PREM (24 prt stackable with hardware based IPv6 supprt and full L3 supprt) FESX624+2XG (24 prt stackable with hardware based IPv6 supprt and 2 10 Gig Interfaces) 9
14 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters FESX624+2XG-PREM (24 prt stackable with hardware based IPv6 supprt and 2 10 Gig Interfaces and full L3 supprt) FESX648 (48 prt stackable with hardware based IPv6 supprt) FESX648-PREM (48 prt stackable with hardware based IPv6 supprt and full L3 supprt) FESX648+2XG (48 prt stackable with hardware based IPv6 supprt and 2 10 Gig Interfaces) FESX648+2XG-PREM (48 prt stackable with hardware based IPv6 supprt and 2 10 Gig Interfaces and full L3 supprt) FESX624HF (24 prt stackable with hardware based IPv6 supprt (100FX/1000X)) FESX624HF-PREM (24 prt stackable with hardware based IPv6 supprt and full L3 supprt (100FX/1000X)) FESX624HF+2XG (24 prt stackable with hardware based IPv6 supprt and 2 10 Gig Interfaces (100FX/1000X)) FESX624HF+2XG-PREM (24 prt stackable with hardware based IPv6 supprt and 2 10 Gig Interfaces and full L3 supprt) Edge Switch family with IrnWare OS versin a FES2402 (24 prt stackable) FES2402-PREM (24 prt stackable with full L3 supprt) FES4802 (48 prt stackable) FES4802-PREM (48 prt stackable with full L3 supprt) FES9604 (96 prt stackable) FES9604-PREM (96 prt stackable with full L3 supprt) FES12GCF (12 prt stackable) FES12GCF-PREM (12 prt stackable with full L3 supprt) FES2402-POE (24 prt stackable with Pwer ver Ethernet) FES2402-POE-PREM (24 prt stackable with full L3 supprt and Pwer ver Ethernet) FES4802-POE (48 prt stackable with Pwer ver Ethernet) FES4802-POE-PREM (48 prt stackable with full L3 supprt and Pwer ver Ethernet) 10
15 6 VALIDATION REPORT Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Dcumentatin Fllwing is a list f useful dcuments supplied by the develper when dwnlad frm the Fundry Netwrks website r shipped with the prduct. Evaluated: Fundry Switch and Ruter Cmmand Line Interface Reference, December 2007 Fundry Security Guide, December 2007 BigIrn: FastIrn Fundry BigIrn RX Series Installatin Guide, March 2008 Fundry BigIrn RX Series Cnfiguratin Guide, June 2008 Fundry Switch and Ruter Installatin and Basic Cnfiguratin Guide, December 2007 Fundry FastIrn Cmpact Switch Hardware Installatin Guide, December 2007 Fundry FastIrn Cnfiguratin Guide, June Fundry FastIrn GS Cmpact Layer 2 Switch POE and POE-Upgradeable Hardware Installatin Guide, December 2007 Fundry FastIrn LS Layer 2 Cmpact Switch Hardware Installatin Guide, December 2007 Fundry FastIrn X Series Chassis Hardware Installatin Guide, Nvember 2007 Fundry FastIrn Cmpact Switch Hardware Installatin Guide, December 2007 NetIrn: Fundry NetIrn MLX Series Installatin and Basic Cnfiguratin Guide, December 2007 Fundry NetIrn XMR Series Installatin and Basic Cnfiguratin Guide, December 2007 Fundry NetIrn XMR/MLX Cnfiguratin Guide, April 2008 Nt evaluated: Fundry Management Infrmatin Base Reference Release ntes Patch Release Ntes ReadMe MD5_Checksums The security target used is: Fundry Netwrks IrnShield (BigIrn, NetIrn, and FastIrn) Switches and Ruters Security Target, versin 0.92, July 10,
16 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters 7 IT Prduct Testing The evaluatin team applied each EAL 2 ATE CEM wrk unit. The evaluatin team ensured that the TOE perfrmed as described in the functinal specificatin and as stated in the TOE security functinal requirements. The evaluatin team perfrmed the vendr test suite, and devised an independent set f team test and penetratin tests. The vendr tests, team tests, and penetratin tests substantiated the security functinal requirements in the ST. The fllwing tasks were perfrmed by the evaluatin team: The develper test suite was examined and fund t prvide adequate cverage f the security functins. A selectin f the develper tests were run and the results fund t be cnsistent with the results generated by the develper. N vulnerabilities in the TOE were fund during a search f vulnerability databases. Tests devised frm pstulated vulnerabilities in the I&A mechanism revealed n prblems. The fllwing mdels were actually tested; NetIrn XMR Family (mdular) NI-XMR-4-AC (4 slt device) Cde Release IrnWare OS versin a NetIrn MLX Family (mdular) TOE-MLX NI-MLX-4-AC (4 slt device) Cde Release IrnWare OS versin a BigIrn RX Family (mdular) - hstname: TOE-RX BI-RX-4-AC (4 slt device) Cde Release IrnWare OS versin b FastIrn EdgeX Family (stackable -10/100/1000) FESX424HF-PREM (24 prt stackable (100FX/1000X) with full L3 supprt) Cde Release - IrnWare OS versin FastIrn EdgeSwitch Family (stackable-10/100) FES2402-PREM (24 prt stackable with full L3 supprt) Cde Release - IrnWare OS versin a 12
17 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters FastIrn SuperX Series (mdular) hstname: TOE-SX FI-SX1-AC (8 slt device with single management) Cde Release IrnWare OS versin FastIrn GS/LS Family (stackable-10/100/1000)* FGS624P (24 prt stackable) FLS648 (48 prt stackable) Cde Release IrnWare OS versin a The chsen mdels are a sample set f the mdels that are cnsidered the TOE. The set is deem adequate because the nly differences between the mdels with a given family is the number f interface slts available with the chassis and media type. The chassis sizes range frm 4, 8, 16, and 32 slts. Stackable devices prvide either 24 r 48 prts and are either cpper r fiber based. 8 9 Results f the Evaluatin The evaluatin team s assessment f the evaluatin evidence demnstrates that the claims in the ST are met. Additinally, the evaluatin team s perfrmance f a subset f the vendr tests suite, the independent tests, and the penetratin test als demnstrates the accuracy f the claims in the ST. Validatr Cmments/Recmmendatins The Validatrs fund that the evidence reviewed prir and during the Final Validatin Oversight Review (VOR) supprted the determinatin that the evaluatin and all f its activities were perfrmed in accrdance with the CC, the CEM, and CCEVS practices. Sme limitatins and clarificatins f the evaluated prduct are summarized in Sectin 4.1 f this dcument. In additin the fllwing prblem was identified by the CCTL during evaluatin. Errr with the cmmand used t change a user s passwrd. Existing usernames and passwrds cnfigured n a Fundry Device with specific privilege levels (super-user, read-nly, prt-cnfig) can be escalated t the super-user privilege level if the users passwrd is changed withut including the user s privilege level ptin in the syntax. The issue is dcumented in the NIAP-CCEVS Certificatin Appendix A t the Fundry Security Guide and in the Cnfiguratin Guides. 10 Annexes Nt applicable. 13
18 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Security Target The security target fr this prduct s evaluatin is Fundry Netwrks IrnShield (BigIrn, NetIrn, and FastIrn) Switches and Ruters Security Target, versin 0.92, July 10, 2008 Glssary There were n definitins used ther than thse used in the CC r CEM. 14
19 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Bibligraphy The Validatin Team used the fllwing dcuments t prduce this Validatin Reprt: [1] Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 1: Intrductin and general mdel, dated August 2005, Versin 2.3. [2] Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 2: Security functinal requirements, dated August 2005, Versin 2.3. [3] Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 2: Annexes, dated August 1999, Versin 2.1. [4] Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 3: Security assurance requirements, dated August 2005, Versin 2.3. [5] Cmmn Evaluatin Methdlgy fr Infrmatin Technlgy Security Part 1: Intrductin and general mdel, dated 1 Nvember 1998, versin 0.6. [6] Cmmn Evaluatin Methdlgy fr Infrmatin Technlgy Security Part 2: Evaluatin Methdlgy, dated August 2005, versin 2.3. [7] Part 2: Evaluatin Methdlgy, Supplement: ALC_FLR - Flaw Remediatin, Versin 1.1, February 2002, CEM-2001/0015R [8] Evaluatin Technical Reprt fr Fundry Netwrks IrnShield (BigIrn, NetIrn, and FastIrn) Switches and Ruters Security Part II, versin 1.0 July 10, 2008 [9] Fundry Netwrks IrnShield (BigIrn, NetIrn, and FastIrn) Switches and Ruters Security Target, versin 0.92, July 10, [10] NIAP Cmmn Criteria Evaluatin and Validatin Scheme fr IT Security, Guidance t Cmmn Criteria Testing Labratries, Versin 1.0, March 20,
CCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 6 2016 v5.1 Answers 100% 1. Which characteristic f the netwrk layer in the OSI mdel allws carrying packets fr multiple types f cmmunicatins amng many hsts? the de-encapsulatin f headers
More informationCOMMON CRITERIA CERTIFICATION REPORT
COMMON CRITERIA CERTIFICATION REPORT NetApp Clustered Data ONTAP 8.3.1 28 June 2016 Gvernment f Canada. This dcument is the prperty f the Gvernment f Canada. It shall nt be altered, distributed beynd its
More informationOracle Primavera Primavera P6 Enterprise Project Portfolio Management
Natinal Infrmatin Assurance Partnership Cmmn Criteria Evaluatin and Validatin Scheme Validatin Reprt Oracle Primavera Primavera P6 Enterprise Prject Prtfli Management TM (Versin 6.2.1) Reprt Number: CCEVS-VR-VID10182-2009
More informationCCNA Security v2.0 Chapter 2 Exam Answers
CCNA Security v2.0 Chapter 2 Exam Answers 1. An administratr defined a lcal user accunt with a secret passwrd n ruter R1 fr use with SSH. Which three additinal steps are required t cnfigure R1 t accept
More information2. When logging is used, which severity level indicates that a device is unusable?
CCNA 4 Chapter 8 v5.0 Exam Answers 2015 (100%) 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput
More informationCSPN Security Target. PLC Simatic S range
CSPN Security Target PLC Simatic S7 1500 range Categry Industrial systems: prgrammable lgic cntrller Reference: CSPN-ST-Simatic-S7-1500-Range-1.01 Date: 2017/10/03 Internal cde: SIE009 Cpyright AMOSSYS
More informationDolby Conference Phone Support Frequently Asked Questions
Dlby Cnference Phne Supprt Frequently Asked Questins Versin 1.0, 1 Intrductin This dcument prvides sme answers t frequently asked questins abut the Dlby Cnference Phne. Fr mre detailed infrmatin n any
More informationCustomer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist
This checklist is used t prvide guidance and clarificatin n aspects f the auxillary Startup Service (G2949CA) including Security Pack Installatin and Familiarizatin f yur Agilent 2100 Bianalyzer System
More informationDate: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems
Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance
More informationDynamic Storage (ECS)
User Guide Dynamic Strage (ECS) Swisscm (Schweiz) AG 1 / 10 Cntent 1 Abut Dynamic Strage... 3 2 Virtual drive, the EMC CIFS-ECS Tl... 4 3 Amazn S3 Brwer... 6 4 Strage Gateway Appliance... 9 5 Amazn S3
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 11 2016 v5.1 Answers 100% 1. A newly hired netwrk technician is given the task f rdering new hardware fr a small business with a large grwth frecast. Which primary factr shuld the technician
More informationEView/400i Management Pack for Systems Center Operations Manager (SCOM)
EView/400i Management Pack fr Systems Center Operatins Manager (SCOM) Cncepts Guide Versin 7.0 July 2015 1 Legal Ntices Warranty EView Technlgy makes n warranty f any kind with regard t this manual, including,
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This
More informationHP Server Virtualization Solution Planning & Design
Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP
More informationPacket Tracer - Configuring a Zone-Based Policy Firewall (ZPF)
Packet Tracer - Cnfiguring a Zne-Based Plicy Firewall (ZPF) Tplgy Addressing Table R1 R2 R3 Device Interface IP Address Subnet Mask Default Gateway Switch Prt G0/1 192.168.1.1 255.255.255.0 N/A S1 F0/5
More informationNational Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. for
Natinal Infrmatin Assurance Partnership Cmmn Criteria Evaluatin and Validatin Scheme Validatin Reprt fr TM BeyndTrust PwerBrker UNIX + Linux Editin V9.1 Reprt Number: CCEVS-VR-VID10691-2016 Dated: August
More informationCCNA Security v2.0 Chapter 9 Exam Answers
CCNA Security v2.0 Chapter 9 Exam Answers 1. Refer t the exhibit. An administratr creates three znes (A, B, and C) in an ASA that filters traffic. Traffic riginating frm Zne A ging t Zne C is denied, and
More informationPoint-to-Point Encryption (P2PE)
Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard
More informationI. Introduction: About Firmware Files, Naming, Versions, and Formats
Updating Yur CTOG 250 Cmtech Traffic Optimizatin Gateway Firmware I. Intrductin: Abut Firmware Files, Naming, Versins, and Frmats The CTOG 250 Cmtech Traffic Optimizatin Gateway and its CDM 800 Gateway
More informationBlackBerry Server Installation and Upgrade Service
Server and Upgrade Service Prgram Descriptin ( Install and Upgrade Service Prgram Descriptin ) NOTE: This dcument includes all attached Annexes, is prvided fr infrmatinal purpses nly, and des nt cnstitute
More informationService Description: Advanced Services Fixed Price
Page 1 f 6 Service Descriptin: Advanced Services Fixed Price Cisc WLAN Advise and Implement Services Fixed (ASF-CORE-WLAN) This dcument describes Advanced Services Fixed Price: Cisc WLAN Advise and Implement
More informationCommandCenter Secure Gateway Release Virtual CC
CmmandCenter Secure Gateway Release 5.0.5 Virtual CC Nvember 15, 2010 Versin 5.0.5 prvides the initial release f the CC-SG virtual appliance (Virtual CC). Virtual CC is supprted t run n VMware. Versin
More informationBMC Remedyforce Integration with Remote Support
BMC Remedyfrce Integratin with Remte Supprt 2003-2018 BeyndTrust, Inc. All Rights Reserved. BEYONDTRUST, its lg, and JUMP are trademarks f BeyndTrust, Inc. Other trademarks are the prperty f their respective
More informationCCNA Security v2.0 Chapter 3 Exam Answers
CCNA Security v2.0 Chapter 3 Exam Answers 1. Because f implemented security cntrls, a user can nly access a server with FTP. Which AAA cmpnent accmplishes this? accunting accessibility auditing authrizatin
More informationI. Introduction: About Firmware Files, Naming, Versions, and Formats
I. Intrductin: Abut Firmware Files, Naming, Versins, and Frmats The UT-4500-A Series Upcnverters and DT-4500-A Series Dwncnverters stre their firmware in flash memry, which allws the system t uplad firmware
More informationTPP: Date: October, 2012 Product: ShoreTel PathSolutions System version: ShoreTel 13.x
I n n v a t i n N e t w r k A p p N t e TPP: 10320 Date: Octber, 2012 Prduct: ShreTel PathSlutins System versin: ShreTel 13.x Abstract PathSlutins sftware can find the rt-cause f vice quality prblems in
More informationSoftware Usage Policy Template
Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/
More informationSOLA and Lifecycle Manager Integration Guide
SOLA and Lifecycle Manager Integratin Guide SOLA and Lifecycle Manager Integratin Guide Versin: 7.0 July, 2015 Cpyright Cpyright 2015 Akana, Inc. All rights reserved. Trademarks All prduct and cmpany names
More informationRelease Notes. Dell SonicWALL Security firmware is supported on the following appliances: Dell SonicWALL Security 200
Release Ntes Email Security Dell SnicWALL Email Security 8.0.1 SnicOS Cntents System Cmpatibility... 1 Enhancements in Email Security 8.0.1... 2 Reslved Issues... 3 Upgrading t Email Security 8.0.1...
More informationApplication Notes for Stratus ftserver 6310 with VMWare and Avaya Aura Contact Center Release 6.2 Issue 1.0
Avaya Slutin & Interperability Test Lab Applicatin Ntes fr Stratus ftserver 6310 with VMWare and Avaya Aura Cntact Center Release 6.2 Issue 1.0 Abstract These Applicatin Ntes describes the integratin,
More informationCMC Blade BIOS Profile Cloning
This white paper describes the detailed capabilities f the Chassis Management Cntrller s Blade BIOS Prfile Clning feature. Authr Crey Farrar This dcument is fr infrmatinal purpses nly and may cntain typgraphical
More informationBMC Remedyforce Integration with Bomgar Remote Support
BMC Remedyfrce Integratin with Bmgar Remte Supprt 2017 Bmgar Crpratin. All rights reserved wrldwide. BOMGAR and the BOMGAR lg are trademarks f Bmgar Crpratin; ther trademarks shwn are the prperty f their
More informationOverview of Data Furnisher Batch Processing
Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...
More informationNiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel
NiceLabel LMS Installatin Guide fr Single Server Deplyment Rev-1702 NiceLabel 2017. www.nicelabel.cm 1 Cntents 1 Cntents 2 2 Architecture 3 2.1 Server Cmpnents and Rles 3 2.2 Client Cmpnents 3 3 Prerequisites
More informationCCNA Security v2.0 Chapter 10 Exam Answers
CCNA Security v2.0 Chapter 10 Exam Answers 1. Which statement describes the functin prvided t a netwrk administratrwh uses the Cisc Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start
More informationQuick Setup Guide. Aastra MX-ONE V.4.0 Integration with Microsoft OCS 2007 R2. Doc. Nr. ASE/MXO/PLM/ 0123/EN Rev.A
Aastra MX-ONE V.4.0 Integratin with Micrsft OCS 2007 R2 Quick Setup Guide Aastra Telecm Sweden AB SE-126 37 Hägersten, Sweden Dc. Nr. ASE/MXO/PLM/ 0123/EN Rev.A www.aastra.cm Cntents 1 Intrductin 3 1.1
More informationCisco Tetration Analytics, Release , Release Notes
Cisc Tetratin Analytics, Release 1.102.21, Release Ntes This dcument describes the features, caveats, and limitatins fr the Cisc Tetratin Analytics sftware. Additinal prduct Release ntes are smetimes updated
More informationApplication Note. Digi Connect Wi-SP Troubleshooting Guide. Digi Technical Support 10 May 2016
Applicatin Nte Digi Cnnect Wi-SP Trubleshting Guide Digi Technical Supprt 10 May 2016 Cntents 1 Intrductin... 3 1.1 Assumptins... 3 1.2 Crrectins... 3 2 Quick Facts... 3 2.1 Cmmn Questins Abut the Cnnect
More informationIBM Records Manager V8.4 Security Target
IBM Recrds Manager V8.4 Security Target ST Versin 1.0 8 January 2009 Prepared fr: Internatinal Business Machines (IBM) 555 Bailey Avenue San Jse, CA 95161 Prepared By: Science Applicatins Internatinal
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 5 2016 v5.1 Answers 100% 1. What happens t runt frames received by a Cisc Ethernet switch? The frame is drpped. The frame is returned t the riginating netwrk device. The frame is bradcast
More informationXilinx Answer Xilinx PCI Express DMA Drivers and Software Guide
Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer
More informationManual for installation and usage of the module Secure-Connect
Mdule Secure-Cnnect Manual fr installatin and usage f the mdule Secure-Cnnect Page 1 / 1 5 Table f Cntents 1)Cntents f the package...3 2)Features f the mdule...4 3)Installatin f the mdule...5 Step 1: Installatin
More informationUSO RESTRITO. SNMP Agent. Functional Description and Specifications Version: 1.1 March 20, 2015
Functinal Descriptin and Specificatins Versin: 1.1 March 20, 2015 SNMP Agent Simple Netwrk Management Prtcl Optin S fr IE and PM Mdules Supplement t Functinal Descriptin and Specificatins f RUB Ethernet
More informationUPGRADING TO DISCOVERY 2005
Centennial Discvery 2005 Why Shuld I Upgrade? Discvery 2005 is the culminatin f ver 18 mnths wrth f research and develpment and represents a substantial leap frward in audit and decisin-supprt technlgy.
More informationROCK-POND REPORTING 2.1
ROCK-POND REPORTING 2.1 AUTO-SCHEDULER USER GUIDE Revised n 08/19/2014 OVERVIEW The purpse f this dcument is t describe the prcess in which t fllw t setup the Rck-Pnd Reprting prduct s that users can schedule
More informationTo start your custom application development, perform the steps below.
Get Started T start yur custm applicatin develpment, perfrm the steps belw. 1. Sign up fr the kitewrks develper package. Clud Develper Package Develper Package 2. Sign in t kitewrks. Once yu have yur instance
More informationCaseWare Working Papers. Data Store user guide
CaseWare Wrking Papers Data Stre user guide Index 1. What is a Data Stre?... 3 1.1. When using a Data Stre, the fllwing features are available:... 3 1.1.1.1. Integratin with Windws Active Directry... 3
More informationSecure File Transfer Protocol (SFTP) Interface for Data Intake User Guide
Secure File Transfer Prtcl (SFTP) Interface fr Data Intake User Guide Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 SFTP Access t FINRA... 2 SFTP
More informationOO Shell for Authoring (OOSHA) User Guide
Operatins Orchestratin Sftware Versin: 10.70 Windws and Linux Operating Systems OO Shell fr Authring (OOSHA) User Guide Dcument Release Date: Nvember 2016 Sftware Release Date: Nvember 2016 Legal Ntices
More informationConfigure Data Source for Automatic Import from CMDB
AvailabilityGuard TM Cnfigure Data Surce fr Autmatic Imprt frm CMDB AvailabilityGuard allws yu t cnfigure business entities (such as services, divisins, and applicatins) and assign hsts, databases, and
More informationPlanning, installing, and configuring IBM CMIS for Content Manager OnDemand
Planning, installing, and cnfiguring IBM CMIS fr Cntent Manager OnDemand Cntents IBM CMIS fr Cntent Manager OnDemand verview... 4 Planning fr IBM CMIS fr Cntent Manager OnDemand... 5 Prerequisites fr installing
More informationSetting up the ncipher nshield HSM for use with Kerberized Certificate Authority
Setting up the ncipher nshield HSM fr use with Kerberized Certificate Authrity Intrductin This dcument cntains instructins fr setting up ncipher nshield hardware security mdules (HSM) fr use with the Kerberized
More informationLaunching Xacta 360 Marketplace AMI Guide June 2017
Launching Xacta 360 Marketplace AMI Guide June 2017 Tels Crpratin 2017. All rights reserved. U.S. patents Ns. 6,901,346; 6,980,927; 6,983,221; 6,993,448; and 7,380,270. Xacta is a registered trademark
More informationFrequently Asked Questions
Frequently Asked Questins Versin 10-21-2016 Cpyright 2014-2016 Aviatrix Systems, Inc. All rights reserved. Aviatrix Clud Gateway What can it d fr me? Aviatrix Clud Gateway prvides an end t end secure netwrk
More informationABELMed Platform Setup Conventions
ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require
More informationTable of Contents. WipeDrive Enterprise Logging, March Logging Settings... 3 Log Format Types Audit Log Destination Options...
WipeDrive Enterprise Lgging, March 2018 Table f Cntents Lgging Settings... 3 Lg Frmat Types... 4 Plain Text Lg File Optin... 4 Extensible Markup Language (XML) Lg File Optin... 6 Cmma Delimited (CSV) Lg
More informationRelease Notes. Dell SonicWALL Security BETA
Release Ntes Email Security Dell SnicWALL Email Security 7.4.1 BETA SnicOS Cntents System Cmpatibility... 1 Enhancements in Email Security 7.4.1... 2 Upgrading t Email Security 7.4.1... 3 Related Technical
More informationYour New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform
Supprt Guide Yur New Service Request Prcess: Technical Supprt Reference Guide fr Cisc Custmer Jurney Platfrm September 2018 2018 Cisc and/r its affiliates. All rights reserved. This dcument is Cisc Public
More informationCCNA 1 v5.1 Practice Final Exam Answers %
CCNA 1 v5.1 Practice Final Exam Answers 2016 100% 1. Which term refers t a netwrk that prvides secure access t the crprate ffices by suppliers, custmers and cllabratrs? Internet intranet extranet extendednet
More informationUNSW Technology Policy:
UNSW Technlgy Plicy: UNSW Plicy Respnsible Officer Cntact Officer Apprving Authrity UNSW Data Netwrk Cnnectin Plicy Chief Infrmatin Officer Manager Infrastructure Services Supprt UNSW IT Services Ph: x
More informationHPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices
HPE LadRunner Best Practices Series LadRunner 12.50 Upgrade Best Practices Dcument publicatin date: Nvember 2015 Cntents 1. Intrductin... 3 Overview... 3 Audience... 3 2. Preparatin... 3 Backup assets...
More informationAdmin Report Kit for Exchange Server
Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses
More informationOmniPCX Record PCI Compliance 2.3
S T R A T E G I C W H I T E P A P E R OmniPCX Recrd PCI Cmpliance 2.3 Alcatel-Lucent Enterprise Services Page 1/11 OmniPCX-Recrd R2.3 PCI Cmpliance White Paper Legal ntice Alcatel, Lucent, Alcatel-Lucent
More informationRapid Implementation Package
Implementatin Package Implementatin 1 Purpse The purpse f this dcument is t detail thse services BuildingPint NrthEast ( BPNE ) will prvide as part f the Prlg Rapid Implementatin Package. This package
More informationOracle Universal Records Management Oracle Universal Records Manager Adapter for Documentum Installation Guide
Oracle Universal Recrds Management Oracle Universal Recrds Manager Adapter fr Dcumentum Installatin Guide December 2009 Universal Recrds Manager Adapter fr Dcumentum Installatin Guide, Cpyright 2009, Oracle.
More informationDepartment of Computer Information Systems KEMU
Advanced DBMS: CISY 423 Department f Cmputer Infrmatin Systems KEMU Database Security OBJECTIVES Database Security and Authrizatin Database Users Creating Users/Accunts in cmmercial DBMS Discretinary Access
More informationSecure Mobile Access to the Local ICS Network. Jan Vossaert Veilige industriële netwerken 29/09/2016
Secure Mbile Access t the Lcal ICS Netwrk Jan Vssaert Veilige industriële netwerken 29/09/2016 Intrductin ffice netwrk prductin cell ruter 192.168.2.0/24 Internet ICS DMZ servers 192.168.1.0/24 prductin
More informationSafeDispatch SDR Gateway for MOTOROLA TETRA
SafeDispatch SDR Gateway fr MOTOROLA TETRA SafeMbile ffers a wrld f wireless applicatins that help rganizatins better manage their mbile assets, fleet and persnnel. Fr mre infrmatin, see www.safembile.cm.
More informationSingle File Upload Guide
Single File Uplad Guide August 15, 2018 Versin 9.6.134.78 Single File Uplad Guide 1 Fr the mst recent versin f this dcument, visit ur dcumentatin website. Single File Uplad Guide 2 Table f Cntents 1 Single
More informationSummary. Server environment: Subversion 1.4.6
Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin
More informationTroubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.
Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are
More informationIntroduction to Mindjet on-premise
Intrductin t Mindjet n-premise Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 www.mindjet.cm 2012 Mindjet. All Rights Reserved
More informationUNMETERED LOAD GUIDELINE - DETERMINATION OF DEVICE LOAD AND ANNUAL ENERGY CONSUMPTION FOR UNMETERED DEVICE TYPES
UNMETERED LOAD GUIDELINE - DETERMINATION OF DEVICE LOAD AND ANNUAL ENERGY CONSUMPTION FOR UNMETERED DEVICE TYPES PREPARED BY: Market Develpment DOCUMENT REF: VERSION: 1.0 DATE: Nvember 2013 STATUS Draft
More informationPlease contact technical support if you have questions about the directory that your organization uses for user management.
Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP
More informationRe-Flashing Your CDM-760 Advanced High-Speed Trunking Modem
Re-Flashing Yur CDM-760 Advanced High-Speed Trunking Mdem I. Intrductin: Firmware Files, Naming, Versins, and Frmats Make sure t perate the CDM-760 with its latest available firmware. Befre attempting
More informationVMware EVO:RAIL Customer Release Notes
VMware EVO:RAIL Custmer Release Ntes EVO:RAIL Release 1.2.0 Dcument Revisin: 1.2.0-2 (May 27, 2015) Cpyright 1998-2015 VMware, Inc. All rights reserved. Cpyright, trademark, and patent infrmatin: http://pubs.vmware.cm/cpyright-trademark.html.
More informationPacket Tracer - Skills Integration Challenge Topology
Packet Tracer - Skills Integratin Challenge Tplgy 2015 Cisc and/r its affiliates. All rights reserved. This dcument is Cisc Public. Page 1 f 6 Packet Tracer - Skills Integratin Challenge Addressing Table
More informationADSS Server Evaluation Quick Guide
ADSS Server Evaluatin Quick Guide This dcument aims t prvide a quick d this and it wrks guide t evaluating ADSS Enterprise Server as a PDF Signing Server bth fr server-side signing and als fr client-side
More informationINTELLISNAP. TECHNOLOGY QUICK START GUIDE Pure Storage FlashArray. Publish Date: July 30, 2015 Distribution: Public Author: Jonathan Howard
INTELLISNAP TECHNOLOGY QUICK START GUIDE Pure Strage FlashArray Publish Date: July 30, 2015 Distributin: Public Authr: Jnathan Hward Quick Start Guide This quick start guide is intended t launch users
More informationCONTROL-COMMAND. Software Technical Specifications for ThomX Suppliers 1.INTRODUCTION TECHNICAL REQUIREMENTS... 2
Réf. ThmX-NT-SI-CC001 Table f Cntents Sftware Technical Specificatins fr ThmX Authr : Philippe Page 1 / 9 1.INTRODUCTION... 2 2.TECHNICAL REQUIREMENTS... 2 3.DOCUMENTATION REQUIREMENTS... 4 4.COMPUTING
More informationMySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION
MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION These release ntes pertain t the Prductin release fr MySabre Release 7.0 cntaining MySabre API
More informationNational Information Assurance Partnership
National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Xceedium Gatekeeper Version 3.6 Report Number: CCEVS-VR-06-0048 Dated: 31 October 2006 Version:
More informationAdditional License Authorizations
Additinal License Authrizatins Fr HPE CMS SIM Management sftware prducts Prducts and suites cvered PRODUCTS E-LTU OR E-MEDIA AVAILABLE * NON-PRODUCTION USE OPTION HPE Dynamic SIM Prvisining Yes Yes HPE
More informationWELMEC Guide on evaluation of Purely Digital Parts
WELMEC 10.10 2016 Guide n evaluatin f Purely Digital Parts WELMEC is a cperatin between the legal metrlgy authrities f the Member States f the Eurpean Unin and EFTA. This dcument is ne f a number f Guides
More informationE-Lock Policy Manager White Paper
White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...
More informationTelkom VPN-Lite router setup User Manual Billion 800VGT
Telkm VPN-Lite ruter setup User Manual Billin 800VGT Cntents 1. Intrductin... 3 2. Befre yu start... 4 3. VPN-Lite Setup Using Windws Utility... 5 4. VPN-Lite Setup using yur web brwser... 7 5. VPN-Lite
More informationAvocent Universal Management Gateway Appliance Plug-in for the Avocent DSView 4.5 Management Software Release Notes
VERTIV Avcent Universal Management Gateway Appliance Plug-in fr the Avcent DSView 4.5 Management Sftware Release Ntes VERSION 4.2.0.33, SEPTEMBER 14, 2018 Release Ntes Sectin Outline 1 System Requirements
More informationABELDent Platform Setup Conventions
ABELDent Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELDent licensees and their hardware vendrs with the infrmatin that they will require
More informationElement Creator for Enterprise Architect
Element Creatr User Guide Element Creatr fr Enterprise Architect Element Creatr fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins... 3 Installatin... 4 Verifying the
More informationInteroperability between ProCurve WESM zl and HP ipaq Voice Messenger smartphone
An HP PrCurve Netwrking Applicatin Nte Interperability between PrCurve WESM zl and HP ipaq Vice Messenger smartphne Cntents 1. Intrductin... 3 2. Prerequisites... 3 3. Netwrk architecture... 3 4. Secure
More informationAloha Offshore SDLC Process
Alha Sftware Develpment Life Cycle Alha Offshre SDLC Prcess Alha Technlgy fllws a sftware develpment methdlgy that is derived frm Micrsft Slutins Framewrk and Ratinal Unified Prcess (RUP). Our prcess methdlgy
More informationOASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS
OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SYSTEM FUNCTIONS... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE OASIS SYSTEM... 3 SUBMITTING OASIS DATA FILES... 5 OASIS INITIAL
More informationManaging User Accounts
A variety f user types are available in Lighthuse Transactin Manager (LTM) with cnfigurable permissins that allw the Accunt Administratr and administratr-type users fr the accunt t manage the abilities
More informationContents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.
1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding
More informationCounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation.
CunterSnipe Sftware Installatin Guide Sftware Versin 10.x.x CunterSnipe sftware installs n any system cmpatible with Ubuntu 14.04 LTS server which is supprted until 2019 Initial Set-up- Nte: An internet
More informationExtended Traceability Report for Enterprise Architect
Extended Traceability Reprt User Guide Extended Traceability Reprt fr Enterprise Architect Extended Traceability Reprt fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins
More informationBME Smart-Colo. Smart-Colo is a solution optimized for the colocation of trading applications, built and managed by BME.
BME Smart-Cl 1. Intrductin The aim f this dcument is t describe the BME Smart-Cl service fr accessing BME Cash, BME Derivative markets and market data feeds. Smart-Cl service prvides at the BME Data Center
More informationCCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%)
CCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%) 1. Which tw netwrk design features require Spanning Tree Prtcl (STP) t ensure crrect netwrk peratin? (Chse tw.) static default rutes implementing VLANs t
More informationHW4 Software version 3. Device Manager and Data Logging LOG-RC Series Data Loggers
Page 1 f 18 HW4 Sftware versin 3 Device Manager and Data Lgging LOG-RC Series Data Lggers 2011; Page 2 f 18 Table f cntents 1 ORGANIZATION OF THE HW4 MANUALS... 3 2 OVERVIEW... 4 3 INITIAL SETUP... 4 3.1
More informationPatch Management Policy
Patch Management Plicy (Versin 1) Dcument Cntrl Infrmatin: Date: 21/5/18 Master Tracking Name Patch Management Plicy Master Tracking Reference Owning Service / Department Exeter IT Issue: 1 Apprvals: Authrs:
More information