National Information Assurance Partnership

Size: px
Start display at page:

Download "National Information Assurance Partnership"

Transcription

1 Natinal Infrmatin Assurance Partnership TM Cmmn Criteria Evaluatin and Validatin Scheme Validatin Reprt Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Reprt Number: CCEVS-VR-VID Dated: 11 July 2008 Versin: 1.0 Natinal Institute f Standards and Technlgy Natinal Security Agency Infrmatin Technlgy Labratry Infrmatin Assurance Directrate 100 Bureau Drive 9800 Savage Rad STE 6757 Gaithersburg, MD Frt Gerge G. Meade, MD

2 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters ACKNOWLEDGEMENTS Validatin Team Dianne Hale Jerme Myers Cmmn Criteria Testing Labratry SAIC, Inc. Clumbia, Maryland ii

3 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Table f Cntents 1 Executive Summary Interpretatins Threats t Security Identificatin Security Plicy Assumptins Clarificatin f Scpe Architectural Infrmatin Dcumentatin IT Prduct Testing Results f the Evaluatin Validatr Cmments/Recmmendatins Annexes Security Target Glssary...14 Bibligraphy...15 iii

4 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters 1

5 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters 1 Executive Summary The evaluatin f Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters was perfrmed by SAIC, in the United States and was cmpleted in May The evaluatin was carried ut in accrdance with the Cmmn Criteria Evaluatin and Validatin Scheme (CCEVS) prcess and scheme. The criteria against which the Fundry Netwrks TOE was judged are described in the Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin, Versin 2.3 and Internatinal Interpretatins effective n 10, March The evaluatin methdlgy used by the evaluatin team t cnduct the evaluatin is the Cmmn Methdlgy fr Infrmatin Technlgy Security Evaluatin, Versin 1.0. Science Applicatins Internatinal Crpratin (SAIC) determined that the evaluatin assurance level (EAL) fr the prduct is EAL 2 family f assurance requirements augmented with ALC_FLR.1. The prduct, when cnfigured as specified in the installatin guides and user guides, satisfies all f the security functinal requirements stated in the Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Security Target. This Validatin Reprt applies nly t the specific versin f the TOE as evaluated. The evaluatin has been cnducted in accrdance with the prvisins f the NIAP Cmmn Criteria Evaluatin and Validatin Scheme and the cnclusins f the testing labratry in the evaluatin technical reprt are cnsistent with the evidence adduced. This Validatin Reprt is nt an endrsement f the Tripwire prduct by any agency f the US Gvernment and n warranty f the prduct is either expressed r implied. The technical infrmatin included in this reprt was btained frm the Evaluatin Technical Reprt fr Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters (ETR) Parts 1 and 2 prduced by SAIC. Evaluatin Details Evaluated Prduct: Spnsr & Develper: CCTL: Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters: BigIrn RX family with IrnWare OS versin b, NetIrn XMR family with IrnWare OS versin a, NetIrn EdgeX family with IrnWare OS versin ; FastIrn SuperX series with IrnWare OS versin ; FastIrn MLX family with IrnWare OS versin a; FastIrn GS/LS Family with IrnWare OS versin a; FastIrn EdgeSwitch family with IrnWare OS versin a Fundry Netwrks, Inc 4980 Great America Parkway Santa Clara, CA Science Applicatins Internatinal Crpratin Cmmn Criteria Testing Labratry 7125 Clumbia Gateway Drive, Suite 300 Clumbia, MD

6 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Cmpletin Date: May 2008 CC: Interpretatins: CEM: Evaluatin Class: Descriptin Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin, Versin 2.3 There were n applicable interpretatins used fr this evaluatin. Cmmn Methdlgy fr Infrmatin Technlgy Security Evaluatin, Versin 2.3 EAL 2 augmented with ALC_FLR.1 The TOE is cmpsed f a hardware appliance with embedded sftware installed n the management prcessr f all ruters and switches. The hardware appliance is either a switch r a ruter and its sftware is a versin f Fundry Netwrks' prprietary IrnWare Operating System (IOS) and the sftware-based IrnShield Security Mdule. The Fundry IOS cntrls the switching and ruting f layer 2-3 and layer 4-7 netwrk frames and packets thrugh Fundry switch and ruter appliances. All switches and ruters are cnfigured at the factry with default parameters t allw immediate use f the system s basic features thrugh its Cmmand Line Interface (CLI). Hwever, the TOE shuld be cnfigured in accrdance with the evaluated cnfiguratin prir t being placed int peratin. The CLI is a text based interface which is accessible frm a directly cnnected terminal r via a remte terminal using SSH v2. The TOE cnsists f the fllwing prduct families f switches and ruters: FastIrn (Layer 2-3 Switches) NetIrn (IPv4/IPv6 and Multiprtcl Label Switching (MPLS)Ruters) BigIrn (Layer 3 Switches) The hardware platfrms that supprt the TOE have a number f cmmn hardware characteristics: Central prcessr that supprts all system peratins, i.e. PwerPC etc. Dynamic memry, used by the central prcessr fr all system peratins Flash memry, used t stre the perating system image Nn-vlatile memry, which stres cnfiguratin parameters used t initialize the system at system startup Multiple physical netwrk interfaces either fixed in cnfiguratin r remvable as in a chassis based prduct. 2

7 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters The basic peratin f the switches and ruters is as fllws: 1. At system startup the perating system is transferred frm flash memry t dynamic memry using a built-in hardware btstrap. 2. The perating system reads the cnfiguratin parameters frm the cnfiguratin file in nn-vlatile memry and then builds the necessary data structures in dynamic memry and begins peratin. During nrmal peratin, IP packets are sent t the management IP address r thrugh the appliance ver ne r mre f its physical netwrk interfaces, which prcesses them accrding t the system s cnfiguratin and state infrmatin dynamically maintained by the appliance. This prcessing typically results in the frames r packets being frwarded ut f the device ver anther interface, r drpped in accrdance with a cnfigured plicy. Disclaimer PP: Evaluatin Persnnel The infrmatin cntained in this Validatin Reprt is nt an endrsement f the Tripwire prduct by any agency f the U.S. Gvernment and n warranty f the Gatekeeper prduct is either expressed r implied. nne Shukrat Abbas Validatin Team: 1.1 Interpretatins The Evaluatin Team determined that there were n NIAP Interpretatins applicable t this evaluatin: 1.2 Threats t Security The fllwing are the threats that the evaluated prduct addresses: T.ACCESS An attacker may attempt t access the TOE thrugh an external interface in rder t alter the TOE cnfiguratin r therwise circumvent the TOE plicies s they can access netwrks/resurces fr which they are nt authrized. 3

8 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters T.AUDIT Attempts by external entities t vilate TOE security plicies may nt be detected. T.REMOTE Thrugh the interceptin f netwrk traffic, an attacker may attempt t btain r mdify TOE management/administratr secrets and cnfiguratin data that is either a parameter f TOE administrative cmmands, r part f a TOE administrative sessin, in rder t gain access t TOE management functins and/r cnfiguratin data fr the purpse f circumventing and/r altering TOE security plicy. 2 3 Identificatin The prduct being evaluated is Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters. Nte that the actual target f evaluatin is defined t be nly certain parts f the whle prduct. Security Plicy The fllwing security plicies are enfrced by the TOE: Security Audit: TOE generates audit recrds f user s actins that ccur n the TOE. The user actins include management actins, and attempts t lgin int the TOE. The TOE includes a limited strage buffer, but the recrds can be stred n a syslg server in the IT envirnment. Infrmatin Flw: The TOE uses ACLs t cntrl frwarding f netwrk data at specified prts n netwrk equipment t the netwrk and access t the management functins. There are tw types f ACLs that can be cnfigured, standard and extended. Standard ACLs permit r deny packets based n surce IP address nly. Extended ACLs take mre factrs int cnsideratin including IP prtcl infrmatin. The ACLs can be used t limit the hsts that can access the TOE and the netwrks, denying access t all ther hsts. Identificatin and Authenticatin: The TOE requires that all users are identified and authenticated befre any access t the management functins is permitted. The TOE prvides Authenticatin Methd lists, which are used t specify the rder in which the authenticatin mechanisms are emplyed whenever there are ne r mre authenticatin mechanisms available. Authenticatin mechanims are the lcal authenticatin and external authenticatin using RADIUS and TACACS/TACACS+ which is prvided by an external server in the IT envirnment. Security Management: The TOE includes a number f cmmand-line functins t manage its security plicies. These functins can be accessed using the Cmmand 4

9 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Line Interface (CLI) (via a directly cnnected terminal r a remte SSH sessin). The security management functins are cntrlled thrugh the use f privileges assciated with rles that can be assigned t TOE users. Amng the available privileges, nly the Super User can actually manage the security plicies prvided by the TOE and the TOE ffers a cmplete set f functins t facilitate effective management. TSF prtectin: The TOE prtects itself frm tampering and bypass by ffering nly a limited and cntrlled set f functins at each f its physical interfaces t its envirnment. Cmmunicatin via thse interfaces is either directed at the TOE fr the purpse f administratin r is directed thrugh the TOE fr cmmunicatin amng netwrk devices. In bth cases the TOE implements a set f plicies t cntrl the services available and thse services are designed t prtect and ensure the secure peratin f the TOE. 4 Assumptins The fllwing assumptins are identified in the Security Target: A.EAUTH External authenticatin services will be available via RADIUS r TACACS/TACACS+. A.FLOW The TOE will be placed in a netwrk infrastructure such that infrmatin t be cntrlled will always flw thrugh the TOE. A.GOODADM An Authrized Administratr is nt careless, willfully negligent, nr hstile, and will fllw and abide by the instructins prvided by the Administratr dcumentatin. A.INSTALL The TOE has been delivered, installed, and setup in accrdance with dcumented delivery and installatin/setup prcedures. A.MANAGE There will be ne r mre cmpetent Authrized Administratr(s) assigned t manage the TOE and the security functins it perfrms. A.PHYSICAL The TOE will be apprpriately lcated within facilities prviding cntrlled access t prevent unauthrized physical access and t ensure that the TOE cntrls the applicable infrmatin flws. 5

10 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters 4.1 Clarificatin f Scpe All evaluatins (and all prducts) have limitatins, as well as ptential miscnceptins that need clarifying. This text cvers sme f the mre imprtant limitatins and clarificatins f this evaluatin. Nte that: As with any evaluatin, this evaluatin nly shws that the evaluated cnfiguratin meets the security claims made; and meets them with nly a certain level f assurance (EAL 2 augmented with ALC_FLR.1 in this case). As with all EAL 2 evaluatins, this evaluatin did nt specifically search fr vulnerabilities that were nt bvius (as this term is defined in the CC and CEM); seriusly attempt t find cunters t them; nr find vulnerabilities related t bjectives nt claimed in the ST. This evaluatin des nt verify all claims made in the prduct s end-user dcumentatin. The verificatin f the security claims is limited t thse claims made in the TOE SFRs and TOE Summary Specificatin (see ST sectins 5.1 and 6 respectively). The fllwing features must be disabled r restricted in the evaluated cnfiguratin: SNMP is assumed t be disabled in the evaluated cnfiguratin. Web Management Access is assumed t be disabled in the evaluated cnfiguratin. Telnet access is assumed t be used nly fr lcal, wired cnnectins (i.e., it is assumed t be disabled fr remte/netwrk access t the TOE). Strict Passwrd Enfrcement is assumed t be enabled in the evaluated cnfiguratin. The fllwing features were nt evaluated but can be used in the evaluated cnfiguratin: 802.1x Authenticatin, which is an authenticatin prtcl which allws users t be granted r refused access t a lcal area netwrk based n a set f credentials. In mst cases, 802.1x is used with a central RADIUS server. MAC authenticatin, which grants user access t a lcal area netwrk based n the PC s MAC address. BGP Guard, which is a security mechanism assciated with the BGP ruting prtcl. BGP Guard prtects yur BGP ruting tplgy by restricting the number f ruter hps the BGP sessin can traverse. 5 Architectural Infrmatin The TOE cnsists f the fllwing prduct families f switches and ruters: FastIrn (Layer 2-3 Switches) NetIrn (IPv4/IPv6 and Multiprtcl Label Switching (MPLS)Ruters) BigIrn (Layer 3 Switches) 6

11 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters The hardware platfrms that supprt the TOE have a number f cmmn hardware characteristics: Central prcessr that supprts all system peratins, i.e. PwerPC etc. Dynamic memry, used by the central prcessr fr all system peratins Flash memry, used t stre the perating system image Nn-vlatile memry, which stres cnfiguratin parameters used t initialize the system at system startup Multiple physical netwrk interfaces either fixed in cnfiguratin r remvable as in a chassis based prduct. The basic peratin f the switches and ruters is as fllws: 3. At system startup the perating system is transferred frm flash memry t dynamic memry using a built-in hardware btstrap. 4. The perating system reads the cnfiguratin parameters frm the cnfiguratin file in nnvlatile memry and then builds the necessary data structures in dynamic memry and begins peratin. During nrmal peratin, IP packets are sent t the management IP address r thrugh the appliance ver ne r mre f its physical netwrk interfaces, which prcesses them accrding t the system s cnfiguratin and state infrmatin dynamically maintained by the appliance. This prcessing typically results in the frames r packets being frwarded ut f the device ver anther interface, r drpped in accrdance with a cnfigured plicy. Each Irnshield Switch r Ruter frm ne f the Irnshield prduct families (BigIrn, NetIrn, and FastIrn) is a hardware appliance that runs a versin f Fundry Netwrks IrnWare Operating System (IOS) and the sftware-based IrnShield Security Mdule. In additin, each IrnShield Switch r Ruter has physical netwrk cnnectins t its envirnment t facilitate ruting and switching f netwrk traffic and can als be the destinatin f netwrk traffic, where it prvides interfaces fr its wn management. The TOE may be accessed and managed thrugh a PC r terminal in the envirnment which can be remte frm r directly cnnected t the TOE. The TOE can be cnfigured t frward its audit recrds t a syslg server in the envirnment. This is generally advisable given the limited audit lg strage space n the evaluated appliances. The TOE can als be cnfigured t use an external authenticatin service such as a RADIUS r TACACS/TACACS+ using an external server in the envirnment. The fllwing are mdels are the TOE: BigIrn: RX family with IrnWare OS versin b BI-RX-4-AC (4 slt device) BI-RX-8-AC (8 slt device) 7

12 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters BI-RX-16-AC (16 slt device) BI-RX-32-AC (32 slt device) NetIrn XMR family with IrnWare OS versin a NI-XMR-4-AC (4 slt device) NI-XMR-8-AC (8 slt device) NI-XMR-16-AC (16 slt device) NI-XMR-32-AC (32 slt device) MLX family with IrnWare OS versin a NI-MLX-4-AC (4 slt device) NI-MLX-8-AC (8 slt device) NI-MLX-16-AC (16 slt device) NI-MLX-32-AC (32 slt device) FastIrn SuperX series with IrnWare OS versin FI-SX1-AC (8 slt device with single management) FI-SX800-AC (8 slt device with redundant management) FI-SX1600-AC (16 slt device with redundant management) GS/LS Family with IrnWare OS versin a FLS624 (24 prt stackable) FLS648 (48 prt stackable) FGS624P (24 prt stackable) FGS624P-POE (24 prt stackable with Pwer ver Ethernet) FGS624XGP (24 prt stackable with integrated 10 Gig Interface) FGS624XGP-POE ( 24 prt stackable with integrated 10 Gig Interface with Pwer ver Ethernet) FGS648P (48 prt stackable) FGS648P-POE (48 prt stackable with Pwer ver Ethernet) 8

13 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Edge X family with IrnWare OS versin FESX424 (24 prt stackable) FESX424-PREM (24 prt stackable with full L3 supprt) FESX424+1XG (24 prt stackable with ne prt 10 Gig Interface) FESX424+1XG-PREM (24 prt stackable with ne prt 10 Gig Interface with full L3 supprt) FESX424+2XG (24 prt stackable with tw prt 10 Gig Interface) FESX424+2XG-PREM (24 prt stackable with tw prt 10 Gig Interface with full L3 supprt) FESX448 (48 prt stackable) FESX448-PREM (48 prt stackable with full L3 supprt) FESX448+1XG (48 prt stackable with ne prt 10 Gig Interface) FESX448+1XG-PREM (48 prt stackable with ne prt 10 Gig Interface with full L3 supprt) FESX448+2XG (48 prt stackable with tw prt 10 Gig Interface) FESX448+2XG-PREM (48 prt stackable with tw prt 10 Gig Interface with full L3 supprt) FESX424HF (24 prt stackable (100FX/1000X)) FESX424HF-PREM (24 prt stackable (100FX/1000X) with full L3 supprt) FESX424HF+1XG (24 prt stackable (100FX/1000X) with ne 10 Gig Interface) FESX424HF+1XG-PREM (24 prt stackable (100FX/1000X) with ne 10 Gig Interface with full L3 supprt) FESX424HF+2XG (24 prt stackable (100FX/1000X) with tw 10 Gig Interface) FESX424HF+2XG-PREM (24 prt stackable (100FX/1000X) with tw 10 Gig Interface with full L3 supprt) FESX424-POE (24 prt stackable with Pwer ver Ethernet) FESX424-POE+1XG (24 prt stackable with ne prt 10 Gig Interface and Pwer ver Ethernet) FESX424-POE+2XG (24 prt stackable with tw prt 10 Gig Interface and Pwer ver Ethernet) FESX624 (24 prt stackable with hardware based IPv6 supprt) FESX624-PREM (24 prt stackable with hardware based IPv6 supprt and full L3 supprt) FESX624+2XG (24 prt stackable with hardware based IPv6 supprt and 2 10 Gig Interfaces) 9

14 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters FESX624+2XG-PREM (24 prt stackable with hardware based IPv6 supprt and 2 10 Gig Interfaces and full L3 supprt) FESX648 (48 prt stackable with hardware based IPv6 supprt) FESX648-PREM (48 prt stackable with hardware based IPv6 supprt and full L3 supprt) FESX648+2XG (48 prt stackable with hardware based IPv6 supprt and 2 10 Gig Interfaces) FESX648+2XG-PREM (48 prt stackable with hardware based IPv6 supprt and 2 10 Gig Interfaces and full L3 supprt) FESX624HF (24 prt stackable with hardware based IPv6 supprt (100FX/1000X)) FESX624HF-PREM (24 prt stackable with hardware based IPv6 supprt and full L3 supprt (100FX/1000X)) FESX624HF+2XG (24 prt stackable with hardware based IPv6 supprt and 2 10 Gig Interfaces (100FX/1000X)) FESX624HF+2XG-PREM (24 prt stackable with hardware based IPv6 supprt and 2 10 Gig Interfaces and full L3 supprt) Edge Switch family with IrnWare OS versin a FES2402 (24 prt stackable) FES2402-PREM (24 prt stackable with full L3 supprt) FES4802 (48 prt stackable) FES4802-PREM (48 prt stackable with full L3 supprt) FES9604 (96 prt stackable) FES9604-PREM (96 prt stackable with full L3 supprt) FES12GCF (12 prt stackable) FES12GCF-PREM (12 prt stackable with full L3 supprt) FES2402-POE (24 prt stackable with Pwer ver Ethernet) FES2402-POE-PREM (24 prt stackable with full L3 supprt and Pwer ver Ethernet) FES4802-POE (48 prt stackable with Pwer ver Ethernet) FES4802-POE-PREM (48 prt stackable with full L3 supprt and Pwer ver Ethernet) 10

15 6 VALIDATION REPORT Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Dcumentatin Fllwing is a list f useful dcuments supplied by the develper when dwnlad frm the Fundry Netwrks website r shipped with the prduct. Evaluated: Fundry Switch and Ruter Cmmand Line Interface Reference, December 2007 Fundry Security Guide, December 2007 BigIrn: FastIrn Fundry BigIrn RX Series Installatin Guide, March 2008 Fundry BigIrn RX Series Cnfiguratin Guide, June 2008 Fundry Switch and Ruter Installatin and Basic Cnfiguratin Guide, December 2007 Fundry FastIrn Cmpact Switch Hardware Installatin Guide, December 2007 Fundry FastIrn Cnfiguratin Guide, June Fundry FastIrn GS Cmpact Layer 2 Switch POE and POE-Upgradeable Hardware Installatin Guide, December 2007 Fundry FastIrn LS Layer 2 Cmpact Switch Hardware Installatin Guide, December 2007 Fundry FastIrn X Series Chassis Hardware Installatin Guide, Nvember 2007 Fundry FastIrn Cmpact Switch Hardware Installatin Guide, December 2007 NetIrn: Fundry NetIrn MLX Series Installatin and Basic Cnfiguratin Guide, December 2007 Fundry NetIrn XMR Series Installatin and Basic Cnfiguratin Guide, December 2007 Fundry NetIrn XMR/MLX Cnfiguratin Guide, April 2008 Nt evaluated: Fundry Management Infrmatin Base Reference Release ntes Patch Release Ntes ReadMe MD5_Checksums The security target used is: Fundry Netwrks IrnShield (BigIrn, NetIrn, and FastIrn) Switches and Ruters Security Target, versin 0.92, July 10,

16 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters 7 IT Prduct Testing The evaluatin team applied each EAL 2 ATE CEM wrk unit. The evaluatin team ensured that the TOE perfrmed as described in the functinal specificatin and as stated in the TOE security functinal requirements. The evaluatin team perfrmed the vendr test suite, and devised an independent set f team test and penetratin tests. The vendr tests, team tests, and penetratin tests substantiated the security functinal requirements in the ST. The fllwing tasks were perfrmed by the evaluatin team: The develper test suite was examined and fund t prvide adequate cverage f the security functins. A selectin f the develper tests were run and the results fund t be cnsistent with the results generated by the develper. N vulnerabilities in the TOE were fund during a search f vulnerability databases. Tests devised frm pstulated vulnerabilities in the I&A mechanism revealed n prblems. The fllwing mdels were actually tested; NetIrn XMR Family (mdular) NI-XMR-4-AC (4 slt device) Cde Release IrnWare OS versin a NetIrn MLX Family (mdular) TOE-MLX NI-MLX-4-AC (4 slt device) Cde Release IrnWare OS versin a BigIrn RX Family (mdular) - hstname: TOE-RX BI-RX-4-AC (4 slt device) Cde Release IrnWare OS versin b FastIrn EdgeX Family (stackable -10/100/1000) FESX424HF-PREM (24 prt stackable (100FX/1000X) with full L3 supprt) Cde Release - IrnWare OS versin FastIrn EdgeSwitch Family (stackable-10/100) FES2402-PREM (24 prt stackable with full L3 supprt) Cde Release - IrnWare OS versin a 12

17 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters FastIrn SuperX Series (mdular) hstname: TOE-SX FI-SX1-AC (8 slt device with single management) Cde Release IrnWare OS versin FastIrn GS/LS Family (stackable-10/100/1000)* FGS624P (24 prt stackable) FLS648 (48 prt stackable) Cde Release IrnWare OS versin a The chsen mdels are a sample set f the mdels that are cnsidered the TOE. The set is deem adequate because the nly differences between the mdels with a given family is the number f interface slts available with the chassis and media type. The chassis sizes range frm 4, 8, 16, and 32 slts. Stackable devices prvide either 24 r 48 prts and are either cpper r fiber based. 8 9 Results f the Evaluatin The evaluatin team s assessment f the evaluatin evidence demnstrates that the claims in the ST are met. Additinally, the evaluatin team s perfrmance f a subset f the vendr tests suite, the independent tests, and the penetratin test als demnstrates the accuracy f the claims in the ST. Validatr Cmments/Recmmendatins The Validatrs fund that the evidence reviewed prir and during the Final Validatin Oversight Review (VOR) supprted the determinatin that the evaluatin and all f its activities were perfrmed in accrdance with the CC, the CEM, and CCEVS practices. Sme limitatins and clarificatins f the evaluated prduct are summarized in Sectin 4.1 f this dcument. In additin the fllwing prblem was identified by the CCTL during evaluatin. Errr with the cmmand used t change a user s passwrd. Existing usernames and passwrds cnfigured n a Fundry Device with specific privilege levels (super-user, read-nly, prt-cnfig) can be escalated t the super-user privilege level if the users passwrd is changed withut including the user s privilege level ptin in the syntax. The issue is dcumented in the NIAP-CCEVS Certificatin Appendix A t the Fundry Security Guide and in the Cnfiguratin Guides. 10 Annexes Nt applicable. 13

18 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Security Target The security target fr this prduct s evaluatin is Fundry Netwrks IrnShield (BigIrn, NetIrn, and FastIrn) Switches and Ruters Security Target, versin 0.92, July 10, 2008 Glssary There were n definitins used ther than thse used in the CC r CEM. 14

19 Fundry Netwrks IrnShield (BigIrn, NetIrn, FastIrn, and FastIrn Edge) Switches and Ruters Bibligraphy The Validatin Team used the fllwing dcuments t prduce this Validatin Reprt: [1] Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 1: Intrductin and general mdel, dated August 2005, Versin 2.3. [2] Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 2: Security functinal requirements, dated August 2005, Versin 2.3. [3] Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 2: Annexes, dated August 1999, Versin 2.1. [4] Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 3: Security assurance requirements, dated August 2005, Versin 2.3. [5] Cmmn Evaluatin Methdlgy fr Infrmatin Technlgy Security Part 1: Intrductin and general mdel, dated 1 Nvember 1998, versin 0.6. [6] Cmmn Evaluatin Methdlgy fr Infrmatin Technlgy Security Part 2: Evaluatin Methdlgy, dated August 2005, versin 2.3. [7] Part 2: Evaluatin Methdlgy, Supplement: ALC_FLR - Flaw Remediatin, Versin 1.1, February 2002, CEM-2001/0015R [8] Evaluatin Technical Reprt fr Fundry Netwrks IrnShield (BigIrn, NetIrn, and FastIrn) Switches and Ruters Security Part II, versin 1.0 July 10, 2008 [9] Fundry Netwrks IrnShield (BigIrn, NetIrn, and FastIrn) Switches and Ruters Security Target, versin 0.92, July 10, [10] NIAP Cmmn Criteria Evaluatin and Validatin Scheme fr IT Security, Guidance t Cmmn Criteria Testing Labratries, Versin 1.0, March 20,

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 6 2016 v5.1 Answers 100% 1. Which characteristic f the netwrk layer in the OSI mdel allws carrying packets fr multiple types f cmmunicatins amng many hsts? the de-encapsulatin f headers

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT NetApp Clustered Data ONTAP 8.3.1 28 June 2016 Gvernment f Canada. This dcument is the prperty f the Gvernment f Canada. It shall nt be altered, distributed beynd its

More information

Oracle Primavera Primavera P6 Enterprise Project Portfolio Management

Oracle Primavera Primavera P6 Enterprise Project Portfolio Management Natinal Infrmatin Assurance Partnership Cmmn Criteria Evaluatin and Validatin Scheme Validatin Reprt Oracle Primavera Primavera P6 Enterprise Prject Prtfli Management TM (Versin 6.2.1) Reprt Number: CCEVS-VR-VID10182-2009

More information

CCNA Security v2.0 Chapter 2 Exam Answers

CCNA Security v2.0 Chapter 2 Exam Answers CCNA Security v2.0 Chapter 2 Exam Answers 1. An administratr defined a lcal user accunt with a secret passwrd n ruter R1 fr use with SSH. Which three additinal steps are required t cnfigure R1 t accept

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? CCNA 4 Chapter 8 v5.0 Exam Answers 2015 (100%) 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput

More information

CSPN Security Target. PLC Simatic S range

CSPN Security Target. PLC Simatic S range CSPN Security Target PLC Simatic S7 1500 range Categry Industrial systems: prgrammable lgic cntrller Reference: CSPN-ST-Simatic-S7-1500-Range-1.01 Date: 2017/10/03 Internal cde: SIE009 Cpyright AMOSSYS

More information

Dolby Conference Phone Support Frequently Asked Questions

Dolby Conference Phone Support Frequently Asked Questions Dlby Cnference Phne Supprt Frequently Asked Questins Versin 1.0, 1 Intrductin This dcument prvides sme answers t frequently asked questins abut the Dlby Cnference Phne. Fr mre detailed infrmatin n any

More information

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist This checklist is used t prvide guidance and clarificatin n aspects f the auxillary Startup Service (G2949CA) including Security Pack Installatin and Familiarizatin f yur Agilent 2100 Bianalyzer System

More information

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance

More information

Dynamic Storage (ECS)

Dynamic Storage (ECS) User Guide Dynamic Strage (ECS) Swisscm (Schweiz) AG 1 / 10 Cntent 1 Abut Dynamic Strage... 3 2 Virtual drive, the EMC CIFS-ECS Tl... 4 3 Amazn S3 Brwer... 6 4 Strage Gateway Appliance... 9 5 Amazn S3

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 11 2016 v5.1 Answers 100% 1. A newly hired netwrk technician is given the task f rdering new hardware fr a small business with a large grwth frecast. Which primary factr shuld the technician

More information

EView/400i Management Pack for Systems Center Operations Manager (SCOM)

EView/400i Management Pack for Systems Center Operations Manager (SCOM) EView/400i Management Pack fr Systems Center Operatins Manager (SCOM) Cncepts Guide Versin 7.0 July 2015 1 Legal Ntices Warranty EView Technlgy makes n warranty f any kind with regard t this manual, including,

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This

More information

HP Server Virtualization Solution Planning & Design

HP Server Virtualization Solution Planning & Design Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP

More information

Packet Tracer - Configuring a Zone-Based Policy Firewall (ZPF)

Packet Tracer - Configuring a Zone-Based Policy Firewall (ZPF) Packet Tracer - Cnfiguring a Zne-Based Plicy Firewall (ZPF) Tplgy Addressing Table R1 R2 R3 Device Interface IP Address Subnet Mask Default Gateway Switch Prt G0/1 192.168.1.1 255.255.255.0 N/A S1 F0/5

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. for

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. for Natinal Infrmatin Assurance Partnership Cmmn Criteria Evaluatin and Validatin Scheme Validatin Reprt fr TM BeyndTrust PwerBrker UNIX + Linux Editin V9.1 Reprt Number: CCEVS-VR-VID10691-2016 Dated: August

More information

CCNA Security v2.0 Chapter 9 Exam Answers

CCNA Security v2.0 Chapter 9 Exam Answers CCNA Security v2.0 Chapter 9 Exam Answers 1. Refer t the exhibit. An administratr creates three znes (A, B, and C) in an ASA that filters traffic. Traffic riginating frm Zne A ging t Zne C is denied, and

More information

Point-to-Point Encryption (P2PE)

Point-to-Point Encryption (P2PE) Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard

More information

I. Introduction: About Firmware Files, Naming, Versions, and Formats

I. Introduction: About Firmware Files, Naming, Versions, and Formats Updating Yur CTOG 250 Cmtech Traffic Optimizatin Gateway Firmware I. Intrductin: Abut Firmware Files, Naming, Versins, and Frmats The CTOG 250 Cmtech Traffic Optimizatin Gateway and its CDM 800 Gateway

More information

BlackBerry Server Installation and Upgrade Service

BlackBerry Server Installation and Upgrade Service Server and Upgrade Service Prgram Descriptin ( Install and Upgrade Service Prgram Descriptin ) NOTE: This dcument includes all attached Annexes, is prvided fr infrmatinal purpses nly, and des nt cnstitute

More information

Service Description: Advanced Services Fixed Price

Service Description: Advanced Services Fixed Price Page 1 f 6 Service Descriptin: Advanced Services Fixed Price Cisc WLAN Advise and Implement Services Fixed (ASF-CORE-WLAN) This dcument describes Advanced Services Fixed Price: Cisc WLAN Advise and Implement

More information

CommandCenter Secure Gateway Release Virtual CC

CommandCenter Secure Gateway Release Virtual CC CmmandCenter Secure Gateway Release 5.0.5 Virtual CC Nvember 15, 2010 Versin 5.0.5 prvides the initial release f the CC-SG virtual appliance (Virtual CC). Virtual CC is supprted t run n VMware. Versin

More information

BMC Remedyforce Integration with Remote Support

BMC Remedyforce Integration with Remote Support BMC Remedyfrce Integratin with Remte Supprt 2003-2018 BeyndTrust, Inc. All Rights Reserved. BEYONDTRUST, its lg, and JUMP are trademarks f BeyndTrust, Inc. Other trademarks are the prperty f their respective

More information

CCNA Security v2.0 Chapter 3 Exam Answers

CCNA Security v2.0 Chapter 3 Exam Answers CCNA Security v2.0 Chapter 3 Exam Answers 1. Because f implemented security cntrls, a user can nly access a server with FTP. Which AAA cmpnent accmplishes this? accunting accessibility auditing authrizatin

More information

I. Introduction: About Firmware Files, Naming, Versions, and Formats

I. Introduction: About Firmware Files, Naming, Versions, and Formats I. Intrductin: Abut Firmware Files, Naming, Versins, and Frmats The UT-4500-A Series Upcnverters and DT-4500-A Series Dwncnverters stre their firmware in flash memry, which allws the system t uplad firmware

More information

TPP: Date: October, 2012 Product: ShoreTel PathSolutions System version: ShoreTel 13.x

TPP: Date: October, 2012 Product: ShoreTel PathSolutions System version: ShoreTel 13.x I n n v a t i n N e t w r k A p p N t e TPP: 10320 Date: Octber, 2012 Prduct: ShreTel PathSlutins System versin: ShreTel 13.x Abstract PathSlutins sftware can find the rt-cause f vice quality prblems in

More information

Software Usage Policy Template

Software Usage Policy Template Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/

More information

SOLA and Lifecycle Manager Integration Guide

SOLA and Lifecycle Manager Integration Guide SOLA and Lifecycle Manager Integratin Guide SOLA and Lifecycle Manager Integratin Guide Versin: 7.0 July, 2015 Cpyright Cpyright 2015 Akana, Inc. All rights reserved. Trademarks All prduct and cmpany names

More information

Release Notes. Dell SonicWALL Security firmware is supported on the following appliances: Dell SonicWALL Security 200

Release Notes. Dell SonicWALL  Security firmware is supported on the following appliances: Dell SonicWALL  Security 200 Release Ntes Email Security Dell SnicWALL Email Security 8.0.1 SnicOS Cntents System Cmpatibility... 1 Enhancements in Email Security 8.0.1... 2 Reslved Issues... 3 Upgrading t Email Security 8.0.1...

More information

Application Notes for Stratus ftserver 6310 with VMWare and Avaya Aura Contact Center Release 6.2 Issue 1.0

Application Notes for Stratus ftserver 6310 with VMWare and Avaya Aura Contact Center Release 6.2 Issue 1.0 Avaya Slutin & Interperability Test Lab Applicatin Ntes fr Stratus ftserver 6310 with VMWare and Avaya Aura Cntact Center Release 6.2 Issue 1.0 Abstract These Applicatin Ntes describes the integratin,

More information

CMC Blade BIOS Profile Cloning

CMC Blade BIOS Profile Cloning This white paper describes the detailed capabilities f the Chassis Management Cntrller s Blade BIOS Prfile Clning feature. Authr Crey Farrar This dcument is fr infrmatinal purpses nly and may cntain typgraphical

More information

BMC Remedyforce Integration with Bomgar Remote Support

BMC Remedyforce Integration with Bomgar Remote Support BMC Remedyfrce Integratin with Bmgar Remte Supprt 2017 Bmgar Crpratin. All rights reserved wrldwide. BOMGAR and the BOMGAR lg are trademarks f Bmgar Crpratin; ther trademarks shwn are the prperty f their

More information

Overview of Data Furnisher Batch Processing

Overview of Data Furnisher Batch Processing Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...

More information

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel NiceLabel LMS Installatin Guide fr Single Server Deplyment Rev-1702 NiceLabel 2017. www.nicelabel.cm 1 Cntents 1 Cntents 2 2 Architecture 3 2.1 Server Cmpnents and Rles 3 2.2 Client Cmpnents 3 3 Prerequisites

More information

CCNA Security v2.0 Chapter 10 Exam Answers

CCNA Security v2.0 Chapter 10 Exam Answers CCNA Security v2.0 Chapter 10 Exam Answers 1. Which statement describes the functin prvided t a netwrk administratrwh uses the Cisc Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start

More information

Quick Setup Guide. Aastra MX-ONE V.4.0 Integration with Microsoft OCS 2007 R2. Doc. Nr. ASE/MXO/PLM/ 0123/EN Rev.A

Quick Setup Guide. Aastra MX-ONE V.4.0 Integration with Microsoft OCS 2007 R2. Doc. Nr. ASE/MXO/PLM/ 0123/EN Rev.A Aastra MX-ONE V.4.0 Integratin with Micrsft OCS 2007 R2 Quick Setup Guide Aastra Telecm Sweden AB SE-126 37 Hägersten, Sweden Dc. Nr. ASE/MXO/PLM/ 0123/EN Rev.A www.aastra.cm Cntents 1 Intrductin 3 1.1

More information

Cisco Tetration Analytics, Release , Release Notes

Cisco Tetration Analytics, Release , Release Notes Cisc Tetratin Analytics, Release 1.102.21, Release Ntes This dcument describes the features, caveats, and limitatins fr the Cisc Tetratin Analytics sftware. Additinal prduct Release ntes are smetimes updated

More information

Application Note. Digi Connect Wi-SP Troubleshooting Guide. Digi Technical Support 10 May 2016

Application Note. Digi Connect Wi-SP Troubleshooting Guide. Digi Technical Support 10 May 2016 Applicatin Nte Digi Cnnect Wi-SP Trubleshting Guide Digi Technical Supprt 10 May 2016 Cntents 1 Intrductin... 3 1.1 Assumptins... 3 1.2 Crrectins... 3 2 Quick Facts... 3 2.1 Cmmn Questins Abut the Cnnect

More information

IBM Records Manager V8.4 Security Target

IBM Records Manager V8.4 Security Target IBM Recrds Manager V8.4 Security Target ST Versin 1.0 8 January 2009 Prepared fr: Internatinal Business Machines (IBM) 555 Bailey Avenue San Jse, CA 95161 Prepared By: Science Applicatins Internatinal

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 5 2016 v5.1 Answers 100% 1. What happens t runt frames received by a Cisc Ethernet switch? The frame is drpped. The frame is returned t the riginating netwrk device. The frame is bradcast

More information

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer

More information

Manual for installation and usage of the module Secure-Connect

Manual for installation and usage of the module Secure-Connect Mdule Secure-Cnnect Manual fr installatin and usage f the mdule Secure-Cnnect Page 1 / 1 5 Table f Cntents 1)Cntents f the package...3 2)Features f the mdule...4 3)Installatin f the mdule...5 Step 1: Installatin

More information

USO RESTRITO. SNMP Agent. Functional Description and Specifications Version: 1.1 March 20, 2015

USO RESTRITO. SNMP Agent. Functional Description and Specifications Version: 1.1 March 20, 2015 Functinal Descriptin and Specificatins Versin: 1.1 March 20, 2015 SNMP Agent Simple Netwrk Management Prtcl Optin S fr IE and PM Mdules Supplement t Functinal Descriptin and Specificatins f RUB Ethernet

More information

UPGRADING TO DISCOVERY 2005

UPGRADING TO DISCOVERY 2005 Centennial Discvery 2005 Why Shuld I Upgrade? Discvery 2005 is the culminatin f ver 18 mnths wrth f research and develpment and represents a substantial leap frward in audit and decisin-supprt technlgy.

More information

ROCK-POND REPORTING 2.1

ROCK-POND REPORTING 2.1 ROCK-POND REPORTING 2.1 AUTO-SCHEDULER USER GUIDE Revised n 08/19/2014 OVERVIEW The purpse f this dcument is t describe the prcess in which t fllw t setup the Rck-Pnd Reprting prduct s that users can schedule

More information

To start your custom application development, perform the steps below.

To start your custom application development, perform the steps below. Get Started T start yur custm applicatin develpment, perfrm the steps belw. 1. Sign up fr the kitewrks develper package. Clud Develper Package Develper Package 2. Sign in t kitewrks. Once yu have yur instance

More information

CaseWare Working Papers. Data Store user guide

CaseWare Working Papers. Data Store user guide CaseWare Wrking Papers Data Stre user guide Index 1. What is a Data Stre?... 3 1.1. When using a Data Stre, the fllwing features are available:... 3 1.1.1.1. Integratin with Windws Active Directry... 3

More information

Secure File Transfer Protocol (SFTP) Interface for Data Intake User Guide

Secure File Transfer Protocol (SFTP) Interface for Data Intake User Guide Secure File Transfer Prtcl (SFTP) Interface fr Data Intake User Guide Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 SFTP Access t FINRA... 2 SFTP

More information

OO Shell for Authoring (OOSHA) User Guide

OO Shell for Authoring (OOSHA) User Guide Operatins Orchestratin Sftware Versin: 10.70 Windws and Linux Operating Systems OO Shell fr Authring (OOSHA) User Guide Dcument Release Date: Nvember 2016 Sftware Release Date: Nvember 2016 Legal Ntices

More information

Configure Data Source for Automatic Import from CMDB

Configure Data Source for Automatic Import from CMDB AvailabilityGuard TM Cnfigure Data Surce fr Autmatic Imprt frm CMDB AvailabilityGuard allws yu t cnfigure business entities (such as services, divisins, and applicatins) and assign hsts, databases, and

More information

Planning, installing, and configuring IBM CMIS for Content Manager OnDemand

Planning, installing, and configuring IBM CMIS for Content Manager OnDemand Planning, installing, and cnfiguring IBM CMIS fr Cntent Manager OnDemand Cntents IBM CMIS fr Cntent Manager OnDemand verview... 4 Planning fr IBM CMIS fr Cntent Manager OnDemand... 5 Prerequisites fr installing

More information

Setting up the ncipher nshield HSM for use with Kerberized Certificate Authority

Setting up the ncipher nshield HSM for use with Kerberized Certificate Authority Setting up the ncipher nshield HSM fr use with Kerberized Certificate Authrity Intrductin This dcument cntains instructins fr setting up ncipher nshield hardware security mdules (HSM) fr use with the Kerberized

More information

Launching Xacta 360 Marketplace AMI Guide June 2017

Launching Xacta 360 Marketplace AMI Guide June 2017 Launching Xacta 360 Marketplace AMI Guide June 2017 Tels Crpratin 2017. All rights reserved. U.S. patents Ns. 6,901,346; 6,980,927; 6,983,221; 6,993,448; and 7,380,270. Xacta is a registered trademark

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questins Versin 10-21-2016 Cpyright 2014-2016 Aviatrix Systems, Inc. All rights reserved. Aviatrix Clud Gateway What can it d fr me? Aviatrix Clud Gateway prvides an end t end secure netwrk

More information

ABELMed Platform Setup Conventions

ABELMed Platform Setup Conventions ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require

More information

Table of Contents. WipeDrive Enterprise Logging, March Logging Settings... 3 Log Format Types Audit Log Destination Options...

Table of Contents. WipeDrive Enterprise Logging, March Logging Settings... 3 Log Format Types Audit Log Destination Options... WipeDrive Enterprise Lgging, March 2018 Table f Cntents Lgging Settings... 3 Lg Frmat Types... 4 Plain Text Lg File Optin... 4 Extensible Markup Language (XML) Lg File Optin... 6 Cmma Delimited (CSV) Lg

More information

Release Notes. Dell SonicWALL Security BETA

Release Notes. Dell SonicWALL  Security BETA Release Ntes Email Security Dell SnicWALL Email Security 7.4.1 BETA SnicOS Cntents System Cmpatibility... 1 Enhancements in Email Security 7.4.1... 2 Upgrading t Email Security 7.4.1... 3 Related Technical

More information

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform Supprt Guide Yur New Service Request Prcess: Technical Supprt Reference Guide fr Cisc Custmer Jurney Platfrm September 2018 2018 Cisc and/r its affiliates. All rights reserved. This dcument is Cisc Public

More information

CCNA 1 v5.1 Practice Final Exam Answers %

CCNA 1 v5.1 Practice Final Exam Answers % CCNA 1 v5.1 Practice Final Exam Answers 2016 100% 1. Which term refers t a netwrk that prvides secure access t the crprate ffices by suppliers, custmers and cllabratrs? Internet intranet extranet extendednet

More information

UNSW Technology Policy:

UNSW Technology Policy: UNSW Technlgy Plicy: UNSW Plicy Respnsible Officer Cntact Officer Apprving Authrity UNSW Data Netwrk Cnnectin Plicy Chief Infrmatin Officer Manager Infrastructure Services Supprt UNSW IT Services Ph: x

More information

HPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices

HPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices HPE LadRunner Best Practices Series LadRunner 12.50 Upgrade Best Practices Dcument publicatin date: Nvember 2015 Cntents 1. Intrductin... 3 Overview... 3 Audience... 3 2. Preparatin... 3 Backup assets...

More information

Admin Report Kit for Exchange Server

Admin Report Kit for Exchange Server Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses

More information

OmniPCX Record PCI Compliance 2.3

OmniPCX Record PCI Compliance 2.3 S T R A T E G I C W H I T E P A P E R OmniPCX Recrd PCI Cmpliance 2.3 Alcatel-Lucent Enterprise Services Page 1/11 OmniPCX-Recrd R2.3 PCI Cmpliance White Paper Legal ntice Alcatel, Lucent, Alcatel-Lucent

More information

Rapid Implementation Package

Rapid Implementation Package Implementatin Package Implementatin 1 Purpse The purpse f this dcument is t detail thse services BuildingPint NrthEast ( BPNE ) will prvide as part f the Prlg Rapid Implementatin Package. This package

More information

Oracle Universal Records Management Oracle Universal Records Manager Adapter for Documentum Installation Guide

Oracle Universal Records Management Oracle Universal Records Manager Adapter for Documentum Installation Guide Oracle Universal Recrds Management Oracle Universal Recrds Manager Adapter fr Dcumentum Installatin Guide December 2009 Universal Recrds Manager Adapter fr Dcumentum Installatin Guide, Cpyright 2009, Oracle.

More information

Department of Computer Information Systems KEMU

Department of Computer Information Systems KEMU Advanced DBMS: CISY 423 Department f Cmputer Infrmatin Systems KEMU Database Security OBJECTIVES Database Security and Authrizatin Database Users Creating Users/Accunts in cmmercial DBMS Discretinary Access

More information

Secure Mobile Access to the Local ICS Network. Jan Vossaert Veilige industriële netwerken 29/09/2016

Secure Mobile Access to the Local ICS Network. Jan Vossaert Veilige industriële netwerken 29/09/2016 Secure Mbile Access t the Lcal ICS Netwrk Jan Vssaert Veilige industriële netwerken 29/09/2016 Intrductin ffice netwrk prductin cell ruter 192.168.2.0/24 Internet ICS DMZ servers 192.168.1.0/24 prductin

More information

SafeDispatch SDR Gateway for MOTOROLA TETRA

SafeDispatch SDR Gateway for MOTOROLA TETRA SafeDispatch SDR Gateway fr MOTOROLA TETRA SafeMbile ffers a wrld f wireless applicatins that help rganizatins better manage their mbile assets, fleet and persnnel. Fr mre infrmatin, see www.safembile.cm.

More information

Single File Upload Guide

Single File Upload Guide Single File Uplad Guide August 15, 2018 Versin 9.6.134.78 Single File Uplad Guide 1 Fr the mst recent versin f this dcument, visit ur dcumentatin website. Single File Uplad Guide 2 Table f Cntents 1 Single

More information

Summary. Server environment: Subversion 1.4.6

Summary. Server environment: Subversion 1.4.6 Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin

More information

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools. Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are

More information

Introduction to Mindjet on-premise

Introduction to Mindjet on-premise Intrductin t Mindjet n-premise Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 www.mindjet.cm 2012 Mindjet. All Rights Reserved

More information

UNMETERED LOAD GUIDELINE - DETERMINATION OF DEVICE LOAD AND ANNUAL ENERGY CONSUMPTION FOR UNMETERED DEVICE TYPES

UNMETERED LOAD GUIDELINE - DETERMINATION OF DEVICE LOAD AND ANNUAL ENERGY CONSUMPTION FOR UNMETERED DEVICE TYPES UNMETERED LOAD GUIDELINE - DETERMINATION OF DEVICE LOAD AND ANNUAL ENERGY CONSUMPTION FOR UNMETERED DEVICE TYPES PREPARED BY: Market Develpment DOCUMENT REF: VERSION: 1.0 DATE: Nvember 2013 STATUS Draft

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

Re-Flashing Your CDM-760 Advanced High-Speed Trunking Modem

Re-Flashing Your CDM-760 Advanced High-Speed Trunking Modem Re-Flashing Yur CDM-760 Advanced High-Speed Trunking Mdem I. Intrductin: Firmware Files, Naming, Versins, and Frmats Make sure t perate the CDM-760 with its latest available firmware. Befre attempting

More information

VMware EVO:RAIL Customer Release Notes

VMware EVO:RAIL Customer Release Notes VMware EVO:RAIL Custmer Release Ntes EVO:RAIL Release 1.2.0 Dcument Revisin: 1.2.0-2 (May 27, 2015) Cpyright 1998-2015 VMware, Inc. All rights reserved. Cpyright, trademark, and patent infrmatin: http://pubs.vmware.cm/cpyright-trademark.html.

More information

Packet Tracer - Skills Integration Challenge Topology

Packet Tracer - Skills Integration Challenge Topology Packet Tracer - Skills Integratin Challenge Tplgy 2015 Cisc and/r its affiliates. All rights reserved. This dcument is Cisc Public. Page 1 f 6 Packet Tracer - Skills Integratin Challenge Addressing Table

More information

ADSS Server Evaluation Quick Guide

ADSS Server Evaluation Quick Guide ADSS Server Evaluatin Quick Guide This dcument aims t prvide a quick d this and it wrks guide t evaluating ADSS Enterprise Server as a PDF Signing Server bth fr server-side signing and als fr client-side

More information

INTELLISNAP. TECHNOLOGY QUICK START GUIDE Pure Storage FlashArray. Publish Date: July 30, 2015 Distribution: Public Author: Jonathan Howard

INTELLISNAP. TECHNOLOGY QUICK START GUIDE Pure Storage FlashArray. Publish Date: July 30, 2015 Distribution: Public Author: Jonathan Howard INTELLISNAP TECHNOLOGY QUICK START GUIDE Pure Strage FlashArray Publish Date: July 30, 2015 Distributin: Public Authr: Jnathan Hward Quick Start Guide This quick start guide is intended t launch users

More information

CONTROL-COMMAND. Software Technical Specifications for ThomX Suppliers 1.INTRODUCTION TECHNICAL REQUIREMENTS... 2

CONTROL-COMMAND. Software Technical Specifications for ThomX Suppliers 1.INTRODUCTION TECHNICAL REQUIREMENTS... 2 Réf. ThmX-NT-SI-CC001 Table f Cntents Sftware Technical Specificatins fr ThmX Authr : Philippe Page 1 / 9 1.INTRODUCTION... 2 2.TECHNICAL REQUIREMENTS... 2 3.DOCUMENTATION REQUIREMENTS... 4 4.COMPUTING

More information

MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION

MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION These release ntes pertain t the Prductin release fr MySabre Release 7.0 cntaining MySabre API

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Xceedium Gatekeeper Version 3.6 Report Number: CCEVS-VR-06-0048 Dated: 31 October 2006 Version:

More information

Additional License Authorizations

Additional License Authorizations Additinal License Authrizatins Fr HPE CMS SIM Management sftware prducts Prducts and suites cvered PRODUCTS E-LTU OR E-MEDIA AVAILABLE * NON-PRODUCTION USE OPTION HPE Dynamic SIM Prvisining Yes Yes HPE

More information

WELMEC Guide on evaluation of Purely Digital Parts

WELMEC Guide on evaluation of Purely Digital Parts WELMEC 10.10 2016 Guide n evaluatin f Purely Digital Parts WELMEC is a cperatin between the legal metrlgy authrities f the Member States f the Eurpean Unin and EFTA. This dcument is ne f a number f Guides

More information

E-Lock Policy Manager White Paper

E-Lock Policy Manager White Paper White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...

More information

Telkom VPN-Lite router setup User Manual Billion 800VGT

Telkom VPN-Lite router setup User Manual Billion 800VGT Telkm VPN-Lite ruter setup User Manual Billin 800VGT Cntents 1. Intrductin... 3 2. Befre yu start... 4 3. VPN-Lite Setup Using Windws Utility... 5 4. VPN-Lite Setup using yur web brwser... 7 5. VPN-Lite

More information

Avocent Universal Management Gateway Appliance Plug-in for the Avocent DSView 4.5 Management Software Release Notes

Avocent Universal Management Gateway Appliance Plug-in for the Avocent DSView 4.5 Management Software Release Notes VERTIV Avcent Universal Management Gateway Appliance Plug-in fr the Avcent DSView 4.5 Management Sftware Release Ntes VERSION 4.2.0.33, SEPTEMBER 14, 2018 Release Ntes Sectin Outline 1 System Requirements

More information

ABELDent Platform Setup Conventions

ABELDent Platform Setup Conventions ABELDent Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELDent licensees and their hardware vendrs with the infrmatin that they will require

More information

Element Creator for Enterprise Architect

Element Creator for Enterprise Architect Element Creatr User Guide Element Creatr fr Enterprise Architect Element Creatr fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins... 3 Installatin... 4 Verifying the

More information

Interoperability between ProCurve WESM zl and HP ipaq Voice Messenger smartphone

Interoperability between ProCurve WESM zl and HP ipaq Voice Messenger smartphone An HP PrCurve Netwrking Applicatin Nte Interperability between PrCurve WESM zl and HP ipaq Vice Messenger smartphne Cntents 1. Intrductin... 3 2. Prerequisites... 3 3. Netwrk architecture... 3 4. Secure

More information

Aloha Offshore SDLC Process

Aloha Offshore SDLC Process Alha Sftware Develpment Life Cycle Alha Offshre SDLC Prcess Alha Technlgy fllws a sftware develpment methdlgy that is derived frm Micrsft Slutins Framewrk and Ratinal Unified Prcess (RUP). Our prcess methdlgy

More information

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SYSTEM FUNCTIONS... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE OASIS SYSTEM... 3 SUBMITTING OASIS DATA FILES... 5 OASIS INITIAL

More information

Managing User Accounts

Managing User Accounts A variety f user types are available in Lighthuse Transactin Manager (LTM) with cnfigurable permissins that allw the Accunt Administratr and administratr-type users fr the accunt t manage the abilities

More information

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the. 1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding

More information

CounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation.

CounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation. CunterSnipe Sftware Installatin Guide Sftware Versin 10.x.x CunterSnipe sftware installs n any system cmpatible with Ubuntu 14.04 LTS server which is supprted until 2019 Initial Set-up- Nte: An internet

More information

Extended Traceability Report for Enterprise Architect

Extended Traceability Report for Enterprise Architect Extended Traceability Reprt User Guide Extended Traceability Reprt fr Enterprise Architect Extended Traceability Reprt fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins

More information

BME Smart-Colo. Smart-Colo is a solution optimized for the colocation of trading applications, built and managed by BME.

BME Smart-Colo. Smart-Colo is a solution optimized for the colocation of trading applications, built and managed by BME. BME Smart-Cl 1. Intrductin The aim f this dcument is t describe the BME Smart-Cl service fr accessing BME Cash, BME Derivative markets and market data feeds. Smart-Cl service prvides at the BME Data Center

More information

CCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%)

CCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%) CCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%) 1. Which tw netwrk design features require Spanning Tree Prtcl (STP) t ensure crrect netwrk peratin? (Chse tw.) static default rutes implementing VLANs t

More information

HW4 Software version 3. Device Manager and Data Logging LOG-RC Series Data Loggers

HW4 Software version 3. Device Manager and Data Logging LOG-RC Series Data Loggers Page 1 f 18 HW4 Sftware versin 3 Device Manager and Data Lgging LOG-RC Series Data Lggers 2011; Page 2 f 18 Table f cntents 1 ORGANIZATION OF THE HW4 MANUALS... 3 2 OVERVIEW... 4 3 INITIAL SETUP... 4 3.1

More information

Patch Management Policy

Patch Management Policy Patch Management Plicy (Versin 1) Dcument Cntrl Infrmatin: Date: 21/5/18 Master Tracking Name Patch Management Plicy Master Tracking Reference Owning Service / Department Exeter IT Issue: 1 Apprvals: Authrs:

More information