EasyManuals Logo
Home>Cisco>Switch>Catalyst 4503-E

Cisco Catalyst 4503-E User Manual

Cisco Catalyst 4503-E
88 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #2 background imageLoading...
Page #2 background image
Cisco Cat4K NDPP ST 11 March 2014
EDCS-1228241
2
Table of Contents
1 Security Target Introduction ................................................................................................... 6
1.1 Security Target and TOE Identification ............................................................... 6
1.2 Acronyms and Abbreviations ............................................................................... 6
1.3 TOE Overview ..................................................................................................... 8
1.3.1 TOE Evaluated Configuration ...................................................................... 8
1.3.2 TOE Type...................................................................................................... 9
1.3.3 Required non-TOE Hardware/Software/Firmware ....................................... 9
1.4 TOE Description ................................................................................................ 10
1.4.1 TOE Architecture and Security Capabilities............................................... 10
1.5 TOE Environment and Configuration ................................................................ 11
1.6 Physical Scope of the TOE................................................................................. 13
1.6.1 USB Console Port ....................................................................................... 23
1.6.2 Network Ports ............................................................................................. 23
1.6.3 Serial Port.................................................................................................... 23
1.6.4 Compact Flash Slot ..................................................................................... 24
1.6.5 Physical Scope of the TOE ......................................................................... 24
1.7 Logical Scope of the TOE .................................................................................. 24
1.7.1 Security Audit ............................................................................................. 25
1.7.2 Cryptographic Support ................................................................................ 25
1.7.3 User Data Protection ................................................................................... 25
1.7.4 Identification and Authentication ............................................................... 26
1.7.5 Security Management ................................................................................. 26
1.7.6 Protection of the TSF .................................................................................. 27
1.7.7 Resource Utilization.................................................................................... 28
1.7.8 TOE Access ................................................................................................ 28
1.7.9 Trusted Path/Channels ................................................................................ 28
1.8 Excluded Functionality ...................................................................................... 28
2 Conformance Claims ............................................................................................................ 30
2.1 Common Criteria Conformance Claim .............................................................. 30
2.2 Protection Profile Conformance Claim .............................................................. 30
2.3 Protection Profile Conformance Claim Rationale .............................................. 30
2.3.1 TOE Appropriateness.................................................................................. 30
2.3.2 TOE Security Problem Definition Conformance ........................................ 30
2.3.3 Statement of Security Objectives Conformance ......................................... 30
2.3.4 Statement of Security Requirements Conformance .................................... 31
3 Security Problem Definition ................................................................................................. 32
3.1 Introduction ........................................................................................................ 32
3.2 External Entities ................................................................................................. 32
3.3 Assets ................................................................................................................. 32
3.3.1 Primary Assets ............................................................................................ 32
3.3.2 Secondary Assets ........................................................................................ 33
3.4 Assumptions ....................................................................................................... 33

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 4503-E and is the answer not in the manual?

Cisco Catalyst 4503-E Specifications

General IconGeneral
BrandCisco
ModelCatalyst 4503-E
CategorySwitch
LanguageEnglish

Related product manuals