Brocade Communications Systems Brocade Superx Series User Manual Page 13

  • Download
  • Add to my manuals
  • Print
  • Page
    / 14
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 12
VALIDATION REPORT
Brocade Communications Systems, Inc. FastIron SX, ICX, and FCX Series Switch/Router
9
ICX Series Hardware Platforms (ICX 6610-24, ICX 6610-24F, ICX 6610-24P, ICX 6610-48, and
ICX 6610-48P), and
FCX Series Hardware Platforms (FCX 624S, FCX 624S-HPOE-ADV, FCX 624S-F-ADV, FCX
648S, and FCX 648S-HPOE-ADV).
9 Results of the Evaluation
The evaluation was conducted based upon the assurance activities specified in Security Requirements for
Network Devices, Version 1.1, 8 June 2012 (NDPP), in conjunction with version 3.1, revision 3 of the CC
and the CEM. A verdict for an assurance component is determined by the resulting verdicts assigned to
the corresponding evaluator action elements. The evaluation team assigned a Pass, Fail, or Inconclusive
verdict to each work unit of each assurance component. For Fail or Inconclusive work unit verdicts, the
evaluation team advised the developer of issues requiring resolution or clarification within the evaluation
evidence. In this way, the evaluation team assigned an overall Pass verdict to the assurance component
only when all of the work units for that component had been assigned a Pass verdict.
The validation team’s assessment of the evidence provided by the evaluation team is that it demonstrates
that the evaluation team performed the assurance activities in the NDPP, and correctly verified that the
product meets the claims in the ST.
The details of the evaluation are recorded in the Evaluation Technical Report (ETR), which is controlled
by the Leidos CCTL. The security assurance requirements are listed in the following table.
TOE Security Assurance Requirements
Assurance Component ID
Assurance Component Name
ADV_FSP.1
Basic functional specification
AGD_OPE.1
Operational user guidance
AGD_PRE.1
Preparative procedures
ALC_CMC.1
Labeling of the TOE
ALC_CMS.1
TOE CM coverage
ATE_IND.1
Independent testing - conformance
AVA_VAN.1
Vulnerability survey
10 Validator Comments/Recommendations
The validators suggest that the consumer pay particular attention to the evaluated configuration of the
device(s). In order to remain CC compliant, the device(s) must first be configured into FIPS mode, then
into Common Criteria mode as specified in the Brocade FIPS Configuration Manual. Note that the
product includes FIPS validated cryptographic algorithms.
Please note that the functionality evaluated is scoped exclusively to the security functional requirements
specified in the Security Target. Other functionality included in the product was not assessed as part of
this evaluation. Please note further that certain network related functionality is excluded from the
approved configuration and that some networking functions relative to the devices were not tested, nor are
any claims made relative to their security.
Page view 12
1 2 ... 8 9 10 11 12 13 14

Comments to this Manuals

No comments