
Security Target Version 1.02, 08/16/2013
reproduced in this Security Target to ensure they are within scope of the corresponding evaluation.
However, at the present time international recognition of the evaluation results is limited to defined
assurance packages, such as EAL1, and does not extend to Scheme-defined assurance extensions or
refinements.
1.3 Conventions
The following conventions have been applied in this document:
Security Functional Requirements – Part 2 of the CC defines the approved set of operations that may be
applied to functional requirements: iteration, assignment, selection, and refinement.
o Iteration: allows a component to be used more than once with varying operations. In the ST,
iteration is indicated by a number in parentheses placed at the end of the component. For example
FDP_ACC.1(1) and FDP_ACC.1(2) indicate the ST includes two iterations of the FDP_ACC.1
requirement, (1) and (2).
o Assignment: allows the specification of an identified parameter. Assignments are indicated using
bold and are surrounded by brackets (e.g., [assignment]). An assignment within a selection would
be identified in italics and with embedded bold brackets (e.g., [[selected-assignment]]).
o Selection: allows the specification of one or more elements from a list. Selections are indicated
using bold italics and are surrounded by brackets (e.g., [selection]).
o Refinement: allows the addition of details. Refinements are indicated using bold, for additions,
and strike-through, for deletions (e.g., “… all objects …” or “… some big things …”). ‘Cases’
that are not applicable in a given SFR have simply been removed without any explicit
identification.
The NDPP uses an additional convention – the ‘case’ – which defines parts of an SFR that apply only when
corresponding selections are made or some other identified conditions exist. Only the applicable cases are
identified in this ST and they are identified using bold text.
Other sections of the ST – Other sections of the ST use bolding to highlight text of special interest, such as
captions.
2. TOE Description
The Target of Evaluation (TOE) is the Hewlett-Packard Network family of switches. The Network switches in the
evaluated configuration include the 5120, 5500, 5800, 5820, 7500, 9500 and 12500 series. Each series of this family
consists of a set of distinct devices (as identified in section 1.1) which vary primarily according to power delivery,
performance, and port density.
While most of the Network switches have fixed ports, they all support plug-in modules (or blades) that provide
additional functionality (e.g., various numbers and types of network connection ports). With the exception of
pluggable security blades, all of the available plug-in modules are included in the evaluated configuration (see
below). The security blades offer additional advanced (e.g., firewall) security functions and are intended to be
addressed in an alternate evaluation.
The TOE can be deployed as a single Network device or alternately as a group of Network devices connected using
the HP Intelligent Resilient Framework (IRF) technology to effectively form a logical switch device. The IRF
technology requires Network device be directly connected to one another using an IRF stack utilizing one or more
dedicated Ethernet connections that are used to coordinate the overall logical switch configuration and also to
forward applicable network traffic as necessary between attached devices.
Kommentare zu diesen Handbüchern