NetScreen Appliances Security Target: EAL4 ... Juniper Networks Security Appliances Security Target

  • View
    0

  • Download
    0

Embed Size (px)

Text of NetScreen Appliances Security Target: EAL4 ... Juniper Networks Security Appliances Security Target

  • Juniper Networks Security Appliances Security Target:

    EAL4

    Revision L

    December 19, 2005

    P/N - 093-0896-000

    Prepared for: Juniper Networks

    1194 North Mathilda Ave. Sunnyvale, California 94089-1206

    http://www.juniper.net

    Prepared By: Science Applications International Corporation

    Common Criteria Testing Laboratory 7125 Columbia Gateway Drive, Suite 300

    Columbia, MD 21046 http://www.saic.com/

    and

    EnPointe Technologies Inc. 8310 N. Capital of Texas Highway, Ste 305

    Austin, TX 78731 http://www.enpointe.com

    RESTRICTED RIGHTS LEGEND

    USE, DUPLICATION, OR DISCLOSURE IS SUBJECT TO THE RESTRICTIONS AS SET FORTH IN SUBPARAGRAPH [C][1][II] OF THE RIGHTS IN TECHNICAL DATA AND COMPUTER SOFTWARE CLAUSE OF DFARS 252.227-7013 (OR AT FAR 52.227 [C][1]).

    http://www.enpointe.com/ http://www.saic.com/ http://www.juniper.net/

  • Juniper Networks Security Appliances Security Target Revision L December 19, 2005 EAL4

    TABLE OF CONTENTS

    1.0 Security Target Introduction ................................................................................................................... 4 1.1 Security Target, TOE and CC Identification .......................................................................................... 4 1.2 Conformance Claims .............................................................................................................................. 6 1.3 Strength of Environment ......................................................................................................................... 6 1.4 Conventions, Terminology, and Acronyms ............................................................................................ 6

    1.4.1 Conventions ..................................................................................................................................... 6 1.4.2 Terminology and Acronyms ............................................................................................................ 7

    2.0 TOE Description ...................................................................................................................................... 8 2.1 Product Type ........................................................................................................................................... 8 2.2 Product Description ................................................................................................................................ 9

    2.2.1 Hardware ........................................................................................................................................ 9 2.2.2 ScreenOS ........................................................................................................................................ 9 2.2.3 Policies .......................................................................................................................................... 10 2.2.4 Services .......................................................................................................................................... 10

    2.3 Product Features ................................................................................................................................... 11 2.4 TOE Configurations .............................................................................................................................. 11

    2.4.1 Interface Modes ............................................................................................................................. 11 2.4.2 VPN ............................................................................................................................................... 15

    2.5 Security Environment TOE Boundary .................................................................................................. 16 2.5.1 Physical Boundaries ...................................................................................................................... 16 2.5.2 Logical Boundaries ....................................................................................................................... 17

    3.0 Security Environment ............................................................................................................................ 21 3.1 Threats to Security ................................................................................................................................ 21 3.2 Secure Usage Assumptions ................................................................................................................... 22

    3.2.1 Personnel Assumptions ................................................................................................................. 22 3.2.2 Physical Assumptions .................................................................................................................... 22 3.2.3 Logical Assumptions ..................................................................................................................... 22

    4.0 Security Objectives ................................................................................................................................ 23 4.1 IT Security Objectives ......................................................................................................................... 23 4.2 Security Objectives for the Environment ............................................................................................. 24

    5.0 IT Security Requirements ..................................................................................................................... 25 5.1 TOE Security Functional Requirements ...............................................

Recommended

View more >