BLUE COAT SG510 PDF

This certification report, and its associated certificate, apply only to the identified version and release of the product in its evaluated configuration. The evaluation has been conducted in accordance with the provisions of the CCS, and the conclusions of the evaluation facility in the evaluation report are consistent with the evidence adduced. This report, and its associated certificate, are not an endorsement of the IT product by the Communications Security Establishment Canada, or any other organization that recognizes or gives effect to this report, and its associated certificate, and no warranty for the IT product by the Communications Security Establishment Canada, or any other organization that recognizes or gives effect to this report, and its associated certificate, is either expressed or implied. By awarding a Common Criteria certificate, the CCS Certification Body asserts that the product complies with the security requirements specified in the associated security target. A security target is a requirements specification document that defines the scope of the evaluation activities. The consumer of certified IT products should review the security target, in addition to this certification report, in order to gain an understanding of any assumptions made during the evaluation, the IT product's intended environment, its security requirements, and the level of confidence i.

Author:Moogutilar Gar
Country:Saint Lucia
Language:English (Spanish)
Genre:Education
Published (Last):16 April 2007
Pages:12
PDF File Size:4.97 Mb
ePub File Size:1.4 Mb
ISBN:469-7-35324-204-4
Downloads:82724
Price:Free* [*Free Regsitration Required]
Uploader:Arashilar



This certification report, and its associated certificate, apply only to the identified version and release of the product in its evaluated configuration. The evaluation has been conducted in accordance with the provisions of the CCS, and the conclusions of the evaluation facility in the evaluation report are consistent with the evidence adduced. This report, and its associated certificate, are not an endorsement of the IT product by the Communications Security Establishment Canada, or any other organization that recognizes or gives effect to this report, and its associated certificate, and no warranty for the IT product by the Communications Security Establishment Canada, or any other organization that recognizes or gives effect to this report, and its associated certificate, is either expressed or implied.

By awarding a Common Criteria certificate, the CCS Certification Body asserts that the product complies with the security requirements specified in the associated security target. A security target is a requirements specification document that defines the scope of the evaluation activities. The consumer of certified IT products should review the security target, in addition to this certification report, in order to gain an understanding of any assumptions made during the evaluation, the IT product's intended environment, its security requirements, and the level of confidence i.

This certification report is associated with the certificate of product evaluation dated 6 March , and the security target identified in Section 4 of this report. ProxySG is a product family that provides traffic acceleration and a layer of security between an internal network and an external network typically an office network and the Internet by enforcing information flow rules on selected traffic protocols.

The scope of the evaluation is defined by the security target, which identifies assumptions made during the evaluation, the intended environment for ProxySG, the security requirements, and the level of confidence evaluation assurance level at which the product is intended to satisfy the security requirements.

Consumers are advised to verify that their operating environment is consistent with that specified in the security target, and to give due consideration to the comments, observations and recommendations in this certification report. The results documented in the Evaluation Technical Report ETR Footnote 1 for this product provide sufficient evidence that it meets the EAL 2 augmented assurance requirements for the evaluated security functionality.

The following Government of Canada approved cryptographic algorithms were evaluated for correct implementation in ProxySG:. ProxySG implements an Administrative Access Policy that defines the rules for access to administrative functions; a Proxy Policy that defines the rules for traffic flow; and a WAN Optimization Policy that defines the rules for traffic optimization and acceleration.

In addition, ProxySG implements policies pertaining to security audit, cryptographic support, identification and authentication, security management, protection of the TSF, resource utilization, and TOE access. Consumers of ProxySG should consider assumptions about usage and environmental settings as requirements for the product's installation and its operating environment.

This will ensure the proper and secure operation of ProxySG. The ProxySG was designed and intended for use in a structured corporate environment where users will not typically be allowed to install programs on their machines, or change system settings. Protection against attacks such as Session Hijacking Footnote 2 and Traffic Interception fall outside the ProxySG intended use, and should be addressed by other security mechanisms such as firewalls and Intrusion Detection Systems. The evaluation analysis activities involved a structured evaluation of ProxySG including the following areas:.

The evaluators analyzed the ProxySG functional specification and design documentation and determined that the design completely and accurately instantiated the security functional requirements. The evaluators analyzed the ProxySG security architectural description and determined that the initialization process was secure, that the security functions are protected against tamper and bypass, and that security domains are maintained.

The evaluators examined the ProxySG preparative user guidance and operational user guidance and determined that it sufficiently and unambiguously described how to securely transform the TOE into its evaluated configuration and how to use and administer the product. The evaluators examined and tested the preparative and operational guidance, and determined that they were complete and sufficiently detailed to result in a secure configuration. An analysis of the ProxySG configuration management system and associated documentation was performed.

The evaluators found that the ProxySG configuration items were clearly marked. The developer's configuration management system was observed during a site visit, and it was found to be mature and well developed. The evaluators examined the delivery documentation and determined that it described all of the procedures required to maintain the integrity of ProxySG during distribution to the consumer. The evaluators reviewed the flaw remediation procedures used by Blue Coat Systems, Inc.

During a site visit, the evaluators also examined the evidence generated by adherence to the procedures. The evaluators concluded that the procedures are adequate to track and correct security flaws, and distribute the flaw information and corrections to consumers of the product. The evaluators conducted an independent vulnerability analysis of ProxySG. Additionally, the evaluators conducted a search of public domain vulnerability databases to identify ProxySG potential vulnerabilities.

The evaluators identified potential vulnerabilities for testing applicable to the ProxySG in its operational environment. Testing at EAL 2 consists of the following three steps: assessing developer tests, performing independent functional tests, and performing penetration tests. The evaluators verified that the developer has met their testing responsibilities by examining their test evidence, and reviewing their test results, as documented in the ETR Footnote 3. The evaluators analyzed the developer's test coverage analysis and found it to be complete and accurate.

The correspondence between the tests identified in the developer's test documentation and the functional specification was complete. During this evaluation, the evaluator developed independent functional tests by examining design and guidance documentation, examining the developer's test documentation, executing a sample of the developer's test cases, and creating test cases that augmented the developer tests. All testing was planned and documented to a sufficient level of detail to allow repeatability of the testing procedures and results.

Subsequent to the independent review of public domain vulnerability databases and all evaluation deliverables, limited independent evaluator penetration testing was conducted. The penetration tests focused on:.

The independent penetration testing did not uncover any exploitable vulnerabilities in the anticipated operating environment. The ProxySG was subjected to a comprehensive suite of formally documented, independent functional and penetration tests. The detailed testing activities, including configurations, procedures, test cases, expected results and observed results are documented in a separate Test Results document. The developer's tests and the independent functional tests yielded the expected results, giving assurance that the ProxySG behaves as specified in its ST and functional specification.

The overall verdict for the evaluation is PASS. These results are supported by evidence in the ETR. Consumers should review the security aspects of the intended environment defined in Section 3 of the ST when deploying the ProxySG. Return to footnote 1 referrer. Session Hijacking refers to the exploitation of a valid computer session to gain unauthorised access to information or services in a computer system. Return to footnote 2 referrer.

Return to footnote 3 referrer. Skip to main content Skip to footer. Return to footnote 1 referrer Footnote 2 Session Hijacking refers to the exploitation of a valid computer session to gain unauthorised access to information or services in a computer system.

KALARIPAYATTU BOOKS PDF

Blue Coat ProxySG v5.3.1.9 Appliance Build Number 36410 running on the SG510, SG810, and SG8100

We welcome any independent party to inspect motor vehicles on your behalf. This is highly recommended in the case you cannot see the car yourself. The information is intended as a guide only and ALLBIDS gives no guarantee or warranty about the accuracy of the information contained within. You can also organise your own courier or contact our Trusted Shipping Partner for overweight goods below:. Items listed as 'USED' have experienced usage by consumers. Items may show signs of wear and in some instances accessories may vary from the standard for example, software or manuals may be missing or different, no original packaging. Please check the description for further explanation of the item condition as we make no guarantees as to its working order.

PROBIOTICOS Y PREBIOTICOS PDF

Blue Coat SG510 Series SG510-A - security appliance Specs

Stock Unlimited availability. The foundation of Blue Coat's application delivery infrastructure, Blue Coat SG appliances establish points of control that accelerate and secure business applications for users across the distributed organization. As the world leading proxy appliance, the Blue Coat SG is a powerful yet flexible tool for improving both application performance and security. The Blue Coat SG Series provides small enterprises and remote offices a 1U rack mount proxy appliance with secure remote administration features.

CHARLES BERNSTEIN ARTIFICE OF ABSORPTION PDF

Specifications

.

Related Articles