System information
Cisco Cat3K ST 6 June 2012
6
1 SECURITY TARGET INTRODUCTION
The Security Target contains the following sections:
• Security Target Introduction [Section 1]
• Conformance Claims [Section 2]
• Security Problem Definition [Section 3]
• Security Objectives [Section 4]
• IT Security Requirements [Section 5]
• TOE Summary Specification [Section 6]
• Rationale [Section 7]
The structure and content of this ST comply with the requirements specified in the
Common Criteria (CC), Part 1, Annex A, and Part 3, Chapter 4.
1.1 ST and TOE Reference
This section provides information needed to identify and control this ST and its TOE.
Table 1 ST and TOE Identification
ST Title
Cisco Catalyst Switches (3560-X and 3750-X) Security Target
ST Version
1.0
Publication Date
6 June 2012
ST Author
Cisco Systems, Inc.
Developer of the TOE
Cisco Systems, Inc.
TOE Reference
Cisco Catalyst Switches (3560-X and 3750-X)
TOE Hardware Models
Cisco Catalyst Switches 3560-X and 3750-X
TOE Software Version
IOS 15.0(1)SE2
ST Evaluation Status
In Evaluation
Keywords
Audit, Authentication, Encryption, Information Flow, Protection, Switch, Traffic
1.2 Acronyms and Abbreviations
The following acronyms and abbreviations are used in this Security Target:
Table 2 Acronyms
Acronyms /
Abbreviations
Definition
AAA Administration, Authorization, and Accounting
ACL Access Control List
AES Advanced Encryption Standard
BGP Border Gateway Protocol. An exterior gateway protocol. It performs routing between
multiple autonomous systems and exchanges routing and reachability information with
other BGP systems.
CC Common Criteria for Information Technology Security Evaluation
CEM Common Evaluation Methodology for Information Technology Security
CLI Command Line Interface
CM Configuration Management