National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. Juniper Networks Security Appliances

Size: px
Start display at page:

Download "National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. Juniper Networks Security Appliances"

Transcription

1 Natinal Infrmatin Assurance Partnership Cmmn Criteria Evaluatin and Validatin Scheme TM Validatin Reprt Juniper Netwrks Security Appliances Reprt Number: CCEVS-VR Dated: 28 June 2012 Versin: 1.0 Natinal Institute f Standards and Technlgy Natinal Security Agency Infrmatin Technlgy Labratry Infrmatin Assurance Directrate 100 Bureau Drive 9800 Savage Rad STE 6940 Gaithersburg, MD Frt Gerge G. Meade, MD

2 Juniper Netwrks Security Appliances ACKNOWLEDGEMENTS Validatin Team Jandria S. Alexander The Aerspace Crpratin Dr. Patrick W. Mallett The MITRE Crpratin Cmmn Criteria Testing Labratry SAIC Clumbia, MD ii

3 Juniper Netwrks Security Appliances Table f Cntents 1 Executive Summary Evaluatin Details Interpretatins Threats Organizatinal Security Plicies Identificatin Security Plicy Security audit Cryptgraphic supprt User data prtectin Identificatin and authenticatin Security management Prtectin f the TSF Assumptins Architectural Infrmatin Dcumentatin Prduct Testing Develper Testing Evaluatin Team Independent Testing Penetratin Testing Evaluated Cnfiguratin Results f the Evaluatin Validatr Cmments/Recmmendatins Annexes Security Target Bibligraphy...17 iii

4 Juniper Netwrks Security Appliances 1 Executive Summary The evaluatin f Juniper Netwrks Security Appliances was perfrmed by SAIC, in the United States and was cmpleted in June The evaluatin was carried ut in accrdance with the Cmmn Criteria Evaluatin and Validatin Scheme (CCEVS) prcess and scheme. The criteria against which the Juniper Netwrks Security Appliances TOE was judged are described in the Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin, Versin 3.1, Revisin 3, July The evaluatin methdlgy used by the evaluatin team t cnduct the evaluatin was available in the Cmmn Methdlgy fr Infrmatin Technlgy Security Evaluatin, Evaluatin Methdlgy, Versin 3.1, Revisin 3, July Science Applicatins Internatinal Crpratin (SAIC) determined that the prduct satisfies evaluatin assurance level EAL 2 augmented with ALC_FLR.2 as defined within the Cmmn Criteria (CC). The prduct, when cnfigured as specified in the installatin guides and user guides, satisfies all f the security functinal requirements stated in the Juniper Netwrks Security Appliances Security Target, Versin 0.8, April 6, This Validatin Reprt applies nly t the specific versin f the TOE as evaluated. In this case the TOE is Juniper Netwrks Security Appliances. The evaluatin has been cnducted in accrdance with the prvisins f the NIAP Cmmn Criteria Evaluatin and Validatin Scheme (CCEVS) and the cnclusins f the testing labratry in the evaluatin technical reprt are cnsistent with the evidence adduced. This Validatin Reprt is nt an endrsement f Juniper Netwrks Security Appliances by any agency f the US Gvernment and n warranty f the prduct is either expressed r implied. The validatin team mnitred the activities f the evaluatin team, examined evaluatin evidence, prvided guidance n technical issues and evaluatin prcesses, and reviewed the individual wrk units and versins f the ETR. Als, at sme discrete pints during the evaluatin, validatrs frmed a Validatin Oversight Review panel in rder t review the Security Target and ther evaluatin evidence materials alng with the crrespnding evaluatin findings in detail. The validatin team fund that the evaluatin shwed that the prduct satisfies all f the security functinal and assurance requirements stated in the Security Target (ST). Therefre the validatin team cncludes that the testing labratry s findings are accurate, the cnclusins justified, and the cnfrmance results are crrect. The cnclusins f the testing labratry in the evaluatin technical reprt are cnsistent with the evidence prduced. The technical infrmatin included in this reprt was btained frm the Evaluatin Technical Reprt Fr Juniper Netwrks Security Appliances Parts 1 and 2 and the Evaluatin Team Test Reprt Fr Juniper Netwrks Security Appliances prduced by SAIC. 1

5 1.1 Evaluatin Details VALIDATION REPORT Juniper Netwrks Security Appliances Evaluated Prduct: Spnsr: Develper: Evaluatin Facility: Juniper Netwrks Security Appliances Juniper Netwrks 1194 Nrth Mathilda Ave Sunnyvale, CA Juniper Netwrks 1194 Nrth Mathilda Ave Sunnyvale, CA Science Applicatins Internatinal Crpratin 6841 Benjamin Franklin Drive Clumbia, MD Kickff Date: May 2011 Cmpletin Date: June 2012 CC: Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 1: Intrductin, Versin 3.1, Revisin 3, July 2009 Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 2: Security Functinal Requirements, Versin 3.1 Revisin 3, July 2009 Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 3: Security assurance cmpnents, Versin 3.1 Revisin 3, July 2009 Interpretatins: CEM: Evaluatin Class: Descriptin: Disclaimer: PP: Validatin Bdy: Nne Cmmn Methdlgy fr Infrmatin Technlgy Security Evaluatin, Evaluatin Methdlgy, Versin 3.1, Revisin 3, July 2009 EAL 2 augmented with ALC_FLR.2 The Target f Evaluatin (TOE) is Juniper Netwrks Security Appliances, a line f integrated security netwrk devices cmbining firewall, virtual private netwrking (VPN), and traffic management functins. The TOE cnsists f ne r mre f the fllwing security appliances running the specified ScreenOS firmware versin: The TOE is administered via a cmmand line interface (CLI). During nrmal peratin, the CLI is accessed remtely ver a Secure Shell (SSH) cnnectin. The infrmatin cntained in this Validatin Reprt is nt an endrsement f the Juniper Netwrks Security Appliances by any agency f the U.S. Gvernment and n warranty f Juniper Netwrks Security Appliances is either expressed r implied. U.S. Gvernment Prtectin Prfile fr Traffic-Filter Firewall in Basic Rbustness Envirnments, versin 1.1, July 25, 2007 Natinal Infrmatin Assurance Partnership CCEVS 2

6 Juniper Netwrks Security Appliances 1.2 Interpretatins Nt applicable. 1.3 Threats The fllwing threats, defined in the U.S. Gvernment Prtectin Prfile fr Traffic-Filter Firewall in Basic Rbustness Envirnments, are mitigated by the TOE. T.NOAUTH T.REPEAT T.REPLAY T.ASPOOF T.MEDIAT T.OLDINF T.PROCOM T.AUDACC T.SELPRO T.AUDFUL An unauthrized persn may attempt t bypass the security f the TOE s as t access and use security functins and/r nn-security functins prvided by the TOE. An unauthrized persn may repeatedly try t guess authenticatin data in rder t use this infrmatin t launch attacks n the TOE. An unauthrized persn may use valid identificatin and authenticatin data btained t access functins prvided by the TOE. An unauthrized persn may carry ut spfing in which infrmatin flw thrugh the TOE int a cnnected netwrk by using a spfed surce address. An unauthrized persn may send impermissible infrmatin thrugh the TOE which results in the explitatin f resurces n the internal netwrk. Because f a flaw in the TOE functining, an unauthrized persn may gather residual infrmatin frm a previus infrmatin flw r internal TOE data by mnitring the padding f the infrmatin flws frm the TOE. An unauthrized persn r unauthrized external IT entity may be able t view, mdify, and/r delete security related infrmatin that is sent between a remtely lcated authrized administratr and the TOE Persns may nt be accuntable fr the actins that they cnduct because the audit recrds are nt reviewed, thus allwing an attacker t escape detectin. An unauthrized persn may read, mdify, r destry security critical TOE cnfiguratin data. An unauthrized persn may cause audit recrds t be lst r prevent future recrds frm being recrded by taking actins t exhaust audit strage capacity, thus masking an attackers actins. 1.4 Organizatinal Security Plicies The fllwing rganizatinal plicies are fulfilled by the TOE. P.INTEGRITY The TOE shall supprt the IETF Internet Prtcl Security Encapsulating Security Paylad (IPSEC ESP) as specified in RFC Sensitive infrmatin transmitted t a peer TOE shall apply integrity mechanisms as specified in Use f HMAC-SHA-1-96 within ESP and AH (RFC 2404) 2 Identificatin The evaluated prduct is as fllws: 3

7 Juniper Netwrks Security Appliances Security Target: Juniper Netwrks Security Appliances Security Target, Versin 0.7, March 7, 2012 TOE Identificatin: The TOE cnsists f ne r mre f the fllwing security appliances running the specified ScreenOS firmware versin: Prduct Juniper Netwrks NetScreen ISG 1000 Juniper Netwrks NetScreen ISG 2000 Juniper Netwrks NetScreen 5200 Juniper Netwrks NetScreen 5400 Juniper Netwrks SSG5 Secure Services Juniper Netwrks SSG20 Secure Services Juniper Netwrks SSG140 Secure Services Juniper Netwrks SSG320M Secure Services Juniper Netwrks SSG350M Secure Services Juniper Netwrks SSG520M Secure Services Juniper Netwrks SSG550M Secure Services Part Numbers NS-ISG-1000, NS-ISG-1000-DC, NS-ISG-1000B, NS-ISG-1000B-DC NS-ISG-2000, NS-ISG-2000-DC, NS-ISG-2000B, NS-ISG-2000B-DC NS-5200, NS-5200-DC NS-5400, NS-5400-DC SSG-5-SB, SSG-5-SH SSG-20-SB, SSG-20-SH SSG-140-SB, SSG-140-SH SSG-320M-SH, SSG-320M-SH-N-TAA, SSG-320M-SH-DC-N-TAA SSG-350M-SH, SSG-350M-SH-N-TAA, SSG-350M-SH-DC-N-TAA SSG-520M-SH, SSG-520M-SH-N-TAA, SSG-520M-SH-DC-N-TAA SSG-550M-SH, SSG-550M-SH-N-TAA, SSG-550M-SH-DC-N-TAA Firmware Versin TOE Envirnment: The TOE is a self-cntained netwrk appliance. 3 Security Plicy The TOE enfrces the fllwing security plicies as described in the ST. Security audit 4

8 Juniper Netwrks Security Appliances Cryptgraphic supprt User data prtectin Identificatin and authenticatin Security management Prtectin f the TSF Nte: The ST shuld be cnsulted fr mre descriptin f these and ther security functins f the TOE. 3.1 Security audit Audit data is stred in memry and is separated int three types f lgs; events, traffic lgs, and self lgs. Events are system-level ntificatins and alarms which are generated by the system t indicate events such as cnfiguratin changes, netwrk attacks detected, r administratrs lgging in ur ut f the device. Traffic lgs are directly driven by plicies that allw traffic t g thrugh the device. Self lgs stre infrmatin n traffic that is drpped and traffic that is sent t the device. Bth audit events and traffic messages can be further defined depending n the severity f the message and/r event. Lgs are prtected and a searching/srting mechanism f these lgs is ffered t administratrs. 3.2 Cryptgraphic supprt The Juniper Netwrks Security Appliances are FIPS validated as multi-chip standalne mdules. All supprt the use f AES with SSH using key sizes greater than r equal t 128-bits. 3.3 User data prtectin The user data prtectin prvided by the Security Appliance is prvided thugh the cncept f znes. Security plicies are applied t the flw f infrmatin frm netwrk ndes in ne zne t netwrk ndes in ther znes. These plicies cntrl interzne and intrazne infrmatin flws. Traffic frm ne netwrk nde in a zne will nly be frwarded t a nde in anther zne if the cnnectin requests and the traffic satisfy the infrmatin flw plicies cnfigured in the security appliance. If data is received by an appliance that des nt cnfrm t thse plicies, it will be discarded and an audit recrd will be sent t the traffic lg. A zne is a lgical abstractin n which a security appliance prvides services that are typically cnfigurable by the administratr. A zne can be a segment f netwrk space t which security measures are applied (a security zne), a lgical segment t which a VPN tunnel interface is bund (a tunnel zne), r either a physical r lgical entity that perfrms a specific functin (a functin zne). See the Security Target fr mre infrmatin abut znes. 3.4 Identificatin and authenticatin The security appliances prvide an authenticatin mechanism fr administrative users thrugh an internal authenticatin database. Administrative lgin is supprted thrugh the lcally cnnected cnsle fr initial cnfiguratin, r remtely via an SSH prtected cmmunicatin channel. The 5

9 Juniper Netwrks Security Appliances TOE perates in a mde that has been certified t FIPS level 2 verall, and supprts AES encryptin fr the SSH prtected cmmunicatin channel. A knwn administratr user id and its crrespnding authenticatin data must be entered crrectly in rder fr the administratr t successfully lgn and thereafter gain access t administrative functins. Fr lcal authenticatin, all administratr user name and passwrd pairs are managed in a database internal t the security appliance. Excessive failed lgin attempts while initiating a remte administratin sessin can cause the sessin being created t be clsed. 3.5 Security management Every security appliance prvides a cmmand line administrative interface and supprts remte administratin thrugh an SSH cmmand line interface. SSH prvides fr the prtectin f remte administratin activity frm bth disclsure and mdificatin. Neither the web interface nr the Netwrk and Security Manager are part f the evaluated cnfiguratin. T execute the CLI, the administratr can establish a trusted SSH cnnectin t the security appliance. The authrized administratr must be successfully identified and authenticated befre they are permitted t perfrm any security management functins n the TOE. The Security Appliances als supprt distinct administrative rles: Rt Administratr, Audit Administratr, Cryptgraphic Administratr and Security Administratr. In additin t these administrative rles, an administratr may be given a read-write r read-nly attribute that affects that administratr s ability t change the device s cnfiguratin data. All f these rles are cnsidered t be authrized administratrs. Mre details abut these management peratins available t administratrs can be fund in Sectin 6.1.5, 'Security management'. 3.6 Prtectin f the TSF Each security appliance is a hardware and firmware device that prtects itself largely by ffering nly a minimal lgical interface t the netwrk and attached ndes. ScreenOS is a special purpse OS that prvides n general purpse prgramming capability. All netwrk traffic frm ne netwrk zne t anther r between tw netwrks within the same netwrk zne passes thrugh the TOE; hwever, n prtcl services are prvided fr user cmmunicatin with the security appliance itself. The TOE als utilizes a hardware clck t maintain and prvide reliable time stamps. 4 Assumptins The ST identifies the fllwing assumptins abut the use f the prduct: A.PHYSEC A.LOWEXP A.GENPUR A.PUBLIC The TOE is physically secure. The threat f malicius attacks aimed at discvering explitable vulnerabilities is cnsidered lw. There are n general-purpse cmputing capabilities (e.g., the ability t execute arbitrary cde r applicatins) and strage repsitry capabilities n the TOE. The TOE des nt hst public data. 6

10 A.NOEVIL A.SINGEN A.DIRECT A.NOREMO A.REMACC 4.1 Clarificatin f Scpe VALIDATION REPORT Juniper Netwrks Security Appliances Authrized administratrs are nn-hstile and fllw all administratr guidance; hwever, they are capable f errr. Infrmatin can nt flw amng the internal and external netwrks unless it passes thrugh the TOE. Human users within the physically secure bundary prtecting the TOE may attempt t access the TOE frm sme direct cnnectin (e.g., a cnsle prt) if the cnnectin is part f the TOE. Human users wh are nt authrized administratrs can nt access the TOE remtely frm the internal r external netwrks. Authrized administratrs may access the TOE remtely frm the internal and external netwrks. The Target f Evaluatin (TOE) is the Juniper Netwrks Security Appliances previusly identified. All mdels cmprising the TOE have been validated t FIPS Security Level 2. As a cnsequence f this validatin, and in rder t ensure the evaluated cnfiguratin f the TOE satisfies its security requirements, the fllwing clarificatins are nted: The TOE appliance shuld be cnfigured fr FIPS 140 mde t perate in the evaluated cnfiguratin External authenticatin servers are nt permitted in the evaluated cnfiguratin Use f the Web interface fr security management is nt permitted in the evaluated cnfiguratin SNMP is excluded frm the evaluated TOE. SNMP security features are nt cnsistent with thse identified in the ST ( The IPv6 capabilities f the prduct were nt subject t evaluatin t simplify the evaluatin and testing. The ST specifically indicates that ALG is nt supprted in a PAT cnfiguratin. The client prt translatin thrugh NAT will nt wrk. The NAT prcess n the firewall will always pick a high number prt fr surce prt translatin, which will be subsequently denied by the rsh server. This is an applicatin design issue and nt a result f the ALG implementatin Virtual Systems were excluded t simply the evaluatin. 5 Architectural Infrmatin Juniper Netwrks Security Appliances all share a very similar hardware architecture and packet flw. All run ScreenOS with cmmn cre features acrss all prducts. All security appliances perfrm the same security functins and exprt the same types f interfaces. A sample f the differences between these prducts is listed belw. 7

11 VALIDATION REPORT Juniper Netwrks Security Appliances The SSG 5 and SSG 20 use an Intel IXP625 ASIC; the SSG 140 uses the Intel IXP2325. The Intel IXP ASICs prvide acceleratin f AES, and SHA-1. The remaining cryptgraphic and firewall functinality is perfrmed in sftware. The 320M, 350M, 520M and 550M use the Cavium Nitrx Lite ASIC t accelerate AES, SHA-1 and mdular expnentiatin peratins. The remaining cryptgraphic and firewall functinality is perfrmed in sftware. The Juniper Netwrks NetScreen-5200, NetScreen-5400, NetScreen-ISG1000 and NetScreen-ISG2000 use ne r mre custm GigaScreen3 ASICs. The GigaScreen3 ASIC is capable f prviding mst f the firewall and cryptgraphic functinality, and uses the CPU as a c-prcessr fr handling management traffic and first packet inspectins (plicy lkups). The GigaScreen3 ASIC can prcess an incming packet, perfrm a sessin lkup, NAT, TCP/IP sequence checking, and can then send the packet back ut f the device withut ever being prcessed by the system CPU. The nly time the CPU is used is fr first packet inspectin, management traffic, and packet fragment reassembly fr inspectin. These platfrms use the Cavium Nitrx Lite ASIC fr acceleratin f mdular expnentiatin peratins. 5.1 Hardware The hardware is manufactured t Juniper s specificatins by sub-cntracted manufacturing facilities. Juniper s custm OS, ScreenOS, runs in firmware. The security appliances prvide n extended permanent strage like disk drives and n abstractins like files. Audit infrmatin is stred in memry. The main cmpnents f a security appliance are the prcessr, ASIC, memry, interfaces, and surrunding chassis and cmpnents. The differences between security appliances are the types f prcessr(s), traffic interfaces, management interfaces, number f pwer supplies, type f ASIC, and redundancy t ensure high availability. The supprted netwrk interfaces that carry netwrk traffic include supprt fr Gigabit r 10/100Mbps cpper-based cnnectins as well as Fibre channel cnnectins. All devices supprt 10/100Mbps ethernet cnnectivity, while sme als prvide a management interface thrugh an RJ-45 serial prt. 5.2 ScreenOS ScreenOS pwers the entire system. At its cre is a custm-designed, real time perating system built frm the utset t deliver security and perfrmance. ScreenOS prvides an integrated platfrm fr its functins, including: Stateful inspectin firewall Traffic management Site-t-Site VPN ScreenOS des nt supprt a general-purpse, cmputing envirnment. 5.3 Physical Bundaries The physical bundary f the security appliances is the physical appliance. The cnsle, which is part f the TOE peratinal envirnment, prvides the visual I/O fr the administrative interface. 8

12 Juniper Netwrks Security Appliances After the TOE is placed int the evaluated cnfiguratin, the administrative interface is prvided ver an SSH cnnectin using encryptin. The security appliance attaches t physical netwrks that have been separated int znes thrugh prt interfaces. Security appliances cme in several mdels. Each mdel differs in the perfrmance capabilities; hwever all prvide the same security functins. Each appliance enfrces a security plicy fr all cnnectin request and traffic flw between any tw netwrk znes. All hardware n which each security appliance perates is part f the TOE. Each security appliance has a custm perating system that is part f the TOE. The perating system, ScreenOS, runs cmpletely in firmware. There is ne assumptin pertaining t the crrect peratin f the TOE and that is fr the cnsle, which must be a device that can emulate a VT- 100 terminal. The cnsle is part f the TOE envirnment and is expected t crrectly display what is sent t it frm ScreenOS. Als within the TOE envirnment are ptinal servers that can prvide time keeping r syslg services. These servers cmmunicate with the TOE ver trusted channels using certificate-based authenticatin and encryptin. The physical bundaries f the security appliance include the interfaces t cmmunicate between an appliance and a netwrk nde assigned t a netwrk zne. All netwrk cmmunicatin flw ges frm the sender netwrk nde in ne zne, thrugh a security appliance, and frm a security appliance t the receiving nde in anther netwrk zne, if the security plicy allws the infrmatin flw. Please refer t the Security Target fr mre technical details abut the prduct and its assciated security claims and functins. 6 Dcumentatin 6.1 Prduct Guidance The guidance dcumentatin examined during the curse f the evaluatin and therefre delivered with the TOE (nte that the first is Cmmn Criteria specific and is nrmative while the thers are generally infrmative) is as fllws: ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 1: Overview ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 2: Fundamentals ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 3: Administratin ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 4: Attack Detectin ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 5: VPNs ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 8: Address Translatin ScreenOS CLI Reference Guide: IPv4 Cmmand Descriptins ScreenOS Message Lg Reference Guide Juniper Netwrks ScreenOS 6.3 Evaluated Cnfiguratin fr Cmmn Criteria, EAL4 9

13 VALIDATION REPORT Juniper Netwrks Security Appliances SSG 5 Hardware Installatin and Cnfiguratin Guide SSG 20 Hardware Installatin and Cnfiguratin Guide SSG 140 Hardware Installatin and Cnfiguratin Guide SSG 300M-series Hardware Installatin and Cnfiguratin Guide SSG 500M-series Hardware Installatin and Cnfiguratin Guide ISG 1000 Hardware Installatin and Cnfiguratin Guide ISG 2000 Hardware Installatin and Cnfiguratin Guide NetScreen-5000 Series Hardware Installatin and Cnfiguratin Guide Nte: Several sectins f the ScreenOS Cncepts and Example, ScreenOS Reference Guide are NOT included as part f the TOE dcumentatin. These sectins were excluded because this ST makes n claims regarding the functinality within these sectins. Operatin f the TOE with these features is nt part f this evaluatin. 6.2 Evaluatin Evidence The fllwing tables identify the additinal dcumentatin submitted as evaluatin evidence by the vendr. With the exceptin f the Security Target, these dcuments are prprietary and nt available t the general public. Juniper Netwrks Security Appliances Security Target, Versin 0.8, April 6, 2012 Functinal Specificatin, Juniper Netwrks Security Appliances, Versin 2.1, August 29, 2011 [FSP] Juniper Netwrks Security Appliances Security Architecture Dcument, Revisin 0.5, May 31, 2011 Tracings fr BRPP Evaluatin.xlsx [Tracings] Administratr Subsystem TOE Design Specificatin, Juniper Netwrks Security Appliances, Versin 2.1, August 29, 2011 [Admin] Audit Subsystem TOE Design Specificatin, Juniper Netwrks Security Appliances, Versin 2.1, August 29, 2011 [Audit] Authenticatin Subsystem TOE Design Specificatin, Juniper Netwrks Security Appliances, Versin 2.1, August 29, 2011 [Authenticatin] File System Subsystem TOE Design Specificatin Juniper Netwrks Security Appliances, Versin 2.0, May 31, 2011 Hardware Subsystem TOE Design Specificatin Juniper Netwrks Security Appliances, Versin 2.0, May 31, 2011 Initializatin Subsystem TOE Design Specificatin Specificatin, Juniper Netwrks Security Appliances, Versin 2.0, May 31, 2011 Kernel Services Subsystem TOE Design Specificatin, Juniper Netwrks Security Appliances, Versin 2.1, August 29, 2011 [Kernel Services] 10

14 Juniper Netwrks Security Appliances Memry Management Subsystem TOE Design Specificatin Juniper Netwrks Security Appliances, Versin 2.0, May 26, 2011 NSRP Subsystem TOE Design Specificatin Juniper Netwrks Security Appliances, Versin 2.0, May 31, 2011 Packet Flw Prcessing Subsystem TOE Design Specificatin, Juniper Netwrks Security Appliances, Versin 2.1, August 29, 2011 [Packet Flw Prcessing] Ruting Subsystem TOE Design Specificatin Juniper Netwrks Security Appliances, Versin 2.0, May 31, 2011 TCP/IP Stack Subsystem TOE Design Specificatin Juniper Netwrks Security Appliances, Versin 2.0, May 31, 2011 Traffic Management Subsystem TOE Design Specificatin Juniper Netwrks Security Appliances, Versin 2.0, May 31, 2011 VPN Subsystem TOE Design Specificatin, Juniper Netwrks Security Appliances, Versin 2.0, August 29, 2011 [VPN] Juniper Netwrks ScreenOS 6.3 Evaluated Cnfiguratin fr Cmmn Criteria, EAL4, Versin 1.0, March 8, 2012 [ECCC] Other prduct guidance available fr the TOE n the develper prduct website ( Juniper Netwrks ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 1: Overview, Release 6.3.0, Rev. 01 [RG1] Juniper Netwrks ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 2: Fundamentals, Release 6.3.0, Rev. 01 [RG2] Juniper Netwrks ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 3: Administratin, Release 6.3.0, Rev. 01 [RG3] Juniper Netwrks ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 4: Attack Detectin and Defense Mechanisms, Release 6.3.0, Rev. 01 [RG4] Juniper Netwrks ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 5: VPNs, Release 6.3.0, Rev. 01 [RG5] Juniper Netwrks ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 6: Vice-ver-Internet Prtcl, Release 6.3.0, Rev. 01 [RG6] Juniper Netwrks ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 7: Ruting, Release 6.3.0, Rev. 01 [RG7] Juniper Netwrks ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 8: Address Translatin, Release 6.3.0, Rev. 01 [RG8] Juniper Netwrks ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 9: User Authenticatin, Release 6.3.0, Rev. 01 [RG9] Juniper Netwrks ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 11: High Availability, Release 6.3.0, Rev. 01 [RG11] 11

15 VALIDATION REPORT Juniper Netwrks Security Appliances Juniper Netwrks ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 12: WAN, ADSL, Dial, and Wireless, Release 6.3.0, Rev. 01 [RG12] Juniper Netwrks ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 13: General Packet Radi Service, Release 6.3.0, Rev. 01 [RG13] Juniper Netwrks ScreenOS Cncepts and Example, ScreenOS Reference Guide, Vlume 14: Dual-Stack Architecture with IPv6, Release 6.3.0, Rev. 01 [RG14] Juniper Netwrks ScreenOS Reference Guide: IPv4 Cmmand Descriptins, Release 6.3.0, Rev. 01 [CD4] Juniper Netwrks ScreenOS Reference Guide: IPv6 Cmmand Descriptins, Release 6.3.0, Rev. 01 [CD6] Juniper Netwrks Secure Delivery Prcesses and Prcedures, Revisin D, December 1, 2009 [DEL] SSG 5 Hardware Installatin and Cnfiguratin Guide, Juniper Netwrks ( SSG 20 Hardware Installatin and Cnfiguratin Guide, Juniper Netwrks ( SSG 140 Hardware Installatin and Cnfiguratin Guide, Juniper Netwrks ( SSG 300M-series Hardware Installatin and Cnfiguratin Guide, Juniper Netwrks ( SSG 500M-series Hardware Installatin and Cnfiguratin Guide, Juniper Netwrks ( ISG 1000 Hardware Installatin and Cnfiguratin Guide, Juniper Netwrks ( ISG 2000 Hardware Installatin and Cnfiguratin Guide, Juniper Netwrks ( NetScreen-5000 Series Hardware Installatin and Cnfiguratin Guide, Juniper Netwrks ( ScreenOS Cnfiguratin Items, Revisin C, April 11, 2011 (JNPR_ScreenOS_62_CC_MRPP_Cnfiguratin_Items.xml) ScreenOS Maintenance Release QA Prcess, Versin 1.1, August 17, 2009 [Maintenance] 12

16 Juniper Netwrks Security Appliances Cnfiguratin Management Plan, Revisin D, December 4, 2009 [CMP] Secure Delivery Prcesses and Prcedures, Revisin E, March 8, 2012 [DEL] Juniper Netwrks ScreenOS 6.3 Cmmn Criteria Test Plan, Vlume 1 Intrductin & Overview, Dcument Number: SPEC-9242, Revisin: 2.0, Date: Jan 1, 2012 Juniper Netwrks ScreenOS 6.3 Cmmn Criteria Test Plan, Vlume 2 - General Test Cases, Dcument Number: SPEC-9243, Revisin: 2.0, Date: Jan 1, 2012 Juniper Netwrks ScreenOS 6.3 Cmmn Criteria Test Plan, Vlume 3 Mre General Tests, Dcument Number: SPEC-9244, Revisin: 2.0, Date: Jan 1, 2012 Juniper Netwrks ScreenOS 6.3 Cmmn Criteria Test Plan, Vlume 4 Transparent Mde VPN Tests, Dcument Number: SPEC-9245, Revisin: 2.0, Date: Jan 1, 2012 Juniper Netwrks ScreenOS 6.3 Cmmn Criteria Test Plan, Vlume 5 Rute Mde VPN Tests, Dcument Number: SPEC-9246, Revisin: 2.0, Date: Jan 1, 2012 Juniper Netwrks ScreenOS 6.3 Cmmn Criteria Test Plan, Vlume 7 Transparent Mde Firewall Tests, Dcument Number: SPEC-9248, Revisin: 2.0, Date: Jan 1, 2012 Test Results 7 Prduct Testing This sectin describes the testing effrts f the develper and the Evaluatin Team. It is derived frm infrmatin cntained in the Evaluatin Technical Reprt Fr Juniper Netwrks Security Appliances Part 1, 0.1, 3/7/2012. Evaluatin team testing was cnducted at the vendr s develpment site in Sunnyvale, CA during the week f February 27, Develper Testing The vendr s apprach t testing fr the Juniper Netwrks Security Appliances is based n testing the claimed security functins f the TOE as represented by the SFRs specified in the ST. The vendr has develped a test suite cmprising varius autmated tests designed t demnstrate that the TSF satisfies the SFRs specified in the ST. The vendr addressed test depth by mapping SFRs t specific subsystems and mdules and by simultaneusly mapping SFRs t specific test cases. The vendr s tests are fcused n demnstrating the satisfactin f specific SFRs, but the vendr als analyzed the functinalities addressed in the TOE design and als mapped test cases that address thse functinalities. The vendr ran the entire test suite n all TOE mdels n the test cnfiguratin described in the test dcumentatin and gave the evaluatin team the actual results. The evaluatin team verified the results demnstrated all vendr tests had passed. The evaluatin team nted the vendr s test suite is cmprehensive, including psitive and negative test cases and a significant number f vulnerability tests. 7.2 Evaluatin Team Independent Testing The evaluatin team executed a sample f the vendr test suite, per the evaluated cnfiguratin as described in the Juniper Netwrks Security Appliances Security Target. The tests were run n a 13

17 Juniper Netwrks Security Appliances selectin f the test cnfiguratins described in the vendr test dcumentatin, using the vendr s test infrastructure. The evaluatin team devised a test subset based n cverage f the security functins described in the ST. The test envirnment described abve was used with team generated test prcedures and team analysis t determine the expected results. The subset f vendr tests selected was spread ut ver all f the TOE mdels, which includes cverage fr five f the 18 test beds defined in the vendr s test suite. The evaluatrs selected the test cases s that there was at least 20% test cverage fr each functinal requirement. Hwever, since sme f the test cases are mapped t multiple requirements, the verall independent test cverage was ver 30%. This sample was successfully exercised substantiating the vendr s wn mre cmprehensive test results. The evaluatrs devised a series f independent tests crrespnding t the security functins as fllws: Audit Data Generatin Audit Review Audit Srting Cryptgraphic Operatin fr remte sessins Cryptgraphic Operatin fr VPN sessins NAT Mde firewall prtectin Interzne and Glbal Zne Plicy enfrcement Single-use Authenticatin Mechanisms Management f Security Functins Behavir fr User Security Attributes Management f Security Functins Behavir fr Cnfiguratin Backup Management f Security Functins Behavir fr SYSLOG Cnfiguratin Management f Security Functins Behavir fr Remte Administratin 7.3 Penetratin Testing The evaluatin team cnducted an pen surce search fr vulnerabilities in the TOE, identifying five vulnerabilities reprted against earlier versins f ScreenOS. The evaluatin team determined, thrugh analysis f vulnerability descriptins and cnsideratin f the methd f use f the TOE, n reprted vulnerabilities are relevant t the TOE in its evaluated cnfiguratin. In additin t the pen surce search, the evaluatin team cnsidered ther ptential vulnerabilities, based n a search f the evaluatin evidence. Sme f the ideas fr vulnerability tests identified by the evaluatin team were already cvered by vendr functinal tests r by the independent functinal tests devised by the evaluatin team. Others were determined, thrugh analysis, nt t present explitable vulnerabilities. Finally, the evaluatrs ran cmprehensive prts scans in rder t ensure that all pened prts were expected and their purpses understd. 14

18 Juniper Netwrks Security Appliances Given the cmplete set f test results frm test prcedures exercised by the develper and the sample f tests directly exercised by the evaluatrs, the testing requirements fr EAL 2 augmented with ALC_FLR.2 are fulfilled. 8 Evaluated Cnfiguratin As identified in the Juniper Netwrks Security Appliances Security Target, Versin 0.7, March 7, 2012 the evaluated cnfiguratin cnsists f the fllwing TOE cmpnents. Ultimately the guidance identified previusly describes specifically hw each f the identified cmpnents needs t be installed and used in rder t perate the evaluated prducts in their evaluated cnfiguratin. Prduct Juniper Netwrks NetScreen ISG 1000 Juniper Netwrks NetScreen ISG 2000 Juniper Netwrks NetScreen 5200 Juniper Netwrks NetScreen 5400 Juniper Netwrks SSG5 Secure Services Juniper Netwrks SSG20 Secure Services Juniper Netwrks SSG140 Secure Services Juniper Netwrks SSG320M Secure Services Juniper Netwrks SSG350M Secure Services Juniper Netwrks SSG520M Secure Services Juniper Netwrks SSG550M Secure Services Part Numbers NS-ISG-1000, NS-ISG-1000-DC, NS-ISG-1000B, NS-ISG-1000B-DC NS-ISG-2000, NS-ISG-2000-DC, NS-ISG-2000B, NS-ISG-2000B-DC NS-5200, NS-5200-DC NS-5400, NS-5400-DC SSG-5-SB, SSG-5-SH SSG-20-SB, SSG-20-SH SSG-140-SB, SSG-140-SH SSG-320M-SH, SSG-320M-SH-N-TAA, SSG-320M-SH-DC-N-TAA SSG-350M-SH, SSG-350M-SH-N-TAA, SSG-350M-SH-DC-N-TAA SSG-520M-SH, SSG-520M-SH-N-TAA, SSG-520M-SH-DC-N-TAA SSG-550M-SH, SSG-550M-SH-N-TAA, SSG-550M-SH-DC-N-TAA Firmware Versin 9 Results f the Evaluatin The evaluatin was cnducted based upn Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin, Versin 3.1, Revisin 3, July A verdict fr an assurance cmpnent is determined by the resulting verdicts assigned t the crrespnding evaluatr actin elements. The evaluatin team assigned a Pass, Fail, r Incnclusive verdict t each wrk unit f 15

19 Juniper Netwrks Security Appliances each assurance cmpnent. Fr Fail r Incnclusive wrk unit verdicts, the evaluatin team advised the develper f issues requiring reslutin r clarificatin within the evaluatin evidence. In this way, the evaluatin team assigned an verall Pass verdict t the assurance cmpnent nly when all f the wrk units fr that cmpnent had been assigned a Pass verdict. The validatin team agreed with the cnclusin f the evaluatin team, and recmmended t CCEVS management that an EAL 2 augmented with ALC_FLR.2 certificate rating be issued fr Juniper Netwrks Security Appliances. The details f the evaluatin are recrded in the Evaluatin Technical Reprt Fr Juniper Netwrks Security Appliances Parts 1 and 2 and the Evaluatin Team Test Reprt Fr Juniper Netwrks Security Appliances, which are cntrlled by the SAIC CCTL. The security assurance requirements are listed in the fllwing table. Requirement Class ADV: Develpment AGD: Guidance dcuments ALC: Life-cycle supprt ATE: Tests AVA: Vulnerability assessment TOE Security Assurance Requirements Requirement Cmpnent ADV_ARC.1: Security architecture descriptin ADV_FSP.2: Security-enfrcing functinal specificatin ADV_TDS.1: Basic design AGD_OPE.1: Operatinal user guidance AGD_PRE.1: Preparative prcedures ALC_CMC.2: Use f a CM system ALC_CMS.2: Parts f the TOE CM cverage ALC_DEL.1: Delivery prcedures ALC_FLR.2: Flaw reprting prcedures ATE_COV.1: Evidence f cverage ATE_FUN.1: Functinal testing ATE_IND.2: Independent testing - sample AVA_VAN.2: Vulnerability analysis 10 Validatr Cmments/Recmmendatins See Sectin 4.1 Clarificatin f Scpe. 11 Annexes Nt applicable. 12 Security Target The ST fr this prduct s evaluatin is Juniper Netwrks Security Appliances Security Target, Versin 0.8, April 6,

20 13 Bibligraphy VALIDATION REPORT Juniper Netwrks Security Appliances [1] Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 1: Intrductin, Versin 3.1, Revisin 3, July [2] Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 2: Security Functinal Requirements, Versin 3.1 Revisin 3, July [3] Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 3: Security assurance cmpnents, Versin 3.1 Revisin 3, July [4] Cmmn Methdlgy fr Infrmatin Technlgy Security Evaluatin, Evaluatin Methdlgy, Versin 3.1, Revisin 3, July [5] Juniper Netwrks Security Appliances Security Target, Versin 0.8, April 6, [6] Cmmn Criteria Evaluatin and Validatin Scheme - Guidance t CCEVS Apprved Cmmn Criteria Testing Labratries, Versin 2.0, 8 Sep [7] Evaluatin Technical Reprt Fr Juniper Netwrks Security Appliances Part 1, 0.1, 3/7/2012. [8] Evaluatin Technical Reprt Fr Juniper Netwrks Security Appliances Part 2, 0.2, 3/7/2012. [9] Evaluatin Team Test Reprt Fr Juniper Netwrks Security Appliances, versin 0.1 3/7/

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report Natinal Infrmatin Assurance Partnership Cmmn Criteria Evaluatin and Validatin Scheme Validatin Reprt Micrsft Windws 8, Micrsft Windws RT, Micrsft Windws Server 2012 IPsec VPN Client TM Reprt Number: CCEVS-VR-VID10529-2013

More information

Firewall Protection Profile

Firewall Protection Profile samhällsskydd ch beredskap 1 (10) ROS-ISÄK Rnny Janse 010-2404426 rnny.janse@msb.se Firewall Prtectin Prfile Extended Package: NAT samhällsskydd ch beredskap 2 (10) Innehållsförteckning 1. Intrductin...

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

ScaleIO Security Configuration Guide

ScaleIO Security Configuration Guide ScaleIO Security Cnfiguratin Guide 1 Intrductin This sectin prvides an verview f the settings available in ScaleIO t ensure secure peratin f the prduct: Security settings are divided int the fllwing categries:

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

HP ExpertOne. HP2-T21: Administering HP Server Solutions. Table of Contents

HP ExpertOne. HP2-T21: Administering HP Server Solutions. Table of Contents HP ExpertOne HP2-T21: Administering HP Server Slutins Industry Standard Servers Exam preparatin guide Table f Cntents Overview 2 Why take the exam? 2 HP ATP Server Administratr V8 certificatin 2 Wh shuld

More information

CNS-205: Citrix NetScaler 11 Essentials and Networking

CNS-205: Citrix NetScaler 11 Essentials and Networking CNS-205: Citrix NetScaler 11 Essentials and Netwrking Overview The bjective f the Citrix NetScaler 11 Essentials and Netwrking curse is t prvide the fundatinal cncepts and skills necessary t implement,

More information

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010 OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity

More information

How to deploy IVE Active-Active and Active-Passive clusters

How to deploy IVE Active-Active and Active-Passive clusters Hw t deply IVE Active-Active and Active-Passive clusters Overview Juniper Netscreen SA and SM series appliances supprt Active/Passive r Active/Active cnfiguratins acrss a LAN r a WAN t prvide high availability,

More information

SaaS Listing CA Cloud Service Management

SaaS Listing CA Cloud Service Management SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

National Information Assurance Partnership

National Information Assurance Partnership Natinal Infrmatin Assurance Partnership TM Cmmn Criteria Evaluatin and Validatin Scheme Validatin Reprt Apple Cmputer Mac OS X Versin 10.3.6 Reprt Number: CCEVS-VR-05-0086 Dated: 13 January 2005 Versin:

More information

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved. Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U

More information

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

SBClient and Microsoft Windows Terminal Server (Including Citrix Server) SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance

More information

Network Device Protection Profile (NDPP) Extended Package Stateful Traffic Filter Firewall

Network Device Protection Profile (NDPP) Extended Package Stateful Traffic Filter Firewall Netwrk Device Prtectin Prfile (NDPP) Extended Package Stateful Traffic Filter Firewall Infrmatin Assurance Directrate 19 December 2011 Versin 1.0 Table f Cntents 1 Intrductin... 3 1.1 Cnfrmance Claims...

More information

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,

More information

CSC IT practix Recommendations

CSC IT practix Recommendations CSC IT practix Recmmendatins CSC Healthcare 28th January 2014 Versin 3 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Wireless Light-Level Monitoring

Wireless Light-Level Monitoring Wireless Light-Level Mnitring ILT1000 ILT1000 Applicatin Nte Wireless Light-Level Mnitring 1 Wireless Light-Level Mnitring ILT1000 The affrdability, accessibility, and ease f use f wireless technlgy cmbined

More information

Evaluation Report. 29 May 2013. Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com

Evaluation Report. 29 May 2013. Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com Plycm RealPresence Access Directr 29 May 2013 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.cm Table f Cntents Executive Summary... 1 System Cmpnents... 3

More information

Restricted Document. Pulsant Technical Specification

Restricted Document. Pulsant Technical Specification Pulsant Technical Specificatin Title Pulsant Dedicated Server Department Prduct Develpment Cntributrs RR Classificatin Restricted Versin 1.0 Overview Pulsant ffer a Dedicated Server service t underpin

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

HOWTO: How to configure SSL VPN tunnel gateway (office) to gateway

HOWTO: How to configure SSL VPN tunnel gateway (office) to gateway HOWTO: Hw t cnfigure SSL VPN tunnel gateway (ffice) t gateway Hw-t guides fr cnfiguring VPNs with GateDefender Integra Panda Security wants t ensure yu get the mst ut f GateDefender Integra. Fr this reasn,

More information

Microsoft Certified Database Administrator (MCDBA)

Microsoft Certified Database Administrator (MCDBA) Micrsft Certified Database Administratr (MCDBA) 460 hurs Curse Overview/Descriptin The MCDBA prgram and credential is designed fr individuals wh want t demnstrate that they have the necessary skills t

More information

FINRA Regulation Filing Application Batch Submissions

FINRA Regulation Filing Application Batch Submissions FINRA Regulatin Filing Applicatin Batch Submissins Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 FTP Access t FINRA... 2 FTP Accunt n FINRA s

More information

CNS-205 Citrix NetScaler 10.5 Essentials and Networking

CNS-205 Citrix NetScaler 10.5 Essentials and Networking CNS-205 Citrix NetScaler 10.5 Essentials and Netwrking Descriptin: The bjective f the Citrix NetScaler 10.5 Essentials and Netwrking curse is t prvide the fundatinal cncepts and advanced skills necessary

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

How To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn

How To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn SlarWinds Technical Reference Preparing an Orin Failver Engine Installatin Intrductin t the Orin Failver Engine... 1 General... 1 Netwrk Architecture Optins and... 3 Server Architecture Optins and... 4

More information

MITEL OPEN INTEGRATION GATEWAY (OIG): END- CUSTOMER DEVELOPMENT & LICENSING

MITEL OPEN INTEGRATION GATEWAY (OIG): END- CUSTOMER DEVELOPMENT & LICENSING MITEL OPEN INTEGRATION GATEWAY (OIG): END- CUSTOMER DEVELOPMENT & LICENSING JULY, 2014 The infrmatin cnveyed in this dcument is cnfidential and prprietary t Mitel and is intended slely fr Mitel emplyees

More information

Mobile Device Manager Admin Guide. Reports and Alerts

Mobile Device Manager Admin Guide. Reports and Alerts Mbile Device Manager Admin Guide Reprts and Alerts September, 2013 MDM Admin Guide Reprts and Alerts i Cntents Reprts and Alerts... 1 Reprts... 1 Alerts... 3 Viewing Alerts... 5 Keep in Mind...... 5 Overview

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall Implementing iflder Server in the DMZ with iflder Data inside the Firewall Nvell Cl Slutins AppNte www.nvell.cm/clslutins JULY 2004 OBJECTIVES The bjectives f this dcumentatin are as fllws: T cnfigure

More information

Best Practice - Pentaho BA for High Availability

Best Practice - Pentaho BA for High Availability Best Practice - Pentah BA fr High Availability This page intentinally left blank. Cntents Overview... 1 Pentah Server High Availability Intrductin... 2 Prerequisites... 3 Pint Each Server t Same Database

More information

Name. Description. Rationale

Name. Description. Rationale Cmplliiance Cmpnentt Descriptin Ratinale Benefits List the Dmain List the Discipline List the Technlgy Area List Prduct Cmpnent Dcument the Cmpliance Cmpnent Type Cmpnent Sub-type DEEFFI INITION Hst-Based

More information

ABELMed Platform Setup Conventions

ABELMed Platform Setup Conventions ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console INSTALLATION GUIDE Marshal Reprting Cnsle Installatin Guide Marshal Reprting Cnsle March, 2009 Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 3 Sftware Prerequisites 3 Installatin

More information

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1 Preparing t Deply Reflectin : A Guide fr System Administratrs Versin 14.1 Table f Cntents Table f Cntents... 2 Preparing t Deply Reflectin 14.1:... 3 A Guide fr System Administratrs... 3 Overview f the

More information

BackupAssist SQL Add-on

BackupAssist SQL Add-on WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system

More information

State of Wisconsin. File Server Service Service Offering Definition

State of Wisconsin. File Server Service Service Offering Definition State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

How To Set Up Call Hme On A Brcade Data Center Powerbook

How To Set Up Call Hme On A Brcade Data Center Powerbook TECH NOTE: BROCADE DCFM CALL HOME CAPABILITY The Call Hme event ntificatin capability allws a user t cnfigure a Brcade Data Center Fabric Manager (DCFM ) Enterprise Server t autmatically send an e-mail

More information

Ten Steps for an Easy Install of the eg Enterprise Suite

Ten Steps for an Easy Install of the eg Enterprise Suite Ten Steps fr an Easy Install f the eg Enterprise Suite (Acquire, Evaluate, and be mre Efficient!) Step 1: Dwnlad the eg Sftware; verify hardware and perating system pre-requisites Step 2: Obtain a valid

More information

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers) Firewall/Prxy Server Settings t Access Hsted Envirnment Client firewall settings in mst cases depend n whether the firewall slutin uses a Stateful Inspectin prcess r ne that is cmmnly referred t as an

More information

1)What hardware is available for installing/configuring MOSS 2010?

1)What hardware is available for installing/configuring MOSS 2010? 1)What hardware is available fr installing/cnfiguring MOSS 2010? 2 Web Frnt End Servers HP Prliant DL 380 G7 2 quad cre Intel Xen Prcessr E5620, 2.4 Ghz, Memry 12 GB, 2 HP 146 GB drives RAID 5 2 Applicatin

More information

Introduction to Mindjet MindManager Server

Introduction to Mindjet MindManager Server Intrductin t Mindjet MindManager Server Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 mindjet.cm 2013 Mindjet. All Rights

More information

Citrix XenServer from HP Getting Started Guide

Citrix XenServer from HP Getting Started Guide Citrix XenServer frm HP Getting Started Guide Overview This guide utlines the basic setup, installatin, and cnfiguratin steps required t begin using yur Citrix XenServer frm HP. A first time wizard-based

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

NERC-CIP Cyber Security Standards Compliance Documentation

NERC-CIP Cyber Security Standards Compliance Documentation Cmpliance Dcumentatin Briv OnAir 8/3/20154 Page 2 Overview This dcument is intended t be the primary surce f infrmatin fr Briv s cmpliance with the Nrth America Electric Reliability Crpratin (NERC) reliability

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling

More information

Learn More Cloud Extender Requirements Cheat Sheet

Learn More Cloud Extender Requirements Cheat Sheet MaaS360.cm > Learn Mre Learn Mre Clud Extender Requirements Cheat Sheet OVERVIEW This dcument defines all requirements t ensure a successfully installatin f the Clud Extender t enable use f ActiveSync

More information

Ensuring end-to-end protection of video integrity

Ensuring end-to-end protection of video integrity White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring

More information

Best Practices for Optimizing Performance and Availability in Virtual Infrastructures

Best Practices for Optimizing Performance and Availability in Virtual Infrastructures Best Practices fr Optimizing Perfrmance and Availability in Virtual Infrastructures www.nimsft.cm Best Practices fr Optimizing Perfrmance and Availability in Virtual Infrastructures PAGE 2 Table f Cntents

More information

Readme File. Purpose. What is Translation Manager 9.3.1? Hyperion Translation Manager Release 9.3.1 Readme

Readme File. Purpose. What is Translation Manager 9.3.1? Hyperion Translation Manager Release 9.3.1 Readme Hyperin Translatin Manager Release 9.3.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 What is Translatin Manager 9.3.1?... 1 Cmpatible Sftware... 2 Supprted Internatinal Operating

More information

Configuring and Monitoring Network Elements

Configuring and Monitoring Network Elements Cnfiguring and Mnitring Netwrk Elements eg Enterprise v5.6 Restricted Rights Legend The infrmatin cntained in this dcument is cnfidential and subject t change withut ntice. N part f this dcument may be

More information

System Business Continuity Classification

System Business Continuity Classification Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required

More information

Security Target. Version 3.1 February 5, 2015. Prepared for: Palo Alto Networks Inc. 4401 Great America Parkway Santa Clara, CA 95054

Security Target. Version 3.1 February 5, 2015. Prepared for: Palo Alto Networks Inc. 4401 Great America Parkway Santa Clara, CA 95054 Pal Alt Netwrks PA-200, PA-500, PA-7050, PA-2000 Series, PA-3000 Series, PA-4000 Series, and PA-5000 Series Next-Generatin Firewall running PAN-OS 6.0.3 Security Target Versin 3.1 February 5, 2015 Prepared

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2.

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2. Oracle s Hyperin Data Integratin Management Release 9.2.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 Intrductin t Data Integratin Management... 1 Data Integratin Management Adapters...

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

Optimal Payments Extension. Supporting Documentation for the Extension Package. 20140225 v1.1

Optimal Payments Extension. Supporting Documentation for the Extension Package. 20140225 v1.1 Optimal Payments Extensin Supprting Dcumentatin fr the Extensin Package 20140225 v1.1 Revisin Histry v1.1 Updated Demac Media branding v1.0 Initial Dcument fr Distributin supprt@ptimalpayments.cm Page

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004E Payment Card Industry (PCI) Netwrk Security (prpsed) 01.1 Purpse The purpse f this Netwrk

More information

HP Email Archiving software for Microsoft Exchange

HP Email Archiving software for Microsoft Exchange HP Email Archiving sftware fr Micrsft Exchange PST Imprt Tls Cmpnents and Deplyment Best Practices Table f Cntents Overview... 2 Prerequisites... 2 Cmpnents... 2 Archive Credentials... 2 PST Lader... 2

More information

Copyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.com/ We have attempted to make these documents complete, accurate, and

Copyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.com/ We have attempted to make these documents complete, accurate, and ii Cpyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.cm/ We have attempted t make these dcuments cmplete, accurate, and useful, but we cannt guarantee them t be perfect. When we

More information

Customer Support & Software Enhancements Policy

Customer Support & Software Enhancements Policy Custmer Supprt & Sftware Enhancements Plicy Welcme t Manhattan Assciates Custmer Supprt Organizatin (CSO). Staying current n Custmer Supprt & Sftware Enhancements and n a supprted versin f the licensed

More information

9 ITS Standards Specification Catalog and Testing Framework

9 ITS Standards Specification Catalog and Testing Framework New Yrk State ITS Standards Specificatin Develpment Guide 9 ITS Standards Specificatin Catalg and Testing Framewrk This chapter cvers cncepts related t develpment f an ITS Standards Specificatin Catalg

More information

Implementing SQL Manage Quick Guide

Implementing SQL Manage Quick Guide Implementing SQL Manage Quick Guide The purpse f this dcument is t guide yu thrugh the quick prcess f implementing SQL Manage n SQL Server databases. SQL Manage is a ttal management slutin fr Micrsft SQL

More information

SANsymphony-V Storage Virtualization Software Installation and Getting Started Guide. February 5, 2015 www.datacore.com

SANsymphony-V Storage Virtualization Software Installation and Getting Started Guide. February 5, 2015 www.datacore.com SANsymphny-V Strage Virtualizatin Sftware Installatin and Getting Started Guide February 5, 2015 www.datacre.cm This dcument is the prperty f DataCre Sftware. It is intended slely as an aid fr installing

More information

Helpdesk Support Tickets & Knowledgebase

Helpdesk Support Tickets & Knowledgebase Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate

More information

The user authentication process varies from client to client depending on internal resource capabilities, and client processes and procedures.

The user authentication process varies from client to client depending on internal resource capabilities, and client processes and procedures. Learn Basic Single Sign-On Authenticatin Tale s Basic SSO applicatin grants Learn access t users withut requiring that they enter authenticatin lgin credentials (username and passwrd). The access pint

More information

State of Wisconsin DET Dedicated Virtual Host Services Offering Definition

State of Wisconsin DET Dedicated Virtual Host Services Offering Definition State f Wiscnsin DET Dedicated Virtual Hst Services Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 10/29/2010 1.0 Phil Staley Initial draft 11/3/2010 1.1 Phil Staley Ryan McKee Secnd

More information

Datasheet. PV4E Management Software Features

Datasheet. PV4E Management Software Features PV4E Management Sftware Features PV4E is a field prven cmprehensive slutin fr real-time cntrl ver netwrk infrastructure and devices The new and refreshed Graphic User Interface (GUI) is nw even mre attractive,

More information

How To Upgrade A Crptocard To A 6.4 Migratin Tl (Cpl) For A 6Th Generation Of A Crntl (Cypercoder) On A Crperd (Cptl) 6.

How To Upgrade A Crptocard To A 6.4 Migratin Tl (Cpl) For A 6Th Generation Of A Crntl (Cypercoder) On A Crperd (Cptl) 6. BlackShield ID Upgrade and Migratin Guide Fr CRYPTO-Server 6.4 Users Cpyright 2010 CRYPTOCard Inc. website: http://www.cryptcard.cm Trademarks CRYPTOCard and the CRYPTOCard lg are registered trademarks

More information

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8 McAfee Enterprise Security Manager Data Surce Cnfiguratin Guide Data Surce: Infblx NIOS September 2, 2014 Infblx NIOS Page 1 f 8 Imprtant Nte: The infrmatin cntained in this dcument is cnfidential and

More information

State of Wisconsin Division of Enterprise Technology (DET) Distributed Database Hosting Service Offering Definition (SOD)

State of Wisconsin Division of Enterprise Technology (DET) Distributed Database Hosting Service Offering Definition (SOD) State f Wiscnsin Divisin f Enterprise Technlgy (DET) Distributed Database Hsting Service Offering Definitin (SOD) Distributed Database Hsting SOD Page 1 12/9/2010 Dcument Revisin Histry (Majr Pst Publishing

More information

Integrating With incontact dbprovider & Screen Pops

Integrating With incontact dbprovider & Screen Pops Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint

More information

The Relativity Appliance Installation Guide

The Relativity Appliance Installation Guide The Relativity Appliance Installatin Guide February 4, 2016 - Versin 9 & 9.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

AVG AntiVirus Business Edition

AVG AntiVirus Business Edition AVG AntiVirus Business Editin User Manual Dcument revisin AVG.02 (30.9.2015) C pyright AVG Technlgies C Z, s.r.. All rights reserved. All ther trademarks are the prperty f their respective wners. Cntents

More information

MCSA: Windows 7 Boot Camp for Desktop Support Technicians

MCSA: Windows 7 Boot Camp for Desktop Support Technicians MCSA: Windws 7 Bt Camp fr Desktp Supprt Technicians Prepare fr the Enterprise Desktp Supprt Technician certificatin n Windws 7. Gain the clud-related skills required fr the latest Micrsft certificatins

More information

CERTIFICATION CRITERIA

CERTIFICATION CRITERIA 2014 Editin Test Prcedure fr 170.314(a)(1) Cmputerized prvider rder entry Apprved Test Prcedure Versin 1.3, December 19, 2014 Test Prcedure fr 170.314(a)(1) Cmputerized prvider rder entry This dcument

More information

Citrix XenApp 6.5 Basic Administration

Citrix XenApp 6.5 Basic Administration Citrix XenApp 6.5 Basic Administratin Descriptin: Days: 5 Prerequisites: Citrix XenApp 6.5 Basic Administratin training curse prvides the fundatin necessary fr administratrs t effectively centralize and

More information

Using PayPal Website Payments Pro UK with ProductCart

Using PayPal Website Payments Pro UK with ProductCart Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...

More information

Loss Share Data Specifications Change Management Plan

Loss Share Data Specifications Change Management Plan Lss Share Data Specificatins Change Management Plan Last Updated: 2/27/2013 Table f Cntents I. Purpse... 3 II. Change Management Apprach... 3 III. Categries f Revisins... 4 IV. Help and Supprt... 6 Lss

More information

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Traffic monitoring on ProCurve switches with sflow and InMon Traffic Sentinel

Traffic monitoring on ProCurve switches with sflow and InMon Traffic Sentinel An HP PrCurve Netwrking Applicatin Nte Traffic mnitring n PrCurve switches with sflw and InMn Traffic Sentinel Cntents 1. Intrductin... 3 2. Prerequisites... 3 3. Netwrk diagram... 3 4. sflw cnfiguratin

More information

ISO Management Systems. Guidance on understanding the benefits of an ISO Management System

ISO Management Systems. Guidance on understanding the benefits of an ISO Management System ISO Management Systems Guidance n understanding the benefits f an ISO Management System Welcme & Intrductins 4031 University Drive, 206, Fairfax, VA 22030 3 Grant Square, 243, Hinsdale, IL 60521 www.radiancmpliance.cm

More information

Attunity RepliWeb SSL Guide

Attunity RepliWeb SSL Guide Attunity RepliWeb SSL Guide Sftware Versin 5.2 June 25, 2012 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm, Supprt: http://supprt.repliweb.cm

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information