ARCHIVED CERTIFIED PRODUCTS AND SYSTEMS
List of Archived Certified Products and Systems.
MyCC = Products certified by MyCC Scheme before recognized as CCRA Authorizing Participants.
CCRA = Products certified by MyCC Scheme after recognized as CCRA Authorizing Participants.
The TOE is a hardware and software appliance that contains all the functions needed for intrusion prevention, including Internet Protocol (IP) defragmentation, TCP flow reassembly, statistical analysis, traffic shaping, flow blocking, flow state tracking and application-layer parsing of network protocols.
The primary function of the TOE is to protect networks from intrusion attempts by scanning network traffic, detecting intrusion attempts, and reacting to detected intrusion attempts according to the filters and action sets with which the device is configured.
The scope of evaluation covers major security features as follows:
- Security Audit: The TOE is able to generate auditable events for the basic level of audit.
- Identification and authentication: The TOE identifies and authenticates all administrative users of the TOE before granting them access to the TOE.
- Intrusion Detection and Prevention: The TOE collects network traffic and subjects it to statistical and signature-based analysis, depending on configured IPS filters.
- Traffic Management: The TOE can be configured to operate as a firewall, blocking or permitting network traffic based on protocol or IP address and port.
- Security Management: The TOE provides the security management functions to enable the administrative users to manage user accounts, audit data and audit configurations, security configuration data, traffic management filters, and IDS data collection, analysis, and reaction.
- TSF Protection: The TOE includes its own time source for providing reliable time stamps that are used in audit records and stored IDS data.
- Trusted Path: The TOE provides a trusted path for remote administrative users of the TOE to communicate with the TOE. The trusted path is implemented over the network management port using HTTPS for access to the LSM and SSHv2 for access to the CLI.
Freddy Mercado
Global Compliance Engineer
Trend Micro - TippingPoint
Tel: +1 512 432-2947
Cell: +1 512 632-6308
VoIP: +1 512 319-5317
Email: f.m@hp.com
14231 Tandem Blvd.
Austin, TX 78728 – USA
PROJECT ID
C005
ASSURANCE LEVEL
EAL3+ ALC_FLR.2
PRODUCT NAME AND VERSION
Trend Micro TippingPoint Intrusion Prevention Systems v3.8.2
PRODUCT TYPE
Hardware-based intrusion prevention systems
PRODUCT SPONSOR / DEVELOPER
Trend Micro TippingPoint
PRODUCT SPONSOR / DEVELOPER CONTACT DETAILS
Freddy Mercado
Global Compliance Engineer
Trend Micro - TippingPoint
Tel: +1 512 432-2947
Cell: +1 512 632-6308
VoIP: +1 512 319-5317
Email: f.m@hp.com
14231 Tandem Blvd.
Austin, TX 78728 – USA
URL:http://www.trendmicro.com/
The TOE is a hardware and software appliance that contains all the functions needed for intrusion prevention, including Internet Protocol (IP) defragmentation, TCP flow reassembly, statistical analysis, traffic shaping, flow blocking, flow state tracking and application-layer parsing of network protocols.
The primary function of the TOE is to protect networks from intrusion attempts by scanning network traffic, detecting intrusion attempts, and reacting to detected intrusion attempts according to the filters and action sets with which the device is configured.
The scope of evaluation covers major security features as follows:
- Security Audit: The TOE is able to generate auditable events for the basic level of audit.
- Identification and authentication: The TOE identifies and authenticates all administrative users of the TOE before granting them access to the TOE.
- Intrusion Detection and Prevention: The TOE collects network traffic and subjects it to statistical and signature-based analysis, depending on configured IPS filters.
- Traffic Management: The TOE can be configured to operate as a firewall, blocking or permitting network traffic based on protocol or IP address and port.
- Security Management: The TOE provides the security management functions to enable the administrative users to manage user accounts, audit data and audit configurations, security configuration data, traffic management filters, and IDS data collection, analysis, and reaction.
- TSF Protection: The TOE includes its own time source for providing reliable time stamps that are used in audit records and stored IDS data.
- Trusted Path: The TOE provides a trusted path for remote administrative users of the TOE to communicate with the TOE. The trusted path is implemented over the network management port using HTTPS for access to the LSM and SSHv2 for access to the CLI.