McAfee HARDWARE 1.4 Guia de Instalação Página 59

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 61
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 58
McAfee Email Gateway
Security Target
McAfee Incorporated
Page 59 of 61
FCS_TLS_EXT.1
The TOE implements TLS 1.0 (RFC 2246)] supporting the following ciphersuites:
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA,
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA.
FCS_HTTPS_EXT.1
HTTPS (using TLS 1.0) is used to protect remote administrator sessions.
Client-Authentication uses form based authentication over HTTPS.
FPT_SKP_EXT.1
All private cryptographic keys are secured against unauthorized disclosure. There are no pre-shared
symmetric keys on the TOE. Private asymmetric keys are stored in clear text, and protected with
restricted file permissions. These private keys cannot be output on physical ports.
FPT_ITT.1 Internal TSF Data Transfer Protection
Data is transmitted between different parts of the TOE when clustering is used. Such communication is
protected using TLS.
FCS_COP.2 Digital Signature
When using secure web mail, the TOE generates a notification Email which it sends to the recipient which
tells them that they have an Email that needs to be viewed. This notification can be S/MIME signed so
that it does not get picked up as spam.
FTP_ITC.1
Trusted communication with webmail clients is established using TLS to safeguard confidentiality and
integrity. This is done through HTTPS to establish web mail sessions.
Trusted communication with an external audit server is achieved with the TOE acting as a SSH client.
FIPS Compliance
The table below shows algorithm test certificate numbers provided under the Cryptographic Algorithm
Validation Program.
Algorithm OpenSSL RSA BSAFE li/jointfilesconvert/366194/bgcrypt
AES 2013 2281 2106
TDES 1299 1429 1341
RSA 1042 1172 1080
SHA 1763 1963 1829
RNG 1055 1134 1081
HMAC 1218 - 1280
Table 17CAVP Algorithm Certificates
MEG has been submitted for FIPS 140-2 validation under the Cryptographic Module Validation program.
Vista de página 58
1 2 ... 54 55 56 57 58 59 60 61

Comentários a estes Manuais

Sem comentários