Digital Data Communications LEVEL ONE FCS-4300 Guía de usuario Pagina 37

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 57
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 36
Fuji Xerox ApeosPort-II C4300(AP)Series Security Kit for Asia Pacific Security Target V1.01
- 33 -
key operator succeeds, this function allows the operation of TOE setting data. When either of the
“key-operator’s user ID” or ”key-operator’s password” entered at the control panel or through the
Web browser of key-operator’s client is incorrect and the identification/authentication of key operator
fails, this function displays identification/authentication error. When authentication fails the same
number of times as that set in the “access denial due to failure in authentication of key-operator’s
ID,” this function denies authentication. Only the key operator who is authenticated in the
above-described way can set:
- “HDD overwriting function for residual data” to “Not perform,” “Perform (one time),” or “Perform
(three times).”
- “setting for using password” to “Not perform” or “Perform.”
- “HDD data encryption function” to “Not perform” or ”Perform.”
- “key-operator’s password” to 7 to 12 alphanumeric characters.
- “access denial due to failure in authentication of key-operator’s ID” to “Not perform”
or ”Perform (1 to 10 times).”
- “cryptographic seed key for data stored on the hard disk drive” to 12 alphanumeric characters.
This function is configured to certainly operate because it is realized by unique software that does
not have bypass measures.
6.1.4. Customer-Engineer Operation Restriction Function (SF.CEREST)
This function controls the operation of the TOE setting data for “setting for customer-engineer
operation restriction function” so that the operation can be performed by the authenticated
key-operator.
Although ”setting for customer-engineer operation restriction function” can be set to “Not perform”
or ”Perform,” “Perform” must be set when using TOE. By setting to “Perform,” customer engineer
can be restricted from referring to / changing settings on TOE security functions. This function is
configured to certainly operate because it is realized by unique software that does not have bypass
measures.
6.1.5. Function that is Realized using Probabilistic or Permutational Mechanisms
Among the TOE security functions, the function that is realized using probabilistic or permutational
mechanisms is the key-operator authentication function (SF.MANAGE). Strength level of this
function is SOF-basic.
6.2. Assurance Measures
6.2.1.
DocuCentre-II C4300(AP) Series Configuration Management Description
(AS.CONFIGURATION)
The following are described in the “DocuCentre-II C4300(AP) Series Configuration Management
Vista de pagina 36
1 2 ... 32 33 34 35 36 37 38 39 40 41 42 ... 56 57

Comentarios a estos manuales

Sin comentarios