Security Target
Version 1.1
2022-03-08
iv
Table 3: Acronyms ......................................................................................................................................... 5
Table 4: IOGEAR Secure KVM Switch Console Interfaces and TOE Models .................................................. 8
Table 5: IOGEAR Secure KVM Switch Computer Interfaces and TOE Models .............................................. 9
Table 6: Security Objectives for the Operational Environment .................................................................. 16
Table 7: TOE Security Functional Components ........................................................................................... 18
Table 8: Audio Filtration Specifications ...................................................................................................... 20
Table 9: TOE Security Functional Components (DP Models) ...................................................................... 27
Table 10: TOE Security Functional Components (H Models) ...................................................................... 28
Table 11: TOE Security Functional Components (D Models) ...................................................................... 29
Table 12: Assurance Components............................................................................................................... 30
Table 13: Supported protocols by port ....................................................................................................... 34
Table 14: DP Models ................................................................................................................................... 36
Table 15: H Models ..................................................................................................................................... 37
Table 16: D Models ..................................................................................................................................... 37
Table 17: SFR Protection Profile Sources ................................................................................................... 44
Table 18: Security Functions vs. Requirements Mapping ........................................................................... 46