Security Target
Version 1.1
2022-03-08
iv
List of Figures and Tables
Figure 1: Simplified Block Diagram of a 2-Port KVM TOE ............................................................................. 9
Figure 2: Representative IOGEAR Secure KVM Switch TOE Model in its environment .............................. 11
Table 1: IOGEAR Secure KVM Switch TOE Models (with CAC) ...................................................................... 1
Table 2: Terms and Definitions ..................................................................................................................... 3
Table 3: Acronyms ......................................................................................................................................... 5
Table 4: IOGEAR Secure KVM Switch Console Interfaces and TOE Models .................................................. 7
Table 5: IOGEAR Secure KVM Switch Computer Interfaces and TOE Models .............................................. 8
Table 6: Security Objectives for the Operational Environment .................................................................. 15
Table 7: TOE Security Functional Components ........................................................................................... 17
Table 8: Audio Filtration Specifications ...................................................................................................... 19
Table 9: TOE Security Functional Components (DP Models) ...................................................................... 29
Table 10: TOE Security Functional Components (H Models) ...................................................................... 30
Table 11: TOE Security Functional Components (D Models) ...................................................................... 31
Table 12: Assurance Components............................................................................................................... 32
Table 13: Supported protocols by port ....................................................................................................... 37
Table 14: DP Models ................................................................................................................................... 40
Table 15: H Models ..................................................................................................................................... 41
Table 16: D Models ..................................................................................................................................... 41
Table 17: SFR Protection Profile Sources ................................................................................................... 48
Table 18: Security Functions vs. Requirements Mapping ........................................................................... 51