Check Point VSX R67 with Provider-1 R71

Check Point VSX R67.10 in combination with Provider-1 R71 with R7x hotfix is a virtualization environment for the implementation of network traffic information flow controls, providing controlled connectivity between two or more network environments.  The TOE provides security functionality that includes traffic filtering, intrusion detection and prevention (IDS/IPS) and network address translation (NAT), as well as security management, audit and Protection of the TSF.  Check Point VSX provides a level of protection that is appropriate for IT environment that require that information flows be controlled and restricted among network nodes where the Check Point components can be appropriately protected from physical attacks.

The TOE is one or more gateway devices managed by a Provider-1 management server, using management GUI interfaces. The product provides controlled connectivity between two or more network environments. It mediates information flows between clients and servers located on internal and external networks governed by the firewalls.

The claimed security functionality described in the Security Target is a subset of the product's full functionality. The evaluated configuration is a subset of the possible configurations of the product, established according to the evaluated configuration guidance.  

The security functionality within the scope of the evaluation included traffic filtering,  where virtual systems run information flow control programs coded in Check Point’s patented INSPECT language;  intrusion detection and prevention (IDS/IPS) integrated with the traffic-filtering functionality, matching traffic with predefined attack signatures, and providing recording, analysis and reaction capabilities , network address translation (NAT), centralized security management, auditing, and fault tolerance.

Validation Report Number: CCEVS-VR-10375-2012

 

Additional Notes

The hardware for the VSX Software evaluated as a part of the ST:

  • Check Point - IAS Server M2, M6, M8, D1, D2, D6, D8, R2, R6, R8
  • Dell - PowerEdge 620, 720
  • Fujitsu - Primergy RX200 S6, S7, Primergy RX300 S6, S7
  • HP - ProLiant DL360 G7, G8, ProLiant DL380 G7, G8
  • IBM - System X x3550 M3, M4, System X x3650 M3, M4

Check Point Security Appliances:

  • VSX-1 3070
  • VSX-1 9070
  • VSX-1 9090
  • VSX-1 11000 series
  • VSX-1 11200 series (VSLS)
  • Check Point 12200 VSX
  • Check Point 12400 VSX
  • Check Point 12600 VSX
  • Check Point 21400 VSX
  • Check Point Security Management Appliances:
  • Smart-1 50
  • Smart-1 150

Common Criteria Details

CC Certification / Validation Report Reference

CC Security Target / TOE Reference

Product Categories

Security Mechanism Groups

General Information

Product Documents

No Product Documents are available for the moment.

Product QR Code

Last Update Time:
24-Oct-2013 11:58 AM
Please enter a search term !