NIAP: Archived U.S. Government Approved Protection Profile - Protection Profile for Wireless Local Area Network (WLAN) Access Syste...
NIAP/CCEVS

NIAP Oversees Evaluations of Commercial IT Products for Use in National Security Systems
Questions?  We're here to help
  NIAP  »»  Protection Profiles  »»  Archived PPs  »»  Details  
Archived U.S. Government Approved Protection Profile - Protection Profile for Wireless Local Area Network (WLAN) Access Systems Version 1.0

Short Name: pp_wlan_as_v1.0

Technology Type: Wireless LAN

CC Version: 3.1

Date: 01 December 2011

Succeeded By: pp_wlan_as_ep_v1.0

Sunset Date: 28 November 2015 [Sunset Icon]

Conformance Claim: None

 

PP OVERVIEW

Transition Window

 The Transition Window for this PP is from the date of publication through 1 June 2012. During the Transition Window, products will be accepted into evaluation against the PP or against an ST at EAL2 with a Letter of Intent. Once the Transition Window closes, all relevant products submitted for evaluation will only be evaluated against the PP.

Wireless LAN Access System

This is the approved Protection Profile for Wireless LAN Access.  The Target of Evaluation (TOE) defined in this protection Profile (PP) is used  for Wireless Local Area Network (WLAN) Access Systems for the protection of sensitive but unclassified data on a wireless network. This PP details the policies, assumptions, threats, security objectives, security functional requirements, and security assurance requirements for the WLAN and its supporting environment.

Usage Senario

The TOE for the WLAN Access System contributes to a secure wireless access solution for providing secure communication between a user (wireless client) and a wired network (e.g., enterprise network) by providing centralized management functions, policy control, and cryptographic services to support administration, authentication, encryption, and the protection and handling of data in transit.

Threat Addressed

Threats addressed by the TOE are listed in the Threat section of the PP.  Examples include, help mitigate denial of service (DoS) attacks and preventing resource exhaustion.

Assigned to the following Validated Products

Related Technical Decisions

Please forward any Protection Profile specific comments to the applicable Technical Rapid Response Team (TRRT).

Please forward any general questions to our Q&A tool.

Site Map              Contact Us              Home