HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GB/T 21050-2019 PDF English

US$1159.00 · In stock · Download in 9 seconds
GB/T 21050-2019: Information security technology - Security requirements for network switch
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid

GB/T 21050: Evolution and historical versions

Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
GB/T 21050-2019English1159 Add to Cart 9 days Information security technology - Security requirements for network switch Valid
GB/T 21050-2007EnglishRFQ ASK 8 days Information security techniques -- Security requirements for network switch (EAL3) Obsolete

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: GB/T 21050-2019
      

Similar standards

GB/T 20984   GB/T 20988   GB/T 21028   GB/T 21054   

GB/T 21050-2019: Information security technology - Security requirements for network switch

---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT21050-2019
(Information Security Technology Network Switch Security Technical Requirements) ICS 35.040 L80 National Standards of People's Republic of China Replace GB/T 21050-2007 Information security technology Network switch security technical requirements Informationsecuritytechnology- Securityrequirementsfornetworkswitch Published on.2019-08-30 2020-03-01 implementation State market supervision and administration China National Standardization Administration issued Content Foreword III 1 Scope 1 2 Normative references 1 3 Terms and definitions, abbreviations 1 3.1 Terms and Definitions 1 3.2 Abbreviations 2 4 Network Switch Description 2 5 Security Issue Definition 3 5.1 Asset 3 5.2 Threat 4 5.3 Organizational Security Policy 5 5.4 Hypothesis 6 6 Security Objective 7 6.1 TOE Security Purpose 7 6.2 Environmental Safety Objectives 9 7 Safety requirements 9 7.1 Extended Component Definition 9 7.2 Security function requirements 10 7.3 Security requirements 19 8 Basic principles 30 8.1 Basic Principles of Security Purposes 30 8.2 Basic Principles of Safety Requirements 42 8.3 Component Dependencies 49 Reference 52

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. This standard replaces GB/T 21050-2007 "Information Security Technology Network Switch Security Technical Requirements (Assessment Level 3)". versus Compared with GB/T 21050-2007, the main technical changes except editorial changes are as follows. --- Modified the scope of use and added a convention on cryptographic algorithms (see Chapter 1, Chapter 1 of the.2007 edition); --- Added reference to the terminology standard (see Chapter 2, Chapter 2 of the.2007 edition); --- Added the term "trusted IT products" and deleted the term "network switch" (see Chapter 3, Chapter 3 of the.2007 edition); ---Modified the description of the network switch (see Chapter 4, Chapter 4 of the.2007 edition); --- Modify the security environment as a security problem definition, and merge and modify assumptions, threats, and organizational security policies (see Chapter 5,.2007) Chapter 5 of the edition); ---Modified and deleted security purposes (see Chapter 6, Chapter 6 of the.2007 edition); --- Added expansion components, added and deleted security requirements according to GB/T 18336-2015 (see Chapter 7); --- Added a chapter on the basic principles (see Chapter 8). Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted. China Information Security Evaluation Center, Jilin Information Security Evaluation Center, Huawei Technologies Co., Ltd., Tsinghua University, Ruijie Networks Co., Ltd., NetShen Information Technology (Beijing) Co., Ltd. The main drafters of this standard. Li Fengjuan, Zhang Baofeng, Liu Hui, Zhang Yibin, Jia Wei, Zhang Wei, Pang Bo, Liu Wei, Tang Xiqing, Jiang Xianyu, Liu Wei, Zhong Jianwei, Liu Haili, Ye Xiaojun, Li Ling, Xu Tao. The previous versions of the standards replaced by this standard are. ---GB/T 21050-2007. Information security technology Network switch security technical requirements

1 Scope

This standard specifies that the network switch meets the security functional requirements and security requirements of EAL2 and EAL3, covering security issues. Definition, security purpose, security requirements, etc. This standard applies to the testing, evaluation and procurement of network switches, and can also be used to guide the development and development of such products.

2 Normative references

The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 18336.1-2015 Information technology security technology - Information technology - Safety assessment criteria - Part 1. Introduction and general model GB/T 18336.2-2015 Information technology security technology - Information technology - Safety assessment criteria - Part 2 GB/T 18336.3-2015 Information technology security technology - Information technology - Safety assessment criteria - Part 3. Security components GB/T 25069-2010 Information Security Technology Terminology 3 terms and definitions, abbreviations 3.1 Terms and definitions The following terms and definitions as defined in GB/T 25069-2010 and GB/T 18336.1-2015 apply to this document. 3.1.1 Trusted IT product trustedITproduct There are security functional requirements that are coordinated with the TOE, but are not part of the TOE's other IT products, and assume that they can perform their own security correctly. Full-featured requirements. 3.1.2 Trusted channel trustedchannel A means of communication between TSF and remote trusted IT products based on the necessary trust. 3.1.3 Trusted path trustedpath A means of communication between the user and the TSF to communicate on the basis of the necessary trust. 3.1.4 Trusted source trustedsource The source or node that can be identified and authenticated, the integrity of the information sent from that source or node can be verified and confirmed. 3.1.5 Customer client The party requesting service from the other party. GB/T 21050-2019 (Information Security Technology Network Switch Security Technical Requirements) ICS 35.040 L80 National Standards of People's Republic of China Replace GB/T 21050-2007 Information security technology Network switch security technical requirements Informationsecuritytechnology- Securityrequirementsfornetworkswitch Published on.2019-08-30 2020-03-01 implementation State market supervision and administration China National Standardization Administration issued Content Foreword III 1 Scope 1 2 Normative references 1 3 Terms and definitions, abbreviations 1 3.1 Terms and Definitions 1 3.2 Abbreviations 2 4 Network Switch Description 2 5 Security Issue Definition 3 5.1 Asset 3 5.2 Threat 4 5.3 Organizational Security Policy 5 5.4 Hypothesis 6 6 Security Objective 7 6.1 TOE Security Purpose 7 6.2 Environmental Safety Objectives 9 7 Safety requirements 9 7.1 Extended Component Definition 9 7.2 Security function requirements 10 7.3 Security requirements 19 8 Basic principles 30 8.1 Basic Principles of Security Purposes 30 8.2 Basic Principles of Safety Requirements 42 8.3 Component Dependencies 49 Reference 52

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. This standard replaces GB/T 21050-2007 "Information Security Technology Network Switch Security Technical Requirements (Assessment Level 3)". versus Compared with GB/T 21050-2007, the main technical changes except editorial changes are as follows. --- Modified the scope of use and added a convention on cryptographic algorithms (see Chapter 1, Chapter 1 of the.2007 edition); --- Added reference to the terminology standard (see Chapter 2, Chapter 2 of the.2007 edition); --- Added the term "trusted IT products" and deleted the term "network switch" (see Chapter 3, Chapter 3 of the.2007 edition); ---Modified the description of the network switch (see Chapter 4, Chapter 4 of the.2007 edition); --- Modify the security environment as a security problem definition, and merge and modify assumptions, threats, and organizational security policies (see Chapter 5,.2007) Chapter 5 of the edition); ---Modified and deleted security purposes (see Chapter 6, Chapter 6 of the.2007 edition); --- Added expansion components, added and deleted security requirements according to GB/T 18336-2015 (see Chapter 7); --- Added a chapter on the basic principles (see Chapter 8). Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted. China Information Security Evaluation Center, Jilin Information Security Evaluation Center, Huawei Technologies Co., Ltd., Tsinghua University, Ruijie Networks Co., Ltd., NetShen Information Technology (Beijing) Co., Ltd. The main drafters of this standard. Li Fengjuan, Zhang Baofeng, Liu Hui, Zhang Yibin, Jia Wei, Zhang Wei, Pang Bo, Liu Wei, Tang Xiqing, Jiang Xianyu, Liu Wei, Zhong Jianwei, Liu Haili, Ye Xiaojun, Li Ling, Xu Tao. The previous versions of the standards replaced by this standard are. ---GB/T 21050-2007. Information security technology Network switch security technical requirements

1 Scope

This standard specifies that the network switch meets the security functional requirements and security requirements of EAL2 and EAL3, covering security issues. Definition, security purpose, security requirements, etc. This standard applies to the testing, evaluation and procurement of network switches, and can also be used to guide the development and development of such products.

2 Normative references

The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 18336.1-2015 Information technology security technology - Information technology - Safety assessment criteria - Part 1. Introduction and general model GB/T 18336.2-2015 Information technology security technology - Information technology - Safety assessment criteria - Part 2 GB/T 18336.3-2015 Information technology security technology - Information technology - Safety assessment criteria - Part 3. Security components GB/T 25069-2010 Information Security Technology Terminology 3 terms and definitions, abbreviations 3.1 Terms and definitions The following terms and definitions as defined in GB/T 25069-2010 and GB/T 18336.1-2015 apply to this document. 3.1.1 Trusted IT product trustedITproduct There are security functional requirements that are coordinated with the TOE, but are not part of the TOE's other IT products, and assume that they can perform their own security correctly. Full-featured requirements. 3.1.2 Trusted channel trustedchannel A means of communication between TSF and remote trusted IT products based on the necessary trust. 3.1.3 Trusted path trustedpath A means of communication between the user and the TSF to communicate on the basis of the necessary trust. 3.1.4 Trusted source trustedsource The source or node that can be identified and authenticated, the integrity of the information sent from that source or node can be verified and confirmed. 3.1.5 Customer client The party requesting service from the other party. ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of GB/T 21050-2019 be delivered?

Answer: The full copy PDF of English version of GB/T 21050-2019 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of GB/T 21050-2019_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 21050-2019_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- GB/T 21050-2019 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

Question 5: Should I purchase the latest version GB/T 21050-2019?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 21050-2019 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.

How to buy and download a true PDF of English version of GB/T 21050-2019?

A step-by-step guide to download PDF of GB/T 21050-2019_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "GB/T 21050-2019".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9