beautypg.com

IBM Novell 10 SP1 EAL4 User Manual

Page 3

background image

Table of Contents

1 Introduction....................................................................................................................................................1

1.1 Purpose of this document.......................................................................................................................1
1.2 Document overview ..............................................................................................................................1
1.3 Conventions used in this document........................................................................................................1
1.4 Terminology...........................................................................................................................................2

2 System Overview...........................................................................................................................................3

2.1 Product history.......................................................................................................................................4

2.1.1 SUSE Linux Enterprise Server.......................................................................................................4
2.1.2 eServer systems..............................................................................................................................4

2.2 High-level product overview..................................................................................................................5

2.2.1 eServer host computer structure.....................................................................................................5
2.2.2 eServer system structure.................................................................................................................7
2.2.3 TOE services..................................................................................................................................7
2.2.4 Security policy...............................................................................................................................8
2.2.5 Operation and administration.......................................................................................................10
2.2.6 TSF interfaces..............................................................................................................................10

2.3 Approach to TSF identification............................................................................................................11

3 Hardware architecture..................................................................................................................................14

3.1 System x...............................................................................................................................................14

3.1.1 System x hardware overview........................................................................................................14
3.1.2 System x hardware architecture....................................................................................................14

3.2 System p...............................................................................................................................................16

3.2.1 System p hardware overview........................................................................................................16
3.2.2 System p hardware architecture....................................................................................................17

3.3 System z...............................................................................................................................................17

3.3.1 System z hardware overview........................................................................................................17
3.3.2 System z hardware architecture....................................................................................................17

3.4 eServer 326..........................................................................................................................................18

3.4.1 eServer 326 hardware overview...................................................................................................19
3.4.2 eServer 326 hardware architecture...............................................................................................19

4 Software architecture....................................................................................................................................22

4.1 Hardware and software privilege..........................................................................................................22

4.1.1 Hardware privilege.......................................................................................................................22

4.1.1.1 Privilege level......................................................................................................................22

4.1.2 Software privilege........................................................................................................................24

3