| Logo ID | 02-C-000769 |
|---|---|
| Approved Date | 2012/05/01 |
| Application ID | CN-2-C-20120319-000190 |
| Applied Date | 2012/03/19 |
| Usage Agreement | Agreed |
| OEM Licensor's Logo ID | - |
| Note | - |
| Target Information | ||
|---|---|---|
| Test Category | Core Protocols | |
| Vendor Name | Trend Micro (CN) Co.,Ltd. | |
| Country | CN | |
| Product Name | InterScan Web Security Virtual Appliance | |
| Product Version | V5.6 | |
| Product Classification | Host | |
| Product Description | Trend Micro(TM) InterScan(TM) Web Security Virtual Appliance (IWSVA) provides multi-layer, multi-threat protection at the Internet gateway to dynamically defend against Web-based attacks. IWSVA leverages both local and in-the-cloud security information to protect network traffic. The product includes a broad set of Internet application identification and control, URL filtering, antivirus for HTTP, HTTPS and FTP, anti-spyware, web reputation, and customizable web content filtering policies. | |
| Vendor's Note |
In Test IP6Interop.1.6 Path MTU discovery and Fragment Mention, the first fragmented packet will be losted when target host or router use NS/NA to discover a neighbor. This problem is not caused by the NUT.
|
|
| Test Information | Test Specification | 4.0.6 |
| Interoperability Test Scneario | 4.0.4 | |
| Information for Series of Product |
|
| Interoperable Devices |
Router | |||
|---|---|---|---|---|
| 1 | Vendor Name | Ubuntu Project | ||
| Device Name | Ubuntu 7.10 | |||
| Version | 2.6.15-26 | |||
| 2 | Vendor Name | The KAME Project | ||
| Device Name | KAME on FreeBSD 6.2-RELEASE | |||
| Version | kame-20060116-freebsd54-snap | |||
| Host | ||||
| 1 | Vendor Name | The FreeBSD Project | ||
| Device Name | FreeBSD | |||
| Version | 7.1-RELEASE-p15 | |||
| 2 | Vendor Name | USAGI Project | ||
| Device Name | USAGI | |||
| Version | usagi-linux26-s20060327 | |||
| Target supporting Advanced Functions: |
- Transmitting Echo Requests(Passive Node)
- Configuring Multicast Packet Size - Multicast Routing(Router Only) - RFC 4191 Type C Host(Host Only) - Duplicate Overlapping Fragments - Beyond Scope of Source Address(Router Only) - Tracking Connections for ICMPv6 - Router Advertisement DNS (Host Only) |
|||