Cisco CX-FEIP-1TX= Installation and con?guration Guía de usuario Pagina 136

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 648
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 135
Security planning Chapter 2: Planning considerations
2-24
phn-2513_004v000 (Oct 2012)
Planning for FIPS 140-2 operation
To prepare for FIPS 140-2 secure mode operation, generate the following cryptographic
material using a FIPS-approved cryptographic generator:
Key of Keys
TLS Private Key and Public Certificates. FIPS 140-2 now recommends 2048 bit keys.
Entropy Input
Wireless Link Encryption Key for AES
Enable the web browsers for HTTPS/TLS operation using FIPS-approved cipher
specifications.
Configure the following attributes of user accounts for the web-based management
interface to match the network security policy:
Auto Logout Period.
Maximum Number of Login Attempts.
Login Attempt Lockout.
Minimum Password Change Period.
Password Expiry Period.
Webpage Session Control
Configure the following attributes:
Password complexity rules reset to ‘best practice’ values.
User account passwords compliant with the network security policy.
RADIUS authentication = Disabled.
Configure all of the above correctly to ensure that PTP 800 is operating in compliance
with the FIPS 140-2 validation.
FIPS validated software is available from System Release PTP800-04-00. Load standard
(non-FIPS) software from PTP800-04-00 or later before loading a FIPS software image.
Vista de pagina 135
1 2 ... 131 132 133 134 135 136 137 138 139 140 141 ... 647 648

Comentarios a estos manuales

Sin comentarios