Nortel Networks BCM50 Bedienungsanleitung Seite 75

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 352
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 74
75
BCM50 Administration Guide
Chapter 4
BCM50 Security Policies and Accounts and Privileges
BCM50 Security Policies and Accounts and Privileges allows you to establish system-wide
security policies and maintain access security on your system using settings on the Element
Manager.This chapter describes the security policies that you can configure through the Element
Manager. The BCM50 provides security capabilities such as NAT, VPN, DoS alert, data
communication, DHCP, VLAN, and PPP.
The information in this chapter is organized as follows:
Security Policies panel on page 75 describes the fields on the Security Policies panel
Configuring system security policies on page 80 provides procedures for setting system-level
security that applies to all configured users, for installing the web server certificate, and for
downloading the SSH key-pair
Configuring user accounts, user groups and privileges on page 89 provides procedures for
managing access to both the Element Manager and to the telset configuration menus.
User account and user group management fundamentals on page 97 provides information
about user accounts, passwords, and privileges.
Accounts and Privileges panel on page 111 describes the fields on the Accounts and Privileges
panel.
BCM50 security fundamentals on page 120 provides an overview of the BCM50 security
policies such as firewalls, protocols, encryption, audits, certificates, and site authentication.
Security Policies panel
The fields that make up the Security Policies panel are described in this section. When you set
security policies, they apply to the entire BCM system rather than to individual users.
!
Security Note: This symbol is used throughout this section to indicate areas of possible
security concern, primarily in regard to default settings that could pose a security risk if
they are not changed.
Seitenansicht 74
1 2 ... 70 71 72 73 74 75 76 77 78 79 80 ... 351 352

Kommentare zu diesen Handbüchern

Keine Kommentare