Cisco CISCO3825 Spécifications Page 32

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 33
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 31
© Copyright 2007 Cisco Systems, Inc. 32
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
2. SSH access to the module is only allowed if SSH is configured to use a FIPS-approved
algorithm. The Crypto officer must configure the module so that SSH uses only FIPS-
approved algorithms. Note that all users must still authenticate after remote access is
granted.
Vue de la page 31
1 2 ... 27 28 29 30 31 32 33

Commentaires sur ces manuels

Pas de commentaire