Cisco CX-FEIP-1TX= Installation and con?guration Guide de l'utilisateur Page 136

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 648
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 135
Security planning Chapter 2: Planning considerations
2-24
phn-2513_004v000 (Oct 2012)
Planning for FIPS 140-2 operation
To prepare for FIPS 140-2 secure mode operation, generate the following cryptographic
material using a FIPS-approved cryptographic generator:
Key of Keys
TLS Private Key and Public Certificates. FIPS 140-2 now recommends 2048 bit keys.
Entropy Input
Wireless Link Encryption Key for AES
Enable the web browsers for HTTPS/TLS operation using FIPS-approved cipher
specifications.
Configure the following attributes of user accounts for the web-based management
interface to match the network security policy:
Auto Logout Period.
Maximum Number of Login Attempts.
Login Attempt Lockout.
Minimum Password Change Period.
Password Expiry Period.
Webpage Session Control
Configure the following attributes:
Password complexity rules reset to ‘best practice’ values.
User account passwords compliant with the network security policy.
RADIUS authentication = Disabled.
Configure all of the above correctly to ensure that PTP 800 is operating in compliance
with the FIPS 140-2 validation.
FIPS validated software is available from System Release PTP800-04-00. Load standard
(non-FIPS) software from PTP800-04-00 or later before loading a FIPS software image.
Vue de la page 135
1 2 ... 131 132 133 134 135 136 137 138 139 140 141 ... 647 648

Commentaires sur ces manuels

Pas de commentaire