Configure Security Options
This chapter describes how to set options relating to security – who can log into the node, how they are authenticated, and what rights they have once logged in.
The chapter includes the following sections:
| Topic | Refer to... |
|---|---|
| About Role-Based Access | About Role-Based Access |
| Configure Authentication and Authorization | Authentication Type |
| Default Ports | Open Ports in GigaVUE‑FM |
| FIPS 140-2 Compliance | FIPS 140-2 Compliance in GigaVUE-FM |
| USGv6r1 Compliance | USGv6 Compliance |
| Crytpography Mode | Enable Cryptography Mode |
| Validation of Certificate Revocation List | Enable Validation of Certificate Revocation List |
| Network Audit Logs | Enable Network Audit logs |



