Configure Security Options

This chapter describes how to set options relating to security – who can log into the node, how they are authenticated, and what rights they have once logged in.

The chapter includes the following sections:

Topic Refer to...
About Role-Based Access About Role-Based Access
Configure Authentication and Authorization Authentication Type
Default Ports Open Ports in GigaVUE‑FM
FIPS 140-2 Compliance FIPS 140-2 Compliance in GigaVUE-FM
USGv6r1 Compliance USGv6 Compliance
Crytpography Mode Enable Cryptography Mode
Validation of Certificate Revocation List Enable Validation of Certificate Revocation List
Network Audit Logs Enable Network Audit logs