Configure Security Options
This chapter describes how to set options relating to security – who can log into the node, how they are authenticated, and what rights they have once logged in.
The chapter includes the following sections:
Topic | Refer to... |
---|---|
About Role-Based Access | About Role-Based Access |
Configure Authentication and Authorization | Authentication Type |
Default Ports | Open Ports in GigaVUE‑FM |
FIPS 140-2 Compliance | FIPS 140-2 Compliance in GigaVUE-FM |
USGv6r1 Compliance | USGv6 Compliance |
Crytpography Mode | Enable Cryptography Mode |
Validation of Certificate Revocation List | Enable Validation of Certificate Revocation List |
Network Audit Logs | Enable Network Audit logs |