Configure Security Options

This chapter describes how to set options relating to security – who can log into the node, how they are authenticated, and what rights they have once logged in.

The chapter includes the following sections:

■   About Security and Access
■   About Role-Based Access
■   Configure Authentication and Authorization (AAA)
o   Configure AAA Authentication Options
o   Grant Roles with External Authentication Servers
o   Add AAA Servers to the Node’s List
o   Configure Roles in External Authentication Servers
■   Supported Clients
■   Default Ports
■   FIPS 140-2 Compliance
■   UC APL Compliance
■   Common Criteria
■   GigaVUE‑OS Security Hardening
■   Best Practices for Security Hardening