User guide

2-22
Cisco Media Gateway Manager 5.0 User Guide
OL-5461-02
Chapter 2 Basic Concepts
What Are the General Features of Cisco MGM?
OSS security domain: OSS-to-Cisco MGM sessions are configured by the Cisco MGM GateWay
EMS-to-NMS interface architectural component.
NE security domain: At the NE level, a username and password are configured to enable the user to
connect directly through the console port (EIA/TIA-232), through the management port
(10BASE-T), or remotely through an SSH or Telnet session. NE passwords are stored using base-64
two-way encryption.
Cisco MGM server login: You must have root user privileges to log into the Cisco MGM server
workstation for debugging or changing the Cisco MGM server program. A username and password
are required.
Oracle database access: Access to the Oracle database requires Oracle root user authentication, as
well as Cisco MGM database access authentication. The Oracle username and password are
encrypted in the server configuration file.
Cisco MGM supports the following security features:
2.3.5.1 Logging into the Client, page 2-22
2.3.5.2 Login Advisory Message, page 2-22
2.3.5.4 User Management and Profiles, page 2-23
2.3.5.5 NE Access Control, page 2-24
2.3.5.6 Audit Log, page 2-24
2.3.5.1 Logging into the Client
See Cisco Media Gateway Manager 5.0 Installation Guide for the procedure to log into the Cisco MGM
client on a Windows or Solaris workstation.
2.3.5.1.1 Locking and Unlocking the Client
A Cisco MGM client is locked automatically after a defined period of inactivity.
To manually lock the Cisco MGM client, select File > Lock Cisco MGM Client in the Domain
Explorer. The Cisco MGM Locked window opens, indicating that the Cisco MGM client is locked.
To unlock the Cisco MGM client, enter your password in the MGM Locked window; then, click
Unlock.
2.3.5.2 Login Advisory Message
The following is the default advisory message after logging into the Cisco MGM client:
NOTICE: This is a private computer system. Unauthorized access or use may lead to
prosecution.
You can customize the default advisory message, or disable it altogether. For more details, see Chapter 8,
“Managing Security.”
2.3.5.3 Understanding Network Partitioning
You can configure for network partitioning by dividing the network into logical areas. You can then
access only the areas that are specified under your security profile. The nodes and elements must fall
under the area or areas that fit your security profile for each Cisco MGM application.