Users Guide

Table Of Contents
Security Features
CMC provides the following security features:
Password-level security management Prevents unauthorized access to a remote system.
Centralized user authentication through:
Active Directory using Standard Schema or an Extended Schema (optional.)
Hardware-stored user IDs and passwords.
Role-based authority Enables an administrator to configure specific privileges for each user.
User ID and password configuration through the Web interface.
NOTE: Web interface supports 128-bit SSL 3.0 encryption and 40-bit SSL 3.0 encryption (for countries where 128-bit is
not acceptable).
NOTE: Telnet does not support SSL encryption.
Configurable IP ports, if applicable.
Login failure limits per IP address, with login blocking from the IP address when the limit is exceeded.
Configurable session auto time out, and more than one simultaneous sessions.
Limited IP address range for clients connecting to CMC.
Secure Shell (SSH), which uses an encrypted layer for higher security.
Single Sign-on, Two-Factor Authentication, and Public Key Authentication.
Chassis Overview
The following figure shows the facing edge of a CMC (inset) and the locations of the CMC slots in the chassis:
Figure 1. CMC slot locations in chassis
Table 1. CMC slot location details
1 GB Port
2 STK Port
CMC Port Information
The following TCP/IP ports are required to remotely access CMC through firewalls. These are the ports CMC listens to for
connections.
Overview
15