Users Guide
Security Features
CMC provides the following security features:
• Password-level security management — Prevents unauthorized access to a remote system.
• Centralized user authentication through:
• Active Directory using Standard Schema or an Extended Schema (optional.)
• Hardware-stored user IDs and passwords.
• Role-based authority — Enables an administrator to configure specific privileges for each user.
• User ID and password configuration through the Web interface.
NOTE: Web interface supports 128-bit SSL 3.0 encryption and 40-bit SSL 3.0 encryption (for countries where 128-
bit is not acceptable).
NOTE: Telnet does not support SSL encryption.
• Configurable IP ports, if applicable.
• Login failure limits per IP address, with login blocking from the IP address when the limit is exceeded.
• Configurable session auto time out, and more than one simultaneous sessions.
• Limited IP address range for clients connecting to CMC.
• Secure Shell (SSH), which uses an encrypted layer for higher security.
• Single Sign-on, Two-Factor Authentication, and Public Key Authentication.
Chassis Overview
The following figure shows the facing edge of a CMC (inset) and the locations of the CMC slots in the chassis:
Figure 1. CMC slot locations in chassis
Table 1. CMC slot location details
Slot Location
1 GB Port
2 STK Port
CMC Port Information
The following TCP/IP ports are required to remotely access CMC through firewalls. These are the ports CMC listens to for connections.
Overview
15