Juniper SSG 5 Manual page 19

Hide thumbs Also See for SSG 5:
Table of Contents

Advertisement

Table C: Read-Only User
CSP \ Services
IPSEC HMAC SHA-1 Key
IPSEC ESP Key
IKE Pre-shared Key
IKE Encryption Key
IKE HMAC SHA-1 Key
Password
SSH Server/Host DSA Private Key
SSH Encryption Key
SSH HMAC SHA-1 Key
HA Key
IKE RSA/DSA/ECDSA Private Key
PRNG Seed and Seed Key
Diffie Hellman Private Key Components
RADIUS Secret Key
1. The Crypto-Officer is authorized to change all authorized operators' user names and passwords, but the user is only
allowed to change his/her own user name and password
2. The Crypto-Officer is authorized to remove all authorized operators.
Juniper Networks SSG 5 and SSG 20 Security Policy
Status
U
U
U
N/A
N/A
U
U
N/A
N/A
N/A
N/A
N/A
N/A
U
19

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ssg 20

Table of Contents