Relationship Between Security Strength And Functions - Hitachi Compute Blade 2000 User Manual

Hide thumbs Also See for Compute Blade 2000:
Table of Contents

Advertisement

Relationship between security strength
and functions
The following table describes the relationship between security strength levels and
system functions.
Management module
Function
System
console
System Web
console
File transfer
SNMP
Email
notification
LDAP
HCSM
SC/BSM
Remote
maintenance
(*3)
(*1) The port used for the protocol is closed.
(*2) HTTP/HTPS are exclusively used.
(*3) Only maintenance personnel can use this function.
(*4) Your browser needs to support the SSL/TLS version.
(*5) Your application needs to support the SSL/TLS version.
Protocol
Security strength level
Default
Available
telnet
ssh
Available (SSHv2)
Available (*2)
HTTP
Available (SSL3.0,
HTTPS
TLS1.0/1.1/1.2)
(*2)(*4)
ftp
Available
sftp
Available (SSHv2)
Available
SNMP
(v1/v2c)
SNMP (v3)
Available
Available
SMTP
SMTP
Available (SSL3.0,
(StartTLS)
TLS1.0/1.1/1.2)
Available (SSL3.0,
LDAPS
TLS1.0/1.1/1.2)
HTTPS and
Available (SSL3.0,
Hitachi
TLS1.0/1.1/1.2)
original
(*5)
protocol
Available (You can
prevent
communication by
Hitachi
BSM command to
original
close the port. See
protocol
BSM command in
Chapter 6 for
details.)
Hitachi
Available
original
protocol
1804
High
Not available (*1)
Available (SSHv2)
Not available
(*1)(*2)
Available (TLS 1.2)
(*2)(*4)
Not available (*1)
Available (SSHv2)
Not available (Not
responds to the
manager's request;
not issues trap.)
Available
Not available (Not
issues e-mail.)
Available (TLS 1.2)
Available (TLS 1.2)
Available (TLS 1.2)
(*5)
Available (You can
prevent
communication by
BSM command to
close the port. See
BSM command in
Chapter 6 for
details.)
Available

Advertisement

Table of Contents
loading

Table of Contents