Security Functions; Security Account; Network Security; Security-Related Logs - Fujitsu ETERNUS LT260 User Manual

Tape library
Hide thumbs Also See for ETERNUS LT260:
Table of Contents

Advertisement

Chapter 1 Overview

1.7 Security Functions

1.7
Security Functions
This section describes the security functions that are used for the Key Management Function Option.
1.7.1

Security Account

The security account is used from the remote panel for operations and settings related to the key
management function.
To log in to the remote panel, the security administrator account, "security", is used for operations and
settings of the key management function.
The security administrator logs in with this dedicated account to make all the relevant settings. Anyone who
logs in with another account cannot modify the settings of the key management function.
For information on how to log in with the security account, refer to
(page
25).
1.7.2

Network Security

The protocol for the connection to the remote panel via a LAN can be set to "https," which encrypts the data
that is the transmitted information.
For information on the https setting, refer to
1.7.3

Security-Related Logs

A history of key management function operations or settings is automatically recorded in a log. This enables
the tracking of unauthorized access and operations.
For information on the storage and contents of the security-related logs, refer to
the Key Management Function" (page
FUJITSU Storage ETERNUS LT260 Tape Library Key Management Function Option User's Guide
"2.1.2.3 Enabling SSL" (page
74).
20
Copyright 2016 FUJITSU LIMITED
"2.1.2.2 Logging in to the Remote Panel"
26).
"Appendix A Logs Related to
P3AG-1192-02ENZ0

Advertisement

Table of Contents
loading

Table of Contents