FusionDC1000A Prefabricated All-in-One Data
Center
Commissioning Guide (IT Scenario)
4.7.2 Performing Basic Operations Before Adding Devices
Software installation and commissioning are required before the device
commissioning, collector commissioning, and NetEco commissioning. For details,
see NetEco Product Documentation. Commission the software by referring to
relevant sections in NetEco Software Installation and Commissioning Guide.
Table 4-6 Encryption algorithms
Insecure Encryption Algorithm
● DES/3DES (except the scenario
● SKIPJACK
● RC2
● RSA (1024-bit or shorter)
● MD2/MD4
● MD5 is used in scenarios where
● SHA1 is used in scenarios where
Table 4-7 Communication protocols
Insecure Communication Protocol
SNMPv1/v2
IPMI 1.5
Non-SSL protocol, SSL 2.0, and SSL
3.0
TLS 1.0 and TLS 1.1
● The device may use insecure algorithms and protocols, which may pose security
risks. You are advised to replace the device with a device that supports secure
algorithms and protocols or upgrade the device to a version that supports
secure algorithms and protocols.
● In transparent transmission channel management settings, the compatibility
mode has security risks. You are advised to select the security protocol mode.
Issue 02 (2022-12-15)
where K1≠K2≠K3)
digital signatures are generated
or passwords are encrypted for
storage.
digital signatures are generated.
NO TICE
Copyright © Huawei Digital Power Technologies Co., Ltd.
4 Commissioning Core Devices
Secure Encryption Algorithm
● Symmetric encryption algorithm: AES
(128-bit or longer)
● Asymmetric encryption algorithm: RSA
(2048-bit or longer)
● Hash algorithm: SHA2 (256-bit or
longer)
● Hash-based message authentication
code (HMAC) algorithm: HMAC-SHA2
Secure Communication Protocol
SNMPv3
IPMI 2.0
TLS 1.2
N/A
54