3/9/2024 0 Comments Huawei esight user guide![]() To restrict user operations that are dangerous or have great impact, security administrators can configure secondary authorization policies for these operations. When NBI framework communicates with a third-party system using SFTP, if the DH key exchange algorithm (diffie-hellman-group-exchange-sha256 or diffie-hellman-group-exchange-sha1) is used, you are advised to add or replace the DH domain parameter file to improve data transmission security. By default, the DH domain parameters standardized with RFC3526 and RFC7919 are used, posing pre-computation attacks risks during key negotiation. The Diffie-Hellman (DH) key exchange algorithm is an open key algorithm. Adding or Replacing DH Parameter Files (NBI Framework).The management plane allows you to set the display format of the time, number, date, and time zone on the web client. Display Format Settings on the Management Plane.(Optional) Configuring Server Alarm Receiving ParametersĪfter the parameters for receiving hardware server alarms have been configured, server alarms can be reported to the O&M plane through the management plane so that eSight can monitor the alarms. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |