Dell PowerSwitch S4112F-ON SmartFabric OS10 Security Best Practices Guide July - Page 3
SmartFabric OS10 Security Best Practices Guide July 2020, OS10 security best practices
View all Dell PowerSwitch S4112F-ON manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 3 highlights
Contents Chapter 1: OS10 security best practices 4 On first boot...4 Password rules...5 Federal Information Processing Standards (FIPS)...6 Enable and configure secure boot...6 Users, roles, and privilege levels...7 Port security...9 Management plane...11 Role-based access control...11 Access rules...13 Banner rules...15 SNMP rules...15 Control plane...17 System clock rules...17 Logging rules...17 NTP rules...18 Loopback rules...19 Data plane rules...19 Neighbor authentication...20 X.509v3 certificates...21 Contents 3
Chapter 1: OS10 security best practices
............................................................................................
4
On first boot
...........................................................................................................................................................................
4
Password rules
.......................................................................................................................................................................
5
Federal Information Processing Standards (FIPS)
............................................................................................................
6
Enable and configure secure boot
.......................................................................................................................................
6
Users, roles, and privilege levels
...........................................................................................................................................
7
Port security
...........................................................................................................................................................................
9
Management plane
...............................................................................................................................................................
11
Role-based access control
.............................................................................................................................................
11
Access rules
....................................................................................................................................................................
13
Banner rules
....................................................................................................................................................................
15
SNMP rules
.....................................................................................................................................................................
15
Control plane
.........................................................................................................................................................................
17
System clock rules
..........................................................................................................................................................
17
Logging rules
...................................................................................................................................................................
17
NTP rules
.........................................................................................................................................................................
18
Loopback rules
................................................................................................................................................................
19
Data plane rules
....................................................................................................................................................................
19
Neighbor authentication
.....................................................................................................................................................
20
X.509v3 certificates
............................................................................................................................................................
21
Contents
Contents
3