10-4
Broadmore 1750 - Release 4.6
Security Management
Security Guidance
System Clock
– The system clock is used to time stamp all events recorded in the
system log and user audit log. To set the system clock, see
“System Clock” on
page
10-7
.
User Administration
– The Broadmore authenticates users by identification and
role-based access privilege levels and maintains an audit trail activity log. Only
a SuperUser can assign users and access levels, set the minimum number of
characters required for user names and passwords (user ID rules), and clear the
system log. The security officer must ensure that all users change their passwords
periodically in accordance with local security practice.
(1) It is recommended that passwords be changed at least once every 6 months.
Users must be instructed to use a random combination of all the usable characters
for passwords.
(2) It is recommended that all users, access privileges, and role assignments be
reviewed periodically or whenever a personnel termination, transfer, or role
change occurs.
Audit Trails
– Audit trails must be enabled for FIPS mode.
The cryptographic module provides a system log and user audit log. The audit log
(audit.txt) records user actions while the system log (sys.log) records system
events and configuration changes.
A SuperUser has access to pSOS shell commands that can overwrite the system
and audit log files. This misuse of shell commands to corrupt the audit trail is
strictly prohibited and removes the Broadmore from the evaluated configuration.
It is recommended that user audit trails be examined periodically in accordance
with local security practice to determine if the Broadmore is being accessed by
unauthorized users or during nonstandard hours, or if the configuration is being
accessed or altered in an inappropriate manner. For example, every third
consecutive attempted login failure produces an entry in the system log.
Summary of Contents for Broadmore 1750
Page 1: ...Broadmore TM 1750 USER MANUAL Part Number 770 0020 DC Product Release 4 6 January 2008 ...
Page 24: ...xii Broadmore 1750 Release 4 6 Table of Contents ...
Page 50: ...1 26 Broadmore 1750 Release 4 6 Product Description Alarm Power Module IOM ...
Page 69: ...CHAPTER 3 Receipt of Product In this Chapter Receipt 3 2 Unpacking 3 2 Inspection 3 3 ...
Page 72: ...3 4 Broadmore 1750 Release 4 6 Receipt of Product Damage Reporting ...
Page 82: ...4 10 Broadmore 1750 Release 4 6 Chassis Installation and Grounding AC Power Supply Tray ...
Page 114: ...6 16 Broadmore 1750 Release 4 6 Electrical Installation Software ...
Page 188: ...7 74 Broadmore 1750 Release 4 6 Configuration Help ...
Page 234: ...8 46 Broadmore 1750 Release 4 6 Maintenance and Troubleshooting Summary of Front Panel LEDs ...
Page 244: ...9 10 Broadmore 1750 Release 4 6 Command Line Interface About Command ...
Page 266: ...10 22 Broadmore 1750 Release 4 6 Security Management FTP Login ...
Page 302: ...11 36 Broadmore 1750 Release 4 6 Security Management FIPS Mode sshdShow ...
Page 318: ...11 52 Broadmore 1750 Release 4 6 Security Management FIPS Mode Sanitation Procedures ...
Page 362: ...12 44 Broadmore 1750 Release 4 6 SNMP Configuration Notify Profiles ...
Page 370: ...A 8 Broadmore 1750 Release 4 6 Technical Specifications E3 Unstructured Circuit Emulation SAM ...
Page 373: ...APPENDIX C Software Error Messages In this Appendix Overview System Errors Setup Errors ...
Page 383: ...APPENDIX E Chassis Differences ...
Page 386: ...E 4 Broadmore 1750 Release 4 6 Chassis Differences Software Differences ...
Page 394: ...F 8 Broadmore 1750 Release 4 6 IPv6 Support Deleting a Network Route ...
Page 398: ...G 4 Broadmore 1750 Release 4 6 Broadmore Command List Commands Available at the CLI Prompt ...
Page 408: ...Glossary 10 Broadmore 1750 Release 4 6 Glossary ...