4-3
Cisco 11000 Series Secure Content Accelerator Configuration Guide
78-13124-06
Chapter 4 Using the Configuration Manager
Configuration Security
Note
The system prompts displayed by the configuration manager vary
slightly depending upon the management session type used and
Secure Content Accelerator version. Secure Content Accelerator
version 2 is indicated by an “SCA2” prompt.
Configuration Security
Cisco Secure Content Accelerator devices allow easy, flexible configuration
without compromising the security of your network or their own configuration.
Passwords
Cisco Secure Content Accelerator devices use two levels of password protection:
access- and enable-level. Access-level passwords control who can access the
device via telnet and serial connections. Enable-level passwords control who can
view the same data available with access-level passwords as well as view sensitive
data and configure the device.
SSL devices are shipped without passwords. Setting passwords is important
because the device can be administered over a network. For more information
about passwords, see the commands password access and password enable in
Appendix C.
Note
FIPS-compliant operation requires both access- and
configuration-level passwords. See Chapter 6 for more information.
Access Lists
Access lists control which computers can attach to a specific device. No access
lists exist when you first install the Secure Content Accelerator. You can restrict
the computers allowed to manage the appliance by adding their IP addresses to
one or more access lists for each device. For more information about configuring
access lists, see the commands show access-list, access-list, snmp access-list,
telnet access-list, and web-mgmt access-list in Appendix C.