
Configuring user permissions through profiles
Securing the Network Management Module – 168
[R4] National Institute of Technology (NIST) Interagency “Guidelines on Firewalls and Firewall Policy, NIST Special Publication
800-41”, October 2009:
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41r1.pdf
5.3 Configuring user permissions through profiles
The user profile can be defined when creating a new users or changed when modifying an existing one.
Refer to the section
Contextual help>>>Settings>>>Local users
in the settings.
5.4 Decommissioning the Network Management module
With the increased frequency of reported data breaches, it’s becoming more and more necessary for companies to implement
effective and reliable decommissioning policies and procedures.
In order to protect the data stored on retired IT equipment from falling into the wrong hands, or a data breach, we recommend to
follow below decommissioning steps:
1- Sanitize the Network Module
Sanitization erases all the data (user name and password, certificates, keys, settings, logs...).
To sanitize the Network Module refer to the
Contextual help>>>Maintenance>>>Services>>>Sanitization
section.
2- Unmount the Network Module from the device.
Unscrew the Network Module and remove it from the slot.
Summary of Contents for eNMC2
Page 1: ...PDU Network Module eNMC2 User s Guide English 10 09 2023...
Page 2: ......
Page 25: ...Home Contextual help of the web interface 25 3 2 2 1 3 Battery mode 3 2 2 1 4 Off mode...
Page 27: ...Home Contextual help of the web interface 27 3 2 2 2 3 Battery mode 3 2 2 2 4 Off mode...
Page 29: ...Home Contextual help of the web interface 29 3 2 2 3 2 Bypass mode 3 2 2 3 3 Battery mode...
Page 50: ...Protection Contextual help of the web interface 50 Example 2 Immediate OFF Example 4 Custom...
Page 51: ...Protection Contextual help of the web interface 51 Settings 1 Settings 2...
Page 224: ...Acronyms and abbreviations Information 224...
Page 231: ......