3
To secure a network, restrict all network ports that are not used. For more information, see
“Configuring the TCP/
IP port access setting” on page 41
.
4
To allow remote management of SNMPv3, enable SNMPv3, and then disable SNMPv1,2. For more information, see
“Setting up SNMP” on page 29
.
Note:
Specify the user credentials for Read/Write and optionally Read/Only users. It is recommended that
authentication level is set to
Authentication, Privacy
.
5
If necessary, configure the audit logging. For more information, see
“Configuring security audit log settings” on
page 30
. If necessary, remote system log for events can be specified by identifying the syslog server and selecting
the appropriate settings. Specification of an e
‑
mail address for the administrator is encouraged with selection of
the events to be e
‑
mailed.
6
Create one or more security templates using the LDAP building block, and then assign them to the appropriate
access controls. For more information, see
“Using a security template to control function access” on page 20
.
Security scenarios
58