A
PPENDIX
G:
FAQ
S
239
Q
UESTION
A
NSWER
What options are available
for authentication with
directory services and
security tools such as
LDAP, AD, RADIUS, etc.
CC-SG permits local authentication as well remote
authentication.
Remote authentication servers supported include: AD,
, RADIUS, and LDAP.
Security
Sometimes when I try to
log on, I receive a message
that states my “login is
incorrect” even though I am
sure I am entering the
correct username and
password. Why is this?
There is a session-specific ID that is sent out each time you
begin to log on to CC-SG. This ID has a time-out feature, so if
you do not log on to the unit before the time-out occurs, the
session ID becomes invalid. Performing a
Shift-Reload
refreshes the page from CC-SG. Or, you may close the current
browser, open a new browser, and log on again. This provides
an additional security feature so that no one can recall
information stored in the web cache to access the unit.
How is a password secure?
Passwords are encrypted using MD5 encryption, which is a one-
way hash. This provides additional security to prevent
unauthorized users from accessing the password list.
Sometimes I receive a “No
longer logged in” message
when I click any menu in
CC-SG, after leaving my
workstation idle for a
period of time. Why?
CC-SG times each user session. If no activity happens for a pre-
defined period of time, CC-SG logs the user out. The length of
the time period is pre-set to 60 minutes, but it can be
reconfigured. It is recommended that users
exit
CC-SG when
they finish a session.
As Raritan has root access
to server, this may
potentially cause issue with
government bodies. Can
customers also have root
access or can Raritan
provide a method of
auditability /
accountability?
No party will have root access to server once the unit is shipped
out of Raritan, Inc.
Is SSL encryption internal
as well as external (not just
WAN, but LAN, too)?
Both. The session is encrypted regardless of source, LAN or
WAN.
Does CC-SG support CRL
List, that is, LDAP list of
invalid certificates?
No.
Does CC-SG support Client
Certificate Request?
No.
Accounting
The event times in the
Audit Trail report seem
incorrect. Why?
Log event times are logged according to the time settings of the
client computer. You can adjust the computer’s time and date
settings.
Can audit/logging abilities
track down who switched
on or off a power plug?
Direct power switch-off is not logged, but power control through
CC-SG can be logged to audit logs.
Summary of Contents for CC-SG
Page 2: ...This page intentionally left blank...
Page 26: ...12 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE This page intentionally left blank...
Page 46: ...32 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE This page intentionally left blank...
Page 158: ...144 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE This page intentionally left blank...
Page 228: ...214 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE This page intentionally left blank...
Page 236: ......
Page 246: ...232 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE...
Page 248: ...234 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE...
Page 250: ...236 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE...
Page 256: ...242 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE...