4
Security Management
4.1 Compute Node
Compute nodes support security solutions based on the Trusted Platform Module (TPM).
The TPM is a security chip that complies with the Trusted Computing Group (TCG) TPM
specification. The hardware-based TPM provides data encryption, password protection,
authentication, and internal resource protection. The TPM is available.
The TPM is installed on a compute node and connects to the compute node through a port.
You can access a compute node with the TPM only after authorization, which ensures data
security based on hardware.
4.2 MM
The MM security involves hierarchical command protection, remote Secure Shell (SSH)
login, and Simple Network Management Protocol (SNMP) encrypted authentication.
Hierarchical Command Protection
To ensure operation security, only the user who has passed the authentication can access the
MM through an Ethernet port.
The MM provides hierarchical protection for command lines. The commands are classified
into commands of the monitoring level, configuration level, and management level in
ascending order. Login users are classified into common user, operator, and administrator.
After logging in to the MM, a user can run only the commands corresponding to or lower than
the specified level.
Remote SSH Login
The MMs support Secure Shell (SSH), which provides security protection and verification
functions. SSH defends against various attacks on an insecure network. The MMs also
HUAWEI X6800 Server
Technical White Paper
4 Security Management
Issue 02 (2019-03-13)
Copyright © Huawei Technologies Co., Ltd.
23