![]() This system includes cryptography and certificates. The tacacs system with dedicated right-profile, or Maximo by the team leader or head of the admin’s department. To get access rights to the device the following default 4.7 AuthorizationĪuthentication is done via tacacs using the centralĬisco ACS Server. Variations, also regarding security issues. What kind of authentication is used? Describe the process and ICMP type 3, type 9, type 10, type 11 4.6 Authentication Refere to the Cisco software advisor tool: 4.4 System Internal Interfaces P:\PROJECTS3\ISO32\Network\intern\Plaene 4.3 Dependencies See configuration template below 4.2 Network Planĭetailed network drawings are available at: Implementation 4.1 Approved Scope of Operation ![]() Please classify the potential material damage with respect toĬonfidentiality, integrity and availability. Please classify the potential immaterial damage with respect toĬonfidentiality, integrity and availability. Potential damage that can occur if the confidentiality, integrity orĪvailability of the application or data processed is affected. The security requirements of an application are derived from the Of Security Requirements 2.1 Security Requirements The uplinks areĬonnected to the distribution Switches. This Switch is used toĬonnect the clients and printers to the LAN data network. Product Manager: Additional contact person: External Partners: 1.3 Subsystems of the Application 1.4 Brief The Switch to the Factory Default Settingsġ General Information 1.1 Product Product Name: Approved at: Approved by: 1.2 Product Manager, Contact Person 4.8 User Administration
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |