EasyManua.ls Logo

Juniper SSG 5 - Page 19

Juniper SSG 5
21 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Juniper Networks SSG 5 and SSG 20 Security Policy
19
Table C: Read-Only User
CSP \ Services Status
IPSEC HMAC SHA-1 Key U
IPSEC ESP Key U
IKE Pre-shared Key U
IKE Encryption Key N/A
IKE HMAC SHA-1 Key N/A
Password U
SSH Server/Host DSA Private Key U
SSH Encryption Key N/A
SSH HMAC SHA-1 Key N/A
HA Key N/A
IKE RSA/DSA/ECDSA Private Key N/A
PRNG Seed and Seed Key N/A
Diffie Hellman Private Key Components N/A
RADIUS Secret Key U
1. The Crypto-Officer is authorized to change all authorized operators' user names and passwords, but the user is only
allowed to change his/her own user name and password
2. The Crypto-Officer is authorized to remove all authorized operators.

Related product manuals