Red Hat LINUX VIRTUAL SERVER 4.7 - ADMINISTRATION Guia de Instalação Página 15

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 24
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 14
15
LDAP Configuration
LDAP Configuration Page
LDAP configuration enables users to utilize their external LDAP repository for SecurityCenter logins. Consult with your
system administrator for necessary LDAP server settings and once all required fields have been completed, click “Check
LDAP Configuration” to confirm. Click “Next” to continue or “Skip” to skip this step.
Repository Setup
When creating repositories, note that IPv4 and IPv6 addresses must be stored separately. Additional
repositories may be created once the initial configuration is complete.
Repositories are an excellent way to logically divide vulnerability data up based on organizational needs. For
example, three repositories could be created: one for “active” vulnerabilities, one for “passive” vulnerabilities
and a third for “compliance” data. Repositories can also be created based on geographical locations, asset
importance, user types, etc.
A repository is essentially a database of vulnerability data defined by one or more ranges of IP addresses. When the
repository is created, a selection for IPv4 or IPv6 addresses must be made. Only IP addresses of the designated type
may be imported to the designated repository. The “Organization” created in steps that follow can take advantage of one
or more repositories. During installation, a single local repository is created with the ability to modify its configuration and
add others post-install.
When creating SecurityCenter 4 repositories, LCE event source IP ranges must be included along with the
vulnerability IP ranges or the event data will not be accessible from the SecurityCenter UI.
Local repositories are based on the IP addresses specified in the “IP Ranges” field on this page during the initial setup.
“Remote” repositories use addressing information pulled over the network from a remote SecurityCenter. Remote
Vista de página 14
1 2 ... 10 11 12 13 14 15 16 17 18 19 20 ... 23 24

Comentários a estes Manuais

Sem comentários