
desire Key Length or Signature Algorithm settings that are too strong to be generated in a CSR from
some devices. In such cases, Security Manager will choose itself as the source of the CSR instead of
Device.
Related Policy Items includes built-in intelligence to notify the policy creator of other related policy
settings. In some cases, enabling a setting can cause the options of a related technology to be
limited. For example, if FIPS 140 is enabled, the options available under the related technologies of
SNMPv3 and Web Encryption Strength will be limited by removing the less strong options as they are
not supported with FIPS 140.
Komentarze do niniejszej Instrukcji