Please enter search query.
Search <book_title>...
Veritas Access Appliance Initial Configuration Guide
Last Published:
2023-06-19
Product(s):
Appliances (8.0)
Platform: Access Appliance OS,Veritas 3340,Veritas 3350
- Getting to know the Access Appliance
- Preparing to configure the appliance
- Configuring the appliance for the first time
- Getting started with the Veritas Access GUI
- Network connection management
- Monitoring the appliance
- Resetting the appliance to factory settings
- Appliance security
- About Access appliance user account privileges
- About the Access Appliance intrusion detection system
- About Access appliance operating system security
- Recommended IPMI settings on the Access appliance
Password encryption and handling on the Access appliance
The Access appliance uses the following password encryption measures:
All local users (including admin, maintenance, and root) use SHA-512 password encryption.
The past seven passwords are encrypted and logged for each user to enforce the password policy.
User passwords are in transit in the following situations:
Logging on to the Access Appliance shell menu over SSH where the password is protected by the SSH protocol.