The most recent content from our members.
We have a requirement to monitor IPSEC tunnels configured on a Cisco ISR device. I’ve used UnDP and created a few widgets, but they only display raw values instead of meaningful labels. For example, the "TUNNELENCRYPTIONALGORITHM" field shows values like 3, 4, 5 as below. I'm currently working on adding meaningful column…
We’ve run into an issue where Transition Networks hardened switches only support ecdsa-sha2-nistp521; and fails SSH authentication in NCM.
We would like to make the certificate credentials as secure as possible. Currently the only two options for a certificate credential are RSA and DSA encryption Please add ECDSA (elliptic curve digital signature algorithm) encryption as a supported option during credential creation. I am talking about this page with in the…
A few days ago we've got security-problems regarding the configured ssh ciphers on network devices. To solve our open Security-Case, we need to configure the ssh ciphers aes256-gcm. Those are not listed in the list of supportet ciphers for Orion NCM:…
While there is a pretty decent choice of FTPS ciphers available, up to and including TLS 1.3, SFTP seems to be a bit behind the times. The only host key algorithms currently supported are DSA and RSA. DSA is already almost unusable in practice, and RSA has also been disabled by default in recent OpenSSH versions for…
Dear Development Team, Could there be Support added for Multiple Server Host Key Algorithm, Currently it only support one Server Host Key Algorithm and only 2 option from which we can select And Also Adding support for below Server Host Key Algorithm. rsa-sha2-512 rsa-sha2-256 This will help to support New Application been…
I recently reached out to support to see if there was any way to track or report on Encrypted (BitLocked) Devices. They stated this was not available at this time. Submitting the idea here. I feel this would be a very helpful reporting item for compliance.
For some of us, a trip to the doctor includes the doctor inputting our information into our medical record using their computer or tablet. The updated record saves to the medical office’s server. Your information can then go anywhere from a medical billing office, to your insurance company’s claims office, to your…
Hi, is it possible to store logs in an encrypted way? I read that I can archive it in an encrypted zip file but I think I should do that upstream for legal reasons Thanks
Getting ready for VMworld next week in San Francisco. If you're attending, please stop by the booth and say hello. I have some speaking sessions as well as a session in the expo hall. Feel free to come over and talk data or bacon. As always, here are some links I hope you find interesting. Enjoy! Supercomputer creates…
It looks like you're new here. Sign in or register to get started.