isms-2----Page:7
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16 

Ideal solution
Uses existing name space and attributes of existing security infrastructures including: SSH key pairs, X.509 certs, name/password, and/or name & secureID card
Network infrastructure device configured with identities and verification mechanisms, then support for SNMPv3 is turned on
No new information or configuration is needed on systems that run SNMP management applications
PPT Version