Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
- Security Configuration
- Communication Configuration
- NNMi Data Encryption
- Providing a Password for Embedded Database Tools
- Allowing Non-Root Linux Users to Start and Stop NNMi
- Hardening Device Communication
- User Authentication
- Passwords
- Clickjacking Protection
- Configuring NNMi for FIPS 140-2 Level 1 Compliance
- Restrict Remote Access to NPS Databases
- Auditing
- Strengthen Security
- Start, Stop, or Restart All NNMi Services
- Start, Stop, or Restart All NNM iSPI Performance for Traffic Services
NNMi Data Encryption
NNMi incorporates data encryption in many areas of the product. For example:
- Application failover encrypts messages sent between cluster nodes.
- NNMi stores passwords for user accounts in the NNMi database in encrypted form.
- Global Network Management (GNM) encrypts messages sent between regional managers and the global manager.
NNMi uses a method of data encryption that spans several NNMi components. NNMi data encryption supports the following encryption types:
- symmetric encryption—both parties share the same secret key
- asymmetric—public and private key encryption where each side has the other side’s public key, but they keep their own private key
- MessageDigest (hash)—one-way encryption (cannot decrypt) where arbitrarily long strings are reduced to fixed size strings
This topic describes the default security configurations for encryption and hashing within NNMi.
-
A new installation of NNMi10.30 uses Federal Information Processing Standards (FIPS) 140-2-validated cryptographic module (RSA BSAFE) for encryption and key management.
In an upgraded NNMi environment, FIPS-compliant ciphers and algorithms are automatically used for most password encryption and network communication procedures. However, some legacy ciphers and algorithms do exist in the upgraded environment that do not meet FIPS guidelines.
-
During installation, NNMi generates a self-signed certificate using a 2048-bit encryption key, SHA 256, and RSA.
Note recommends using a CA-signed certificate instead of the self-signed certificate provided by NNMi.
-
For local authentication into NNMi, NNMi uses a salted SHA-256 password hash for storing NNMi user passwords.
-
For encryption of device passwords stored in the NNMi database, NNMi uses the AES 128 algorithm.
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to network-management-doc-feedback@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: