Owner's manual
Table Of Contents
- Chapter 1: Introduction
- Chapter 2: Accessing CC-SG
- Chapter 3: Configuring CC-SG with Guided Setup
- Chapter 4: Creating Associations
- Chapter 5: Adding Devices and Device Groups
- Chapter 6: Configuring Nodes and Interfaces
- Chapter 7: Adding and Managing Users and User Groups
- Chapter 8: Policies
- Chapter 9: Configuring Remote Authentication
- Chapter 10: Generating Reports
- Audit Trail Report
- Error Log Report
- Access Report
- Availability Report
- Active Users Report
- Locked Out Users Report
- User Data Report
- Users in Groups Report
- Group Data Report
- AD User Group Report
- Asset Management Report
- Node Asset Report
- Active Nodes Report
- Node Creation Report
- Query Port Report
- Active Ports Report
- Scheduled Reports
- CC-NOC Synchronization Report
- Chapter 11: System Maintenance
- Chapter 12: Advanced Administration
- Appendix A: Specifications (G1, V1, and E1)
- Appendix B: CC-SG and Network Configuration
- Appendix C: User Group Privileges
- Appendix D: SNMP Traps
- Appendix E: Troubleshooting
- Appendix F: Two-Factor Authentication
- Appendix G: FAQs
- Appendix H: Keyboard Shortcuts

CHAPTER 12: ADVANCED ADMINISTRATION 169
Configure Security
The Security Manager is used to manage how CC-SG provides access to users. Within Security
Manager you can configure authentication methods, SSL access, strong password rules, lockout
rules, the login portal, certificates, and access control lists.
Remote Authentication
Please refer to Chapter 9: Configuring Remote Authentication for detailed instructions on
configuring remote authentication servers.
Secure Client Connections
In Security Manager, you can configure security settings for client connections to CC-SG.
1. On the Administration menu, click Security. The Security Manager screen appears.
2. Click the General tab.
Figure 173 Secure Client Connections
3. Check the Requires AES Encryption between Client and Server check box if you want
AES encrypted connections to CC-SG. Type the encryption key length you want to use in the
Key Length field. The default key length is 128.
4. Type the port number for accessing CC-SG via SSH in the SSH Server Port field. Please
refer to SSH Access to CC-SG, later in this chapter, for additional information.
5. Click the HTTP or HTTP/SSL radio button to select the Browser Connection Protocol you
want client’s to use when connecting to CC-SG. You must restart CC-SG for changes to this
setting to take effect.
6. Click Update to save your changes.