Hi,
Note that ISMS has a user-authenticatioin requirement for mapping to
data access controls, while I do not believe that to be a requirement
of syslog.
David Harrington
[EMAIL PROTECTED]
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Chris Lo
; Subject: Re: SSH - RE: [Syslog] Re: Threat model and charter
>
> On Wed, 2006-01-11 at 06:29 -0800, Chris Lonvick wrote:
> > Hi,
> >
> > I forgot to address the use of SSH for authentication. The
> isms WG is
> > trying to use SSH to provide security for
On Wed, 2006-01-11 at 06:29 -0800, Chris Lonvick wrote:
> Hi,
>
> I forgot to address the use of SSH for authentication. The isms WG is
> trying to use SSH to provide security for SNMPv3. This can be done by
> having the devices authenticate by having a username and credential
> (password, pu