![](/images/new-backgrounds/1242477/24247761x1.webp)
Generate Security Keys | The security keys used internally by HTTPS and SSH are |
| |
| issue. Note: Key generation is |
| performed when the appliance is idle. It will take |
| the appliance is idle (or much longer if the appliance is in use). |
|
|
Security Keys Status | • Valid Keys – The existing security keys are valid. |
| • Generating Keys – New security keys are being generated. |
| • Reboot Required – New security keys have been generated and |
| will take effect after a reboot. |
|
|
Improving Security
You can improve security by (1) blocking unauthorized attempts to login and access a device and (2) by reducing exposure to malicious software attacks. The most common vulnerability is related to user accounts and passwords. After a successful installation, you should immediately change the default passwords. Many attacks come from within an organization and this helps to minimize the risk. The VBAdmin login is generally secure since it utilizes encryption techniques to hide usernames and passwords from network spyware.
Malicious software covertly attaches itself to unsuspecting devices. These programs are generally designed to compromise personal information or to create system havoc. Since the VBrick appliance uses an
Logging
Logging of certain events can be stored both locally (within the VBrick device) or externally (for example on a server). Local logs are stored in volatile memory. For preservation of information, it is recommended that remote logging be utilized. Remote servers generally offer ample storage and offer the additional benefit of collecting log information from several VBricks simultaneously. When logging externally, specify either the IP address or hostname of the actual server using the Remote Event Log Destination field. If remote logging is enabled, the log information is sent via SNMP traps. When you enable logging, be sure to set the system date and time (see System Time on page 11) or select a network time server in order to get accurate time stamps in the logs.
22 | © 2009 VBrick Systems, Inc. |