The effective security value is determined by applying rules in this order:
CCISSF will always connect with the highest possible level of security when communicating with another CCISSF-capable CAICCI. The following table describes the behavior:
|
Source CAICCI Effective SECURE Value |
Target CAICCI Effective SECURE Value |
Connection Status |
|---|---|---|
|
Yes |
Yes |
Secure |
|
Yes |
No |
Secure |
|
No |
Yes |
Secure |
|
No |
No |
Not secure |
|
Copyright © 2010 CA.
All rights reserved.
|
|