Basic overview – Allied Telesis AT-S63 User Manual

Page 768

Advertising
background image

Chapter 33: Encryption Keys

768

Section IX: Management Security

Basic Overview

Protecting your managed switches from unauthorized management
access is an important role for a network manager. Network operations
and security can be severely compromised if an intruder gains access to
critical switch information, such as a manager’s login username and
password, and uses that information to alter a switch’s configuration
settings.

One way an intruder could obtain critical switch information is by
monitoring network traffic with a network analyzer, such as a sniffer, and
capturing management packets from remote Telnet or web browser
management sessions. The payload in the packets exchanged during
remote management sessions is transmitted in plaintext, which can be
easily deciphered. The information obtained from the management
packets could enable an intruder to access a switch.

A way to prevent this type of assault is by encrypting the payload in the
packets exchanged during a remote management session between a
management station and a switch. Encryption makes the packets
unintelligible to an outside agent. Only the remote workstation and the
switch engaged in the management session are able to decode each
other’s packets.

A fundamental part of encryption is the encryption key. The key converts
plaintext into encrypted text, and back again. A key consists of two
separate keys: a private key and a public key. Together they create a key
pair.

The AT-S63 management software supports encryption for remote web
browser management sessions using the Secure Sockets Layer (SSL)
protocol. Adding encryption to your web browser management sessions
involves creating one key pair and adding the public key of the key pair to
a certificate, a digital document stored on the switch. You can have the
switch create the certificate itself or you can have a public or private
certificate authority (CA) create it for you. For an overview of the steps for
adding encryption to your web browser management sessions, refer to
“General Steps for Configuring the Web Server for Encryption” on
page 764.

The Telnet protocol does not support encryption. To employ encryption
when remotely managing a switch using the menus interface, you must
first obtain a Secure Shell (SSH) protocol application. SSH offers the
same function as Telnet, but with encryption.

SSH encryption requires that you create two key pairs on the switch— a
server key pair and a host key pair and then configure the Secure Shell
protocol server software on the switch, as explained in Chapter 35,
“Secure Shell (SSH)” on page 823.

Advertising