User guide – Luxul XMS-1024P User Manual

Page 35

Advertising
background image

35

User Guide

© 2014 Luxul. All Rights Reserved.

Other trademarks and registered trademarks are the property of their respective owners

CAUTION: The SSL Certificate and Key uploaded must be a matching pair. If

the Certificate and Key are not a matching pair HTTPS access to
the Switch will fail..

CAUTION: The SSL Certificate and Key uploaded will not take effect until

the Switch is rebooted.

NOTE: To establish a secured connection to the Switch using https, please

enter https:// before the IP Address of the Switch in your Web
Browser.

CAUTION: HTTPS connections will be slower than http connections, as

https connections involve Authentication, Encryption and
Decryption processes.

4.4.3 SSH Config
SSH (Secure Shell) is a security protocol established on application and transport layers.
An SSH-encrypted-connection is similar to a telnet connection, but with telnet remote
Management method not having any inherent safety we offer this options for remote
command line configuration. SSH provides information security and Authentication
when you log on to the Switch remotely through any Network environment. It
encrypts all transmitted Data to prevent the Data during Remote Management
being compromised.

SSH has two versions, V1 and V2 which are not compatible with each other. During
initial communication the SSH Server and Client auto-negotiate the SSH version and the
encryption algorithm. After a successful negotiation the Client sends an Authentication
request to the Server for login. Once the login process is complete the two can com-
municate with each other. The Switch can be configured to run an SSH Server to allow
Users to log on to the Switch via SSH connection using any readily available SSH client
software (we recommend the PuTTY SSH Client).

The SSH key can be Uploaded to the Switch. If the key is successfully Uploaded,
Certificate Authentication will be preferred for SSH all connections to the Switch.

Advertising