Configuring protocols, Security protocols, Chapter 6 – Dell POWEREDGE M1000E User Manual

Page 177: Table 21, Chapter 6, “configuring protocols, Chapter

Advertising
background image

Fabric OS Administrator’s Guide

177

53-1002745-02

Chapter

6

Configuring Protocols

In this chapter

Security protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

Secure Copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

Secure Shell protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

Secure Sockets Layer protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182

Simple Network Management Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

Telnet protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190

Listener applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

Ports and applications used by switches. . . . . . . . . . . . . . . . . . . . . . . . . . . 192

Security protocols

Security protocols provide endpoint authentication and communications privacy using
cryptography. Typically, you are authenticated to the switch while the switch remains
unauthenticated to you. This means that you can be sure with what you are communicating. The
next level of security, in which both ends of the conversation are sure with whom they are
communicating, is known as two-factor authentication. Two-factor authentication requires public
key infrastructure (PKI) deployment to clients.

Fabric OS supports the secure protocols shown in

Table 21

.

TABLE 21

Secure protocol support

Protocol Description

HTTPS

HTTPS is a Uniform Resource Identifier scheme used to indicate a secure HTTP connection. Web Tools
supports the use of Hypertext Transfer Protocol over SSL (HTTPS).

IPsec

Internet Protocol Security (IPsec) is a framework of open standards for providing confidentiality,
authentication and integrity for IP data transmitted over untrusted links or networks.

LDAPS

Lightweight Directory Access Protocol over SSL (LDAPS) uses a certificate authority (CA). By default,
LDAP traffic is transmitted unsecured. You can make LDAP traffic confidential and secure by using
Secure Sockets Layer (SSL) / Transport Layer Security (TLS) technology in conjunction with LDAP.

SCP

Secure Copy (SCP) is a means of securely transferring computer files between a local and a remote host
or between two remote hosts, using the Secure Shell (SSH) protocol. Configuration upload and download
support the use of SCP.

SNMP

Simple Network Management Protocol (SNMP) is used in network management systems to monitor
network-attached devices for conditions that warrant administrative attention. Supports SNMPv1, v2,
and v3.

Advertising