Encryption, Snmp gets, sets, and traps, User’s guide – Dell Managed PDU LED User Manual

Page 204

Advertising
background image

USER’S GUIDE

Ma

na

ge

d R

a

ck

PD

U

199

Encryption

SNMP GETS, SETS, and Traps

For encrypted communication when you use SNMP to monitor or configure the Rack
PDU, choose SNMPv3. The privacy passphrase used with SNMPv3 user profiles
ensures the privacy of the data (by means of encryption, using the AES or DES
encryption algorithm) that an NMS sends to or receives from the Rack PDU.

Secure Shell (SSH) and Secure CoPy (SCP) for the command line interface

The Secure Shell protocol.

SSH provides a secure mechanism to access computer

consoles, or shells, remotely. The protocol authenticates the server (in this case, the
Rack PDU) and encrypts all transmissions between the SSH client and the server.
• SSH is a high-security alternative to Telnet. Telnet does not provide encryption.
• SSH protects the user name and password, which are the credentials for

authentication, from being used by anyone intercepting network traffic.

• To authenticate the SSH server (the Rack PDU) to the SSH client, SSH uses a host

key unique to the SSH server. The host key is an identification that cannot be
falsified, and it prevents an invalid server on the network from obtaining a user name
and password by presenting itself as a valid server.

• The Rack PDU supports SSH version 2, which provides protection from attempts to

intercept, forge, or change data during transmission.

• When you enable SSH, Telnet is automatically disabled.
• The interface, user accounts, and user access rights are the same whether you

access the command line interface through SSH or Telnet.

For information on supported SSH client applications, see

Telnet and

Secure Shell (SSH)

. To create a host key, see

Create an SSH Host Key

.

Advertising