D-Link DSL-G604T User Manual Page 100

  • Download
  • Add to my manuals
  • Print
  • Page
    / 207
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 99
DGS-3024 Gigabit Ethernet Switch Manual
8
Security
The second Web Manager main folder is Security and includes the following windows and sub-folders: Trusted Host,
Secure Socket Layer (SSL), Secure Shell (SSH), and Access Authentication Control, as well as secondary windows.
Trusted Host
Go to the Security folder and click on the Trusted Host link; the following window will appear.
.
Figure 8- 1. Security IP Management window
Use security IP management to permit remote stations to manage the Switch. If you choose to define one or more designated
management stations, only the chosen stations, as defined by IP address, will be allowed management privilege through the
web manager or Telnet session. To define a management station IP setting, type in the IP address and click the Apply button.
Secure Socket Layer (SSL)
Secure Sockets Layer or SSL is a security feature that will provide a secure communication path between a host and client
through the use of authentication, digital signatures and encryption. These security functions are implemented through the
use of a ciphersuite, which is a security string that determines the exact cryptographic parameters, specific encryption
algorithms and key sizes to be used for an authentication session and consists of three levels:
1. Key Exchange: The first part of the ciphersuite string specifies the public key algorithm to be used. This Switch
utilizes the Rivest Shamir Adleman (RSA) public key algorithm and the Digital Signature Algorithm (DSA),
specified here as the DHE DSS Diffie-Hellman (DHE) public key algorithm. This is the first authentication process
between client and host as they “exchange keys” in looking for a match and therefore authentication to be accepted
to negotiate encryptions on the following level.
2. Encryption: The second part of the ciphersuite that includes the encryption used for encrypting the messages sent
between client and host. The Switch supports two types of cryptology algorithms:
Stream Ciphers – There are two types of stream ciphers on the Switch, RC4 with 40-bit keys and RC4 with 128-bit keys.
These keys are used to encrypt messages and need to be consistent between client and host for optimal use.
CBC Block Ciphers – CBC refers to Cipher Block Chaining, which means that a portion of the previously encrypted
block of encrypted text is used in the encryption of the current block. The Switch supports the 3DES EDE
encryption code defined by the Data Encryption Standard (DES) to create the encrypted text.
86
Page view 99
1 2 ... 95 96 97 98 99 100 101 102 103 104 105 ... 206 207

Comments to this Manuals

No comments