D-Link 3100 24 User Manual - Page 120

Configuring Secure Socket Layer Security

Page 120 highlights

DGS-3100 Series Gigabit Stackable Managed Switch User Manual 4. Define the authentication port in the Authentic Port field. 5. Define the accounting port in the Accounting Port field. 6. Define the authentication and encryption key in the Key field. 7. Reenter the RADIUS Key in the Confirm Key field. 8. Click . • To edit the Radius Server list, click current values, which then can be edited. adjacent to the required listed server. The upper fields display the • To delete a radius server from the list, click defined, and the device is updated. adjacent to the relative list entry. The radius servers are Configuring Secure Socket Layer Security Secure Socket Layer (SSL) is a security feature that provides a secure communication path between a host and client through the use of authentication, digital signatures, and encryption. These security functions are implemented using a Ciphersuite, which is a security string that determines the exact cryptographic parameters, specific encryption algorithms and key sizes used for authentication sessions, and that consists of: • Key Exchange -Cyphersuite strings specify the public key algorithm used. This switch utilizes the Rivest Shamir Adleman (RSA) public key algorithm. This is the first authentication process between client and host as they "exchange keys" in looking for a match and therefore authentication to be accepted to negotiate encryptions on the following level. • Encryption: The second part of the ciphersuite that includes the encryption used for encrypting the messages sent between client and host. The Switch supports two types of cryptology algorithms: - Stream Ciphers - There are two types of stream ciphers on the Switch, RC4 with 40-bit keys and RC4 with 128-bit keys. These keys are used to encrypt messages and need to be consistent between client and host for optimal use. - CBC Block Ciphers - Cipher Block Chaining (CBC) links encrypted text blocks. The Switch supports the 3DES EDE encryption code defined by the Data Encryption Standard (DES) to create the encrypted text. • Hash Algorithm - This part of the ciphersuite allows the user to choose a message digest function which will determine a Message Authentication Code. This Message Authentication Code will be encrypted with a sent message to provide integrity and prevent against replay attacks. The Switch supports two hash algorithms, Message Digest 5 (MD5) and Secure Hash Algorithm (SHA). The SSL Configuration Settings Page permits network managers to enable SSL with all supported ciphersuites on the Switch. Ciphersuites are security strings that determines the exact cryptographic parameters, specific encryption algorithms and key sizes to be used for an authentication session. The Switch possesses three possible ciphersuites for the SSL function, which are enabled by default. When the SSL function has been enabled, the Web is disabled. To manage the device via an Embedded Web System while SSL is enabled, the web browser must support SSL encryption. URL headers must begin with https://, for example https://10.90.90.90. The system supports up-to five SSH sessions. To enable SSL on the device: 1. Click Security > SSL. The SSL Configuration Settings Page opens: 108

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209

DGS-3100 Series Gigabit Stackable Managed Switch User Manual
108
4.
Define the authentication port in the
Authentic Port
field.
5.
Define the accounting port in the
Accounting Port
field.
6.
Define the authentication and encryption key in the
Key
field.
7.
Reenter the RADIUS Key in the
Confirm Key
field.
8.
Click
.
To edit the Radius Server list, click
adjacent to the required listed server. The upper fields display the
current values, which then can be edited.
To delete a radius server from the list, click
adjacent to the relative list entry. The radius servers are
defined, and the device is updated.
Configuring Secure Socket Layer Security
Secure Socket Layer
(SSL) is a security feature that provides a secure communication path between a host and client
through the use of authentication, digital signatures, and encryption. These security functions are implemented using a
Ciphersuite
, which is a security string that determines the exact cryptographic parameters, specific encryption algorithms
and key sizes used for authentication sessions, and that consists of:
Key Exchange
—Cyphersuite strings specify the public key algorithm used. This switch utilizes the
Rivest Shamir
Adleman
(RSA) public key algorithm. This is the first authentication process between client and host as they “exchange
keys” in looking for a match and therefore authentication to be accepted to negotiate encryptions on the following level.
Encryption:
The second part of the ciphersuite that includes the encryption used for encrypting the messages sent
between client and host. The Switch supports two types of cryptology algorithms:
Stream Ciphers
– There are two types of stream ciphers on the Switch,
RC4 with 40-bit keys
and
RC4 with
128-bit keys
. These keys are used to encrypt messages and need to be consistent between client and host for
optimal use.
CBC Block Ciphers
Cipher Block Chaining
(CBC) links encrypted text blocks. The Switch supports the
3DES EDE
encryption code defined by the
Data Encryption Standard
(DES) to create the encrypted text.
Hash Algorithm
— This part of the ciphersuite allows the user to choose a message digest function which will
determine a Message Authentication Code. This
Message Authentication Code
will be encrypted with a sent message to
provide integrity and prevent against replay attacks. The Switch supports two hash algorithms,
Message Digest 5
(
MD5
)
and
Secure Hash Algorithm
(
SHA
).
The
SSL Configuration Settings Page
permits network managers to enable SSL with all supported ciphersuites on the
Switch. Ciphersuites are security strings that determines the exact cryptographic parameters, specific encryption algorithms
and key sizes to be used for an authentication session. The Switch possesses three possible ciphersuites for the SSL function,
which are enabled by default.
When the SSL function has been enabled, the Web is disabled.
To manage the device via an Embedded Web System while SSL is enabled, the web browser must support SSL encryption.
URL headers must begin with
https://
, for example
.
The system supports up-to five SSH sessions.
To enable SSL on the device:
1.
Click
Security > SSL
. The
SSL Configuration Settings Page
opens: