D-Link 3100 24P User Manual - Page 150

Configuring Secure Socket Layer Security

Page 150 highlights

DGS-3100 Series Gigabit Stackable Managed Switch User Manual Configuring Secure Socket Layer Security Secure Socket Layer (SSL) is a security feature that provides a secure communication path between a host and client through the use of authentication, digital signatures, and encryption. These security functions are implemented using a Ciphersuite, which is a security string that determines the exact cryptographic parameters, specific encryption algorithms and key sizes used for authentication sessions, and that consists of:  Key Exchange -Cyphersuite strings specify the public key algorithm used. This switch utilizes the Rivest Shamir Adleman (RSA) public key algorithm. This is the first authentication process between client and host as they "exchange keys" in looking for a match and therefore authentication to be accepted to negotiate encryptions on the following level.  Encryption: The second part of the ciphersuite that includes the encryption used for encrypting the messages sent between client and host. The Switch supports two types of cryptology algorithms: - Stream Ciphers - There are two types of stream ciphers on the Switch, RC4 with 40-bit keys and RC4 with 128-bit keys. These keys are used to encrypt messages and need to be consistent between client and host for optimal use. - CBC Block Ciphers - Cipher Block Chaining (CBC) links encrypted text blocks. The Switch supports the 3DES EDE encryption code defined by the Data Encryption Standard (DES) to create the encrypted text.  Hash Algorithm - This part of the ciphersuite allows the user to choose a message digest function which will determine a Message Authentication Code. This Message Authentication Code will be encrypted with a sent message to provide integrity and prevent against replay attacks. The Switch supports two hash algorithms, Message Digest 5 (MD5) and Secure Hash Algorithm (SHA). The SSL Configuration Settings Page permits network managers to enable SSL with all supported ciphersuites on the Switch. Ciphersuites are security strings that determines the exact cryptographic parameters, specific encryption algorithms and key sizes to be used for an authentication session. The Switch possesses three possible ciphersuites for the SSL function, which are enabled by default. When the SSL function has been enabled, the Web is disabled. To manage the device via an Embedded Web System while SSL is enabled, the web browser must support SSL encryption. URL headers must begin with https://, for example https://10.90.90.90. The system supports up-to five SSH sessions. To enable SSL on the device: 1. Click Security > SSL. The SSL Configuration Settings Page opens: Figure 5-8. SSL Configuration Settings Page 136

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244

DGS-3100 Series Gigabit Stackable Managed Switch User Manual
136
Configuring Secure Socket Layer Security
Secure Socket Layer
(SSL) is a security feature that provides a secure communication path between a host and client
through the use of authentication, digital signatures, and encryption. These security functions are implemented using a
Ciphersuite
, which is a security string that determines the exact cryptographic parameters, specific encryption algorithms
and key sizes used for authentication sessions, and that consists of:
Key Exchange
—Cyphersuite strings specify the public key algorithm used. This switch utilizes the
Rivest Shamir
Adleman
(RSA) public key algorithm. This is the first authentication process between client and host as they “exchange
keys” in looking for a match and therefore authentication to be accepted to negotiate encryptions on the following level.
Encryption:
The second part of the ciphersuite that includes the encryption used for encrypting the messages sent
between client and host. The Switch supports two types of cryptology algorithms:
Stream Ciphers
– There are two types of stream ciphers on the Switch,
RC4 with 40-bit keys
and
RC4 with
128-bit keys
. These keys are used to encrypt messages and need to be consistent between client and host for
optimal use.
CBC Block Ciphers
Cipher Block Chaining
(CBC) links encrypted text blocks. The Switch supports the
3DES EDE
encryption code defined by the
Data Encryption Standard
(DES) to create the encrypted text.
Hash Algorithm
— This part of the ciphersuite allows the user to choose a message digest function which will
determine a Message Authentication Code. This
Message Authentication Code
will be encrypted with a sent message to
provide integrity and prevent against replay attacks. The Switch supports two hash algorithms,
Message Digest 5
(
MD5
)
and
Secure Hash Algorithm
(
SHA
).
The
SSL Configuration Settings Page
permits network managers to enable SSL with all supported ciphersuites on the
Switch. Ciphersuites are security strings that determines the exact cryptographic parameters, specific encryption algorithms
and key sizes to be used for an authentication session. The Switch possesses three possible ciphersuites for the SSL function,
which are enabled by default.
When the SSL function has been enabled, the Web is disabled.
To manage the device via an Embedded Web System while SSL is enabled, the web browser must support SSL encryption.
URL headers must begin with
https://
, for example
.
The system supports up-to five SSH sessions.
To enable SSL on the device:
1.
Click
Security > SSL
. The
SSL Configuration Settings Page
opens:
Figure 5-8. SSL Configuration Settings Page