D-Link DWS-3160-24TC DWS-3160 Series Web UI Reference Guide - Page 503

X.509 Certification Mutual Authentication, Certification Overview and Usage In the Wireless System

Page 503 highlights

DWS-3160 Series Gigabit Ethernet Unified Switch Web UI Reference Guide Since the Cluster Controller function may be disabled by setting the Cluster Priority to zero, it is possible that all wireless Switches in the network are configured to disable the Cluster Controller function and the network operates without the Cluster Controller. The Cluster priority is a global Switch configuration setting. When the global configuration is pushed from one peer Switch to another, the Cluster priority is not included in this configuration because its purpose is to differentiate the preference level for the Cluster Controller function for each Switch. There are two Switch status parameters that reflect the results of the Cluster Controller election process. The status parameters are the IP address of the elected Cluster Controller and a Boolean flag which indicates whether this Switch is the Cluster Controller. The flag does not provide extra information since it is derived from comparing the Switch's IP address with the Cluster address, but it offers a quick way for the administrator to know whether the local Switch is the Cluster Controller. After the Switch decides that it is the Cluster Controller, it sends an SNMP trap. X.509 Certification Mutual Authentication X.509 Certification Mutual Authentication: When the wireless system is configured to perform X.509 Mutual Certificate exchange the Switches and APs configure the TLS connection to perform mutual X.509 certificate exchange. Each device compares the certificate received from the remote end-point with the local copy of the remote device's certificate. If the certificates do not match, then the TLS connection is dropped. The X.509 certificates are auto-generated by the Switches and the APs, so the devices don't communicate with any trusted certificate authority and the administrator is not required to pay certificate maintenance fees. Each Switch holds a copy of the X.509 certificate for all other Switches and the APs it manages. Each AP holds a copy of the X.509 certificate of the Switches to which the AP may establish a connection. The certificates are distributed when the mutual authentication feature is enabled, during AP and Switch provisioning, and triggered by an administrator command. The X.509 mutual certificate exchange is the only mechanism for peer Switches to authenticate with each other because Switches don't support pass-phrase authentication. Note that if the wireless Switch is currently managed by a cluster controller, then any provisioning request toward this Switch will fail. When the X.509 mutual authentication is enabled the AP and peer Switch discovery is slower than when this feature is disabled because certificates are exchanged during the TLS connection setup. Certification Overview and Usage In the Wireless System: The TLS connection has two sides: a client side initiates the connection and the server side accepts the connection. In a Wireless System, the APs act only as TLS clients, and Switches act as either TLS clients or TLS servers. The Switch acts as a TLS client when it establishes a connection to a peer Switch. The TLS protocol supports client verification of server certificates and mutual certificate verification. The Wireless System configures the TLS session to use mutual certificate verification when the mutual authentication mode is enabled. When the mutual authentication mode is disabled, the Wireless System uses anonymous cipher and disables certificate exchange and verification. In order to verify the certificate each device generates a private key and an X.509 certificate. The private key is kept on the device and is not given out to other Switches or APs. The certificate contains a matching public key. The device certificate is given out to other devices in the wireless system. Data encrypted with the public key using the device's certificate can be decrypted with the device's private key. The certificates are encoded using PEM format, which is a Base64 encoded file. The Base64 encoding uses printable ASCII characters to represent binary data. Before the certificate files can be used for certificate validation they are loaded into the OpenSSL library. 498

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505

DWS-3160 Series Gigabit Ethernet Unified Switch Web UI Reference Guide
498
Since the Cluster Controller function may be disabled by setting the Cluster Priority to zero, it is possible that all
wireless Switches in the network are configured to disable the Cluster Controller function and the network operates
without the Cluster Controller.
The Cluster priority is a global Switch configuration setting. When the global configuration is pushed from one peer
Switch to another, the Cluster priority is not included in this configuration because its purpose is to differentiate the
preference level for the Cluster Controller function for each Switch.
There are two Switch status parameters that reflect the results of the Cluster Controller election process. The
status parameters are the
IP address
of the elected Cluster Controller and a
Boolean flag
which indicates whether
this Switch is the Cluster Controller. The flag does not provide extra information since it is derived from comparing
the Switch’s IP address with the Cluster address, but it offers a quick way for the administrator to know whether the
local Switch is the Cluster Controller.
After the Switch decides that it is the Cluster Controller, it sends an SNMP trap.
X.509 Certification Mutual Authentication:
X.509 Certification Mutual Authentication
When the wireless system is configured to perform X.509 Mutual Certificate exchange the Switches and APs
configure the TLS connection to perform mutual X.509 certificate exchange. Each device compares the certificate
received from the remote end-point with the local copy of the remote device's certificate. If the certificates do not
match, then the TLS connection is dropped.
The X.509 certificates are auto-generated by the Switches and the APs, so the devices don't communicate with any
trusted certificate authority and the administrator is not required to pay certificate maintenance fees. Each Switch
holds a copy of the X.509 certificate for all other Switches and the APs it manages. Each AP holds a copy of the
X.509 certificate of the Switches to which the AP may establish a connection. The certificates are distributed when
the mutual authentication feature is enabled, during AP and Switch provisioning, and triggered by an administrator
command.
The X.509 mutual certificate exchange is the only mechanism for peer Switches to authenticate with each other
because Switches don't support pass-phrase authentication. Note that if the wireless Switch is currently managed
by a cluster controller, then any provisioning request toward this Switch will fail.
When the X.509 mutual authentication is enabled the AP and peer Switch discovery is slower than when this
feature is disabled because certificates are exchanged during the TLS connection setup.
Certification Overview and Usage In the Wireless System:
The TLS connection has two sides: a client side initiates the connection and the server side accepts the connection.
In a Wireless System, the APs act only as TLS clients, and Switches act as either TLS clients or TLS servers. The
Switch acts as a TLS client when it establishes a connection to a peer Switch.
The TLS protocol supports client verification of server certificates and mutual certificate verification. The Wireless
System configures the TLS session to use mutual certificate verification when the mutual authentication mode is
enabled. When the mutual authentication mode is disabled, the Wireless System uses anonymous cipher and
disables certificate exchange and verification.
In order to verify the certificate each device generates a private key and an X.509 certificate. The private key is
kept on the device and is not given out to other Switches or APs. The certificate contains a matching public key.
The device certificate is given out to other devices in the wireless system. Data encrypted with the public key using
the device's certificate can be decrypted with the device's private key.
The certificates are encoded using PEM format, which is a Base64 encoded file. The Base64 encoding uses
printable ASCII characters to represent binary data. Before the certificate files can be used for certificate validation
they are loaded into the OpenSSL library.