D-Link DGS-3048 Product Manual - Page 105

Secure Socket Layer SSL, Configuration, Key Exchange, Encryption, Hash Algorithm, ciphersuite

Page 105 highlights

DGS-3048 Gigabit Ethernet Switch Manual Secure Socket Layer (SSL) Secure Sockets Layer or SSL is a security feature that will provide a secure communication path between a host and client through the use of authentication, digital signatures and encryption. These security functions are implemented through the use of a ciphersuite, which is a security string that determines the exact cryptographic parameters, specific encryption algorithms and key sizes to be used for an authentication session and consists of three levels: • Key Exchange: The first part of the cyphersuite string specifies the public key algorithm to be used. This switch utilizes the Rivest Shamir Adleman (RSA) public key algorithm and the Digital Signature Algorithm (DSA), specified here as the DHE DSS Diffie-Hellman (DHE) public key algorithm. This is the first authentication process between client and host as they "exchange keys" in looking for a match and therefore authentication to be accepted to negotiate encryptions on the following level. • Encryption: The second part of the ciphersuite that includes the encryption used for encrypting the messages sent between client and host. The Switch supports two types of cryptology algorithms: - Stream Ciphers - There are two types of stream ciphers on the Switch, RC4 with 40-bit keys and RC4 with 128-bit keys. These keys are used to encrypt messages and need to be consistent between client and host for optimal use. - CBC Block Ciphers - CBC refers to Cipher Block Chaining, which means that a portion of the previously encrypted block of encrypted text is used in the encryption of the current block. The Switch supports the 3DES EDE encryption code defined by the Data Encryption Standard (DES) to create the encrypted text. • Hash Algorithm: This part of the ciphersuite allows the user to choose a message digest function which will determine a Message Authentication Code. This Message Authentication Code will be encrypted with a sent message to provide integrity and prevent against replay attacks. The Switch supports two hash algorithms, MD5 (Message Digest 5) and SHA (Secure Hash Algorithm). These three parameters are uniquely assembled in four choices on the Switch to create a three-layered encryption code for secure communication between the server and the host. The user may implement any one or combination of the ciphersuites available, yet different ciphersuites will affect the security level and the performance of the secured connection. The information included in the ciphersuites is not included with the Switch and requires downloading from a third source in a file form called a certificate. This function of the Switch cannot be executed without the presence and implementation of the certificate file and can be downloaded to the Switch by utilizing a TFTP server. The Switch supports SSLv3. Other versions of SSL may not be compatible with this Switch and may cause problems upon authentication and transfer of messages from client to host. Configuration This window will allow the user to enable SSL on the Switch and implement any one or combination of listed ciphersuites on the Switch. A ciphersuite is a security string that determines the exact cryptographic parameters, specific encryption algorithms and key sizes to be used for an authentication session. The Switch possesses four possible ciphersuites for the SSL function, which are all enabled by default. To utilize a particular ciphersuite, disable the unwanted ciphersuites, leaving the desired one for authentication. When the SSL function has been enabled, the web will become disabled. To manage the Switch through the web-based management while utilizing the SSL function, the web browser must support SSL encryption and the header of the URL must begin with https://. (Ex. https://10.90.90.90) Any other method will result in an error and no access can be authorized for the web-based management. To view the following window, click Security > Secure Socket Layer (SSL) > Configuration: 93

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147

DGS-3048 Gigabit Ethernet Switch Manual
93
Secure Socket Layer (SSL)
Secure Sockets Layer
or
SSL
is a security feature that will provide a secure communication path between a host and client
through the use of authentication, digital signatures and encryption. These security functions are implemented through the
use of a
ciphersuite
, which is a security string that determines the exact cryptographic parameters, specific encryption
algorithms and key sizes to be used for an authentication session and consists of three levels:
Key Exchange:
The first part of the cyphersuite string specifies the public key algorithm to be used. This switch
utilizes the Rivest Shamir Adleman (RSA) public key algorithm and the Digital Signature Algorithm (DSA),
specified here as the
DHE DSS
Diffie-Hellman (DHE) public key algorithm. This is the first authentication process
between client and host as they “exchange keys” in looking for a match and therefore authentication to be accepted
to negotiate encryptions on the following level.
Encryption:
The second part of the ciphersuite that includes the encryption used for encrypting the messages sent
between client and host. The Switch supports two types of cryptology algorithms:
Stream Ciphers – There are two types of stream ciphers on the Switch,
RC4 with 40-bit keys
and
RC4 with
128-bit keys
. These keys are used to encrypt messages and need to be consistent between client and host for
optimal use.
CBC Block Ciphers – CBC refers to Cipher Block Chaining, which means that a portion of the previously
encrypted block of encrypted text is used in the encryption of the current block. The Switch supports the
3DES
EDE
encryption code defined by the Data Encryption Standard (DES) to create the encrypted text.
Hash Algorithm
: This part of the ciphersuite allows the user to choose a message digest function which will
determine a Message Authentication Code. This Message Authentication Code will be encrypted with a sent
message to provide integrity and prevent against replay attacks. The Switch supports two hash algorithms,
MD5
(Message Digest 5) and
SHA
(Secure Hash Algorithm).
These three parameters are uniquely assembled in four choices on the Switch to create a three-layered encryption code for
secure communication between the server and the host. The user may implement any one or combination of the ciphersuites
available, yet different ciphersuites will affect the security level and the performance of the secured connection. The
information included in the ciphersuites is not included with the Switch and requires downloading from a third source in a
file form called a
certificate
. This function of the Switch cannot be executed without the presence and implementation of the
certificate file and can be downloaded to the Switch by utilizing a TFTP server. The Switch supports SSLv3. Other versions
of SSL may not be compatible with this Switch and may cause problems upon authentication and transfer of messages from
client to host.
Configuration
This window will allow the user to enable SSL on the Switch and implement any one or combination of listed ciphersuites
on the Switch. A
ciphersuite
is a security string that determines the exact cryptographic parameters, specific encryption
algorithms and key sizes to be used for an authentication session. The Switch possesses four possible ciphersuites for the
SSL function, which are all enabled by default. To utilize a particular ciphersuite, disable the unwanted ciphersuites, leaving
the desired one for authentication.
When the SSL function has been enabled, the web will become disabled. To manage the Switch through the web-based
management while utilizing the SSL function, the web browser must support SSL encryption and the header of the URL
must begin with https://. (Ex. https://10.90.90.90) Any other method will result in an error and no access can be authorized
for the web-based management.
To view the following window, click
Security > Secure Socket Layer (SSL) > Configuration
: