D-Link DGS-3200-10 Product Manual - Page 159

SSL Settings, Key Exchange, Encryption, Hash Algorithm

Page 159 highlights

xStack® DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch SSL Settings Secure So ckets Layer, or SSL, is a security featu re t hat will provide a secu re co mmunication path b etween a host an d clien t through the use of authentication, digital signatures and encryption. These security functions are implemented through the use of a cyphersuite, which is a security string that determines the exact cryptographic parameters, specific encryption algorithms and key sizes to be used for an authentication session and consists of three levels: 1. Key Exchange: The first part of the cyphersuite string specifies the public key algorithm to be used. This switch utilizes the Rivest Shamir Adleman (RSA) public key algorithm and the Digital Signature Algorithm (DSA), specified here as the DHE DSS Diffie-Hellman (DHE) public key algorithm. This is th e first authentication process between client and host as they "exchange keys" in lookin g for a m atch and the refore authentication t o be accepted to ne gotiate encryptions on the following level. 2. Encryption: The sec ond part of t he ciphers uite th at in cludes th e en cryption used for en crypting th e m essages sen t between client and host. The Switch supports two types of cryptology algorithms: Stream Ciphers - There are two types of stream ciphers on the Switch, RC4 with 40-bit keys and RC4 with 128-bit keys. These keys are used to encrypt messages and need to be consistent between client and host for optimal use. CBC Blo ck Ci phers - CBC refers to Ciph er Blo ck C haining, which means t hat a portion of t he previously en crypted block of encrypted text is used in the encryption of the current block. The Switch supports the 3DES EDE encryption code defined by the Data Encryption Standard (DES) to create the encrypted text. 3. Hash Algorithm: This part of the ciphersuite allows the user to choose a message digest function which will determine a Message Authentication Code. Th is Messag e Au thentication C ode will b e en crypted with a sen t messag e to provide integrity and prevent against replay attacks. The Switch supports two hash algorithms, MD5 (Message Digest 5) and SHA (Secure Hash Algorithm). These three parameters are uniquely assemble d in four choices on the Sw itch to create a three-layered encryption code for secure communication between the server and the host. The user m ay implement any one or combination of the ciphersuites available, yet different ciphersuites will affect the security level and the performance of the secured connection. The information included in the ciphersuites is no t included with the Switch and requires downloading from a t hird source in a f ile form called a certificate. This function of th e Switch canno t be execu ted wit hout th e pres ence and im plementation of th e certificate file and can be downloaded to the Switch by utilizing a TFTP serv er. The Switch supports SSLv3. Other versions of SSL may not be compatible with this Switch and may cause problems upon authentication and transfer of messages from client to host. The SSL S ettings window located on the next page will allow the user to enable SSL on the Switch and implement any one or combination of listed ciph ersuites on th e Switch. A ci phersuite is a security stri ng that d etermines th e ex act cryp tographic parameters, specific encry ption algorithm s and key si zes to be use d for an a uthentication sessi on. T he S witch possesses f our possible ciph ersuites fo r t he SSL fu nction, wh ich are al l en abled by d efault. To utilize a p articular cip hersuite, d isable th e unwanted ciphersuites, leaving the desired one for authentication. When t he SSL fu nction ha s been e nabled, t he web wi ll becom e di sabled. To m anage t he S witch t hrough t he web based management wh ile utilizing th e SSL function, th e web browser m ust su pport SSL encryp tion and t he header of th e URL m ust begin with https://. (Ex. https://xx.xx.xx.xx) Any other method will result in an error and no access can be authorized for the webbased management. Users can download a certif icate file fo r the SSL function on the Switch from a TFTP server. The certificate file is a data rec ord used for authenticating devices on the network. It contains information on the owner, keys for authentication and digital signatures. Both the server and the client must have consistent certificate files fo r optimal use of the SSL function. The Switch only supports certificate files with .d er file extensions. Currently, the Switch comes with a certificate pre-loaded though the user may need to download more, depending on user circumstances. 146

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

xStack
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
146
SSL Settings
Secure So ckets Layer, or SSL, is a security featu
re t hat will provide a secu re co mmunication path b etween a host an d clien t
through the use of authentication, digital signatures and encryption. These security functions are implemented through the use of a
cyphersuite, which is a security string that determines the exact cryptographic parameters, specific encryption algorithms and key
sizes to be used for an authentication session and consists of three levels:
1.
Key Exchange:
The first part of the cyphersuite string specifies the public key algorithm to be used. This switch utilizes
the Rivest Shamir Adleman (RSA) public key algorithm and the Digital Signature Algorithm (DSA), specified here as the
DHE DSS
Diffie-Hellman (DHE) public key algorithm. This is the first authentication process between client and host as
they “exchange keys” in lookin g for a m atch and the refore authentication t o be accepted to ne gotiate encryptions on the
following level.
2.
Encryption:
The sec ond part of t
he ciphers uite th at in cludes th e en cryption used for en
crypting th e m essages sen t
between client and host. The Switch supports two types of cryptology algorithms:
Stream Ciphers – There are two types of stream ciphers on the Switch,
RC4 with 40-bit keys
and
RC4 with 128-bit keys
. These
keys are used to encrypt messages and need to be consistent between client and host for optimal use.
CBC Block Ciphers – CBC refers to Cipher Block Chaining, which means that a portion of the previously encrypted block of
encrypted text is used in the encryption of the current block. The Switch supports the
3DES EDE
encryption code defined by the
Data Encryption Standard (DES) to create the encrypted text.
3.
Hash Algorithm
: This part of the ciphersuite allows the user to choose a message digest function which will determine a
Message Authentication Code. Th is Messag e Au thentication C ode will b e en crypted with a sen t messag e to provide
integrity and prevent against replay attacks. The Switch supports two hash algorithms,
MD5
(Message Digest 5) and
SHA
(Secure Hash Algorithm).
These three parameters are uniquely assembled in four choices on the Switch to create a three-layered encryption code for secure
communication between the server and the host. The user may implement any one or combination of the ciphersuites available,
yet different ciphersuites will affect the security level and the performance of the secured connection. The information included in
the ciphersuites is not included with the Switch and requires downloading from a third source in a file form called a
certificate
.
This function of th e Switch canno t be execu ted wit hout th e pres ence and im plementation of th e certificate file
and can be
downloaded to the Switch by utilizing a TFTP server. The Switch supports SSLv3. Other versions of SSL may not be compatible
with this Switch and may cause problems upon authentication and transfer of messages from client to host.
The
SSL Settings
window located on the next page will allow the user to enable SSL on the Switch and implement any one or
combination of listed ciph
ersuites on th e Switch. A ci phersuite is a security stri ng that d etermines th e ex act cryp tographic
parameters, specific encry ption algorithm s and key si zes to be use d for an a uthentication sessi on. T he S witch possesses f our
possible ciph ersuites fo r t he SSL fu
nction, wh ich are al
l en abled by d efault. To utilize a p
articular cip hersuite, d isable th e
unwanted ciphersuites, leaving the desired one for authentication.
When t he SSL fu nction ha s been e
nabled, t he web wi ll becom e di sabled. To m anage t he S witch t hrough t he web
based
management while utilizing the SSL function, the web browser must support SSL encryption and the header of the URL must
begin with https://. (Ex. https://xx.xx.xx.xx) Any other method will result in an error and no access can be authorized for the web-
based management.
Users can download a certificate file for the SSL function on the Switch from a TFTP server. The certificate file is a data record
used for authenticating devices on the network. It contains information on the owner, keys for authentication and digital signatures.
Both the server and the client must have consistent certificate files for optimal use of the SSL function. The Switch only supports
certificate files with .der file extensions. Currently, the Switch comes with a certificate pre-loaded though the user may need to
download more, depending on user circumstances.