Dell Brocade G620 Brocade 8.0.1 Fabric OS Administratiors Guide - Page 185

Configuring Protocols, Security protocols

Page 185 highlights

Configuring Protocols ∙ Security protocols...185 ∙ Secure Copy...186 ∙ Secure Shell protocol...187 ∙ Configuring the ciphers, KEX, and MAC algorithms...194 ∙ Secure Sockets Layer protocol ...195 ∙ Simple Network Management Protocol...200 ∙ Telnet protocol...211 ∙ Listener applications...213 ∙ Ports and applications used by switches...213 Security protocols Security protocols provide endpoint authentication and communications privacy using cryptography. Typically, you are authenticated to the switch while the switch remains unauthenticated to you. This means that you can be sure with what you are communicating. The next level of security, in which both ends of the conversation are sure with whom they are communicating, is known as two-factor authentication. Two-factor authentication requires public key infrastructure (PKI) deployment to clients. Fabric OS supports the secure protocols shown in the following table. TABLE 29 Secure protocol support Protocol CHAP HTTPS IPsec LDAP SCP Secure Syslog SFTP SNMP SSH Description Challenge Handshake Authentication Protocol (CHAP) uses shared secrets to authenticate switches. HTTPS is a Uniform Resource Identifier scheme used to indicate a secure HTTP connection. Web Tools supports the use of Hypertext Transfer Protocol over SSL (HTTPS). Internet Protocol Security (IPsec) is a framework of open standards for providing confidentiality, authentication and integrity for IP data transmitted over untrusted links or networks. Lightweight Directory Access Protocol with TLS uses a certificate authority (CA). By default, LDAP traffic is transmitted unsecured. With the import of signed certificates, you can make LDAP traffic confidential and secure by using Secure Sockets Layer (SSL) / Transport Layer Security (TLS) technology in conjunction with LDAP. Secure Copy (SCP) is a means of securely transferring computer files between a local and a remote host or between two remote hosts, using the Secure Shell (SSH) protocol. Configuration upload and download support the use of SCP. Secure syslog requires importing syslog CA certificates using the secCerUtil command. Secure File Transfer Protocol (SFTP) is a network protocol for securely transferring files on a network. Configuration upload and download support the use of SFTP. Simple Network Management Protocol (SNMP) is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention. Supports SNMPv1 and v3. Secure Shell (SSH) is a network protocol that allows data to be exchanged over a secure channel between two computers. Encryption provides confidentiality and integrity of data. SSH uses public-key cryptography to Brocade Fabric OS Administration Guide, 8.0.1 53-1004111-02 185

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551

Configuring Protocols
Security protocols
............................................................................................................................................................................................................
185
Secure Copy
.......................................................................................................................................................................................................................
186
Secure Shell protocol
.....................................................................................................................................................................................................
187
Configuring the ciphers, KEX, and MAC algorithms
....................................................................................................................................
194
Secure Sockets Layer protocol
..............................................................................................................................................................................
195
Simple Network Management Protocol
...........................................................................................................................................................
200
Telnet protocol
.....................................................................................................................................................................................................................
211
Listener applications
......................................................................................................................................................................................................
213
Ports and applications used by switches
...........................................................................................................................................................
213
Security protocols
Security protocols provide endpoint authentication and communications privacy using cryptography.
Typically, you are authenticated to the switch while the switch remains unauthenticated to you. This means that you can be sure with what
you are communicating. The next level of security, in which both ends of the conversation are sure with whom they are communicating,
is known as two-factor authentication. Two-factor authentication requires public key infrastructure (PKI) deployment to clients.
Fabric OS supports the secure protocols shown in the following table.
TABLE 29
Secure protocol support
Protocol
Description
CHAP
Challenge Handshake Authentication Protocol (CHAP) uses shared
secrets to authenticate switches.
HTTPS
HTTPS is a Uniform Resource Identifier scheme used to indicate a secure
HTTP connection. Web Tools supports the use of Hypertext Transfer
Protocol over SSL (HTTPS).
IPsec
Internet Protocol Security (IPsec) is a framework of open standards for
providing confidentiality, authentication and integrity for IP data
transmitted over untrusted links or networks.
LDAP
Lightweight Directory Access Protocol with TLS uses a certificate
authority (CA). By default, LDAP traffic is transmitted unsecured. With the
import of signed certificates, you can make LDAP traffic confidential and
secure by using Secure Sockets Layer (SSL) / Transport Layer Security
(TLS) technology in conjunction with LDAP.
SCP
Secure Copy (SCP) is a means of securely transferring computer files
between a local and a remote host or between two remote hosts, using the
Secure Shell (SSH) protocol. Configuration upload and download support
the use of SCP.
Secure Syslog
Secure syslog requires importing syslog CA certificates using the
secCerUtil
command.
SFTP
Secure File Transfer Protocol (SFTP) is a network protocol for securely
transferring files on a network. Configuration upload and download
support the use of SFTP.
SNMP
Simple Network Management Protocol (SNMP) is used in network
management systems to monitor network-attached devices for conditions
that warrant administrative attention. Supports SNMPv1 and v3.
SSH
Secure Shell (SSH) is a network protocol that allows data to be exchanged
over a secure channel between two computers. Encryption provides
confidentiality and integrity of data. SSH uses public-key cryptography to
Brocade Fabric OS Administration Guide, 8.0.1
53-1004111-02
185