Lantronix EMG 8500 EMG User Guide - Page 171

Timeout, Yes, minutes 5-120, Enable TLS v1.0, Protocol, Cipher, Use only SHA2 and, Higher Ciphers

Page 171 highlights

8: Services 2. Enter the following fields: Timeout Enable TLS v1.0 Protocol Enable TLS v1.1 Protocol Cipher Use only SHA2 and Higher Ciphers Group Access  Select No to disable Timeout.  Select Yes, minutes (5-120) to enable timeout. Enter the number of minutes (must be between 30 and 120 minutes) after which the EMG web session times out. The default is 30. Note: If a session times out, refresh the browser page and login to a new web session. If you close the browser without logging off the EMG unit first, you will have to wait for the timeout time to expire. You can also end a web session by using the admin web terminate command at the CLI or by asking your system administrator to terminate your active web session.  To view or terminate current web sessions, click the Web Sessions link. See Services - Web Sessions.  To view, import, or reset the SSL Certificate, click the SSL Certificate link. See Services - SSL Certificate. By default, the web supports the TLS v1.0 protocol. Uncheck this to disable the TLS v1.0 protocol. Changing this option requires a reboot or restarting the web server with the CLI command admin web restart for the change to take effect. Note: In FIPS mode, TLS v1.0 and TLS v1.1 must be enabled and disabled together. By default, the web supports the TLS v1.1 protocol. Uncheck this to disable the TLS v1.1 protocol. Changing this option requires a reboot or restarting the web server with the CLI command admin web restart for the change to take effect. Note: In FIPS mode, TLS v1.0 and TLS v1.1 must be enabled and disabled together. By default, the web uses High/Medium security (128 bits or higher) for the cipher. This option can be used to configure the web to also support just High security ciphers (256 bit, 168 bit and some 128 bit), or FIPS approved ciphers (see Security on page 134). Changing this option requires a reboot or restarting the web server with the CLI command admin web restart for the change to take effect. By default, the web supports SHA1 as well as SHA2 and higher ciphers. Check this option to support only SHA2 and higher ciphers. Changing this option requires a reboot or restarting the web server with the CLI command admin web restart for the change to take effect. Note: FIPS approved ciphers do not include TLSv1.3 ciphers. If FIPS approved ciphers are selected, TLSv1.3 will not be used for connection to the web server. The TLSv1.3 ciphers supported by the web server are TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, and TLS_AES_128_GCM_SHA256. Specify one or more groups to allow access to the Web Manager user interface. If undefined, any group can access the web. If one or more groups are specified (groups are delimited by the characters ',' (comma) or ';' (semicolon)), then any user who logs into the web must be a member of one of the specified groups, otherwise access will be denied. Users authenticated via RADIUS may have a group (or groups) provided by the RADIUS server via the Filter-Id attribute that overrides the group defined for a user on the EMG. A group provided by a remote server must be either a single group or multiple groups delimited by the characters ',' (comma), ';' (semicolon), or '=' (equals) - for example "group=group1,group2;" or "group1,group2,group3". EMG™ Edge Management Gateway User Guide 171

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495

8: Services
EMG™ Edge Management Gateway User Guide
171
2.
Enter the following fields:
Timeout
Select
No
to disable Timeout.
Select
Yes, minutes (5-120)
to enable timeout.
Enter the number of minutes (must be between 30 and 120 minutes) after
which the EMG web session times out. The default is 30.
Note:
If a session times out, refresh the browser page and login to a new web
session.
If you close the browser without logging off the EMG unit first, you will
have to wait for the timeout time to expire. You can also end a web session by
using the
admin web terminate
command at the CLI or by asking your
system administrator to terminate your active web session.
To view or terminate current web sessions, click the Web Sessions link. See
Services - Web Sessions
.
To view, import, or reset
the SSL Certificate, click the SSL Certificate link.
See
Services - SSL Certificate
.
Enable TLS v1.0
Protocol
By default, the web supports the TLS v1.0 protocol. Uncheck this to disable the
TLS v1.0 protocol. Changing this option requires a reboot or restarting the web
server with the CLI command
admin web restart
for the change to take
effect.
Note:
In FIPS mode, TLS v1.0 and TLS v1.1 must be enabled and disabled
together.
Enable TLS v1.1
Protocol
By default, the web supports the TLS v1.1 protocol. Uncheck this to disable the
TLS v1.1 protocol. Changing this option requires a reboot or restarting the web
server with the CLI command
admin web restart
for the change to take
effect.
Note:
In FIPS mode, TLS v1.0 and TLS v1.1 must be enabled and disabled
together.
Cipher
By default, the web uses High/Medium security (128 bits or higher) for the cipher.
This option can be used to configure the web to also support just High security
ciphers (256 bit, 168 bit and some 128 bit), or FIPS approved ciphers (see
Security on page 134
). Changing this option requires a reboot or restarting the
web server with the CLI command
admin web restart
for the change to
take effect.
Use only SHA2 and
Higher Ciphers
By default, the web supports SHA1 as well as SHA2 and higher ciphers. Check
this option to support only SHA2 and higher ciphers. Changing this option
requires a reboot or restarting the web server with the CLI command
admin
web restart
for the change to take effect.
Note:
FIPS approved ciphers do not include TLSv1.3 ciphers. If FIPS approved
ciphers are selected, TLSv1.3 will not be used for connection to the web server.
The TLSv1.3 ciphers supported by the web server are
TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, and
TLS_AES_128_GCM_SHA256.
Group Access
Specify one or more groups to allow access to the Web Manager user interface.
If undefined, any group can access the web. If one or more groups are specified
(groups are delimited by the characters ',' (comma) or ';' (semicolon)), then any
user who logs into the web must be a member of one of the specified groups,
otherwise access will be denied. Users authenticated via RADIUS may have a
group (or groups) provided by the RADIUS server via the Filter-Id attribute that
overrides the group defined for a user on the EMG. A group provided by a
remote server must be either a single group or multiple groups delimited by the
characters ',' (comma), ';' (semicolon), or '=' (equals) - for example
"group=group1,group2;" or "group1,group2,group3".