Lantronix SLC 8000 Advanced Console Manager User Guide - Page 158

Admin Web Commands, Enable TLS v1.1, Protocol, Cipher, Use only SHA2 and, Higher Ciphers, Group Access

Page 158 highlights

7: Services Enable TLS v1.1 Protocol By default, the web supports the TLS v1.1 protocol. Clear this check box to disable the TLS v1.1 protocol. You must reboot or restart the web server with the CLI command "admin web restart" for the change to take effect. Enable TLS v1.2 Protocol By default, the web supports the TLS v1.2 protocol. Clear this check box to disable the TLS v1.2 protocol. You must reboot or restart the web server with the CLI command "admin web restart" for the change to take effect. Cipher By default, the web uses High/Medium security (128 bits or higher) for the cipher. This option can be used to configure the web to also support just High security ciphers (256 bit, 168 bit and some 128 bit), or FIPS approved ciphers (see Security.) Changing this option requires a reboot or restarting the web server with the CLI command admin web restart for the change to take effect. Use only SHA2 and Higher Ciphers By default, the web supports SHA1 as well as SHA2 and higher ciphers. Check this option to support only SHA2 and higher ciphers. Changing this option requires a reboot or restarting the web server with the CLI command "admin web restart" for the change to take effect. Note: FIPS approved ciphers do not include TLSv1.3 ciphers. If FIPS approved ciphers are selected, TLSv1.3 will not be used for connection to the web server.The TLSv1.3 ciphers supported by the web server are TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, and TLS_AES_128_GCM_SHA256. Group Access Specify one or more groups to allow access to the Web Manager user interface. If undefined, any group can access the web. If one or more groups are specified (groups are delimited by the characters ',' (comma) or ';' (semicolon)), then any user who logs into the web must be a member of one of the specified groups, otherwise access will be denied. Users authenticated via RADIUS may have a group (or groups) provided by the RADIUS server via the Filter-Id attribute that overrides the group defined for a user on the SLC. A group provided by a remote server must be either a single group or multiple groups delimited by the characters ',' (comma), ';' (semicolon), or '=' (equals) - for example "group=group1,group2;" or "group1,group2,group3". Banner Enter to replace default text displayed on the Web Manager home page after the user logs in. May contain up to 1024 characters. Blank by default. To create additional lines in the banner use the \n character sequence. Network Interfaces The interfaces that the web server is available on. By default, Eth1, Eth2 and PPP interfaces on modems are enabled. Run Web Server If enabled, the web server will run and listen on TCP ports 80 and 443 (all requests to port 80 are redirected to port 443). By default, the web server is enabled. The web server supports TLS 1.0, TLS 1.1, and TLS 1.2. Due to security vulnerabilities, SSL is not supported. Note: This option can only be changed at the CLI. 3. Click the Apply button to save. Admin Web Commands Go to Access List Commands to view CLI commands which correspond to the web page entries described above. SLC™ 8000 Advanced Console Manager User Guide 158

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472

7: Services
SLCâ„¢ 8000 Advanced Console Manager User Guide
158
3.
Click the
Apply
button to save.
Admin Web Commands
Go to
Access List Commands
to view CLI commands which correspond to the web page entries
described above.
Enable TLS v1.1
Protocol
By default, the web supports the TLS v1.1 protocol. Clear this check box to
disable the TLS v1.1 protocol. You must reboot or restart the web server with the
CLI command "admin web restart" for the change to take effect.
Enable TLS v1.2
Protocol
By default, the web supports the TLS v1.2 protocol. Clear this check box to
disable the TLS v1.2 protocol. You must reboot or restart the web server with the
CLI command "admin web restart" for the change to take effect.
Cipher
By default, the web uses High/Medium security (128 bits or higher) for the cipher.
This option can be used to configure the web to also support just High security
ciphers (256 bit, 168 bit and some 128 bit), or FIPS approved ciphers (see
Security
.) Changing this option requires a reboot or restarting the web server
with the CLI command
admin web restart
for the change to take effect.
Use only SHA2 and
Higher Ciphers
By default, the web supports SHA1 as well as SHA2 and higher ciphers. Check
this option to support only SHA2 and higher ciphers. Changing this option
requires a reboot or restarting the web server with the CLI command "admin web
restart" for the change to take effect.
Note:
FIPS approved ciphers do not include TLSv1.3 ciphers. If FIPS approved
ciphers are selected, TLSv1.3 will not be used for connection to the web
server.The TLSv1.3 ciphers supported by the web server are
TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, and
TLS_AES_128_GCM_SHA256.
Group Access
Specify one or more groups to allow access to the Web Manager user interface.
If undefined, any group can access the web. If one or more groups are specified
(groups are delimited by the characters ',' (comma) or ';' (semicolon)), then any
user who logs into the web must be a member of one of the specified groups,
otherwise access will be denied. Users authenticated via RADIUS may have a
group (or groups) provided by the RADIUS server via the Filter-Id attribute that
overrides the group defined for a user on the SLC. A group provided by a remote
server must be either a single group or multiple groups delimited by the
characters ',' (comma), ';' (semicolon), or '=' (equals) - for example
"group=group1,group2;" or "group1,group2,group3".
Banner
Enter to replace default text displayed on the Web Manager home page after the
user logs in. May contain up to 1024 characters. Blank by default.
To create
additional lines in the banner use the \n character sequence.
Network Interfaces
The interfaces that the web server is available on. By default, Eth1, Eth2 and
PPP interfaces on modems are enabled.
Run Web Server
If enabled, the web server will run and listen on TCP ports 80 and 443 (all
requests to port 80 are redirected to port 443). By default, the web server is
enabled. The web server supports TLS 1.0, TLS 1.1, and TLS 1.2. Due to
security vulnerabilities, SSL is not supported.
Note:
This option can only be changed at the CLI.