D-Link DXS-1100 series User Manual page 106

10 gigabit ethernet switch
Table of Contents

Advertisement

4 Configuration
cryptographic parameters, specific encryption algorithms and key sizes to be used for an authentication
session and consists of three levels:
Key Exchange: The first part of the Cipher suite string specifies the public key algorithm to be used.
This switch utilizes the Rivest Shamir Adleman (RSA) public key algorithm and the Digital Signature
Algorithm (DSA), specified here as the DHE DSS Diffie-Hellman (DHE) public key algorithm. This is
the first authentication process between client and host as they "exchange keys" in looking for a
match and therefore authentication to be accepted to negotiate encryptions on the following level.
Encryption: The second part of the cipher suite that includes the encryption used for encrypting the
messages sent between client and host. The Switch supports two types of cryptology algorithms:
Stream Ciphers - There are two types of stream ciphers on the Switch, RC4 with 40-bit keys
o
and RC4 with 128-bit keys. These keys are used to encrypt messages and need to be consistent
between client and host for optimal use.
CBC Block Ciphers - CBC refers to Cipher Block Chaining, which means that a portion of the
o
previously encrypted block of encrypted text is used in the encryption of the current block. The
Switch supports the 3DES EDE encryption code defined by the Data Encryption Standard (DES)
to create the encrypted text.
Hash Algorithm: This part of the cipher suite allows the user to choose a message digest function
which will determine a Message Authentication Code. This Message Authentication Code will be
encrypted with a sent message to provide integrity and prevent against replay attacks. The Switch
supports two hash algorithms, MD5 (Message Digest 5) and SHA (Secure Hash Algorithm).
These three parameters are uniquely assembled in five choices on the Switch to create a three-layered
encryption code for secure communication between the server and the host. The user may implement any
one or combination of the cipher suites available, yet different cipher suites will affect the security level and
the performance of the secured connection. The information included in the cipher suites is not included with
the Switch and requires downloading from a third source in a file form called a certificate. This function of the
Switch cannot be executed without the presence and implementation of the certificate file. Users can
download a certificate file for the SSL function on the Switch from a TFTP server. The certificate file is a data
record used for authenticating devices on the network. It contains information on the owner, keys for
authentication and digital signatures. Both the server and the client must have consistent certificate files for
optimal use of the SSL function.
The Switch supports SSLv3. Other versions of SSL may not be compatible with this Switch and may cause
problems upon authentication and transfer of messages from client to host.
When the SSL function has been enabled, the web will become disabled. To manage the Switch through the
web based management while utilizing the SSL function, the web browser must support SSL encryption and
the header of the URL must begin with https://. (Ex. https://xx.xx.xx.xx) Any other method will result in an
error and no access can be authorized for the web-based management.
This window is used to view and configure the SSL feature's global settings.
The fields that can be configured are described below:
SSL Status: Enable or disable the SSL feature's global status here.
Service Policy: Enter the service policy name here. This name can be up to 32 characters long.
Figure 4.141 – Security > SSL > SSL Global Settings
9
9
9
9
D-Link 10 Gigabit Ethernet Switch User Manual

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents