Secure Copy; Table 19 Items Needed To Deploy Secure Protocols; Table 20 Main Security Scenarios - Brocade Communications Systems 1606 Administrator's Manual

Fabric os administrator's guide v6.4.0 (53-1001763-01, june 2010)
Hide thumbs Also See for 1606:
Table of Contents

Advertisement

6

Secure Copy

TABLE 18
Protocol
SSH
SSL
Table 19
protocols.
TABLE 19
Protocol
SSHv2
HTTPS
SCP
SNMPv1, SNMPv2, SNMPv3
The security protocols are designed with the four main use cases described in
TABLE 20
Fabric
Nonsecure
Nonsecure
Secure
Secure

Secure Copy

The secure copy protocol (SCP) runs on port 22. It encrypts data during transfer, thereby avoiding
packet sniffers that attempt to extract useful information during data transfer. SCP relies on SSH to
provide authentication and security.
118
Secure protocol support
Description
Secure Shell (SSH) is a network protocol that allows data to be exchanged over a
secure channel between two computers. Encryption provides confidentiality and
integrity of data. SSH uses public-key cryptography to authenticate the remote
computer and allow the remote computer to authenticate the user, if necessary.
Fabric OS uses secure socket layer (SSL) to support HTTPS. A certificate must be
generated and installed on each switch to enable SSL. Supports SSLv3, 128-bit
encryption by default.
describes additional software or certificates that you must obtain to deploy secure
Items needed to deploy secure protocols
Host side
Secure shell client
No requirement on host side
except a browser that
supports HTTPS
SSH daemon, SCP server
None
Main security scenarios
Management
interfaces
Nonsecure
Secure
Secure
Nonsecure
Switch side
None
Switch IP certificate for SSL
None
None
Comments
No special setup is needed to use Telnet or HTTP.
Secure protocols may be used. An SSL switch certificate must be
installed if HTTPS is used.
Switches running earlier Fabric OS versions can be part of the
secure fabric, but they do not support secure management.
Secure management protocols must be configured for each
participating switch. Nonsecure protocols may be disabled on
nonparticipating switches.
If SSL is used, then certificates must be installed. For more
information on installing certificates, refer to
certificate"
on page 125.
You must use SSH because Telnet is not allowed with some features.
Table
20.
"Installing a switch
Fabric OS Administrator's Guide
53-1001763-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

8/248/408/88/80

Table of Contents