© Copyright IBM Corp. 2011
55
Chapter 4. Securing Administration
Secure switch management is needed for environments that perform significant
management functions across the Internet. Common functions for secured
management are described in the following sections:
•
“Secure Shell and Secure Copy” on page 55
•
“End User Access Control” on page 60
Note:
SNMP read and write functions are enabled by default. For best security
practices, if SNMP is not needed for your network, it is recommended that
you disable these functions prior to connecting the switch to the network
“Using Simple Network Management Protocol” on page 30
).
Secure Shell and Secure Copy
Because using Telnet does not provide a secure connection for managing a G8000,
Secure Shell (SSH) and Secure Copy (SCP) features have been included for G8000
management. SSH and SCP use secure tunnels to encrypt and secure messages
between a remote administrator and the switch.
SSH
is a protocol that enables remote administrators to log securely into the G8000
over a network to execute management commands.
SCP
is typically used to copy files securely from one machine to another. SCP uses
SSH for encryption of data on the network. On a G8000, SCP is used to download
and upload the switch configuration via secure channels.
Although SSH and SCP are disabled by default, enabling and using these features
provides the following benefits:
•
Identifying the administrator using Name/Password
•
Authentication of remote administrators
•
Authorization of remote administrators
•
Determining the permitted actions and customizing service for individual admin-
istrators
•
Encryption of management messages
•
Encrypting messages between the remote administrator and switch
•
Secure copy support
IBM Networking OS implements the SSH version 2.0 standard and is confirmed to
work with SSH version 2.0-compliant clients such as the following:
•
OpenSSH_5.4p1 for Linux
•
Secure CRT Version 5.0.2 (build 1021)
•
Putty SSH release 0.60
Summary of Contents for RackSwitch G8000
Page 1: ...RackSwitch G8000 Application Guide...
Page 2: ......
Page 3: ...RackSwitch G8000 Application Guide...
Page 16: ...16 RackSwitch G8000 Application Guide...
Page 22: ...20 RackSwitch G8000 Application Guide...
Page 23: ...Copyright IBM Corp 2011 21 Part 1 Getting Started...
Page 24: ...22 RackSwitch G8000 Application Guide...
Page 54: ...52 RackSwitch G8000 Application Guide...
Page 55: ...Copyright IBM Corp 2011 53 Part 2 Securing the Switch...
Page 56: ...54 RackSwitch G8000 Application Guide...
Page 92: ...90 RackSwitch G8000 Application Guide...
Page 94: ...92 RackSwitch G8000 Application Guide...
Page 144: ...142 RackSwitch G8000 Application Guide...
Page 145: ...Copyright IBM Corp 2011 143 Part 4 Advanced Switch ing Features...
Page 146: ...144 RackSwitch G8000 Application Guide...
Page 148: ...146 RackSwitch G8000 Application Guide...
Page 182: ...180 RackSwitch G8000 Application Guide...
Page 184: ...182 RackSwitch G8000 Application Guide...
Page 212: ...210 RackSwitch G8000 Application Guide...
Page 258: ...256 RackSwitch G8000 Application Guide...
Page 286: ...284 RackSwitch G8000 Application Guide...
Page 294: ...292 RackSwitch G8000 Application Guide...
Page 298: ...296 RackSwitch G8000 Application Guide...
Page 310: ...308 RackSwitch G8000 Application Guide...
Page 311: ...Copyright IBM Corp 2011 309 Part 7 Network Management...
Page 312: ...310 RackSwitch G8000 Application Guide...
Page 320: ...318 RackSwitch G8000 Application Guide...
Page 332: ...330 RackSwitch G8000 Application Guide...
Page 334: ...332 RackSwitch G8000 Application Guide...
Page 345: ...Copyright IBM Corp 2011 343 Part 9 Appendices...
Page 346: ...344 RackSwitch G8000 Application Guide...
Page 357: ...Copyright IBM Corp 2011 Appendix C Notices 355 Taiwan Class A compliance statement...