Xtreme Power Conversion Corporation
Web/SNMP Cards
Page 36
UPS Management
Selective service activation
The SNMP/Web adapters allow selective service activation – that is, the various interfaces can be enabled on a
user basis. For each user, access to the following services can be enabled:
http
Web interface
Controls access with HTTP and HTTPS protocols
telnet
Remote console interface
Controls access with Telnet and SSH (Secure SHell) protocols
ftp
File transfer
Controls access with FTP and SFTP (Secure FTP) protocols
Services (Access Methods)
The table below lists the available services (access methods), highlighting the major security features for each
interface
Interface
Access methods
Security features
Local console interface
Serial cable
Authentication via user/pwd pair
Remote console interface
Telnet
Authentication via user/pwd pair
Plain text
SSH (Secure SHell)
Authentication via user/pwd pair
Encrypted communication
SNMP Agent
SNMP
Community Name
Plain text
File transfer
FTP
Authentication via user/pwd pair
Plain text
SFTP (SSH FTP)
Authentication via user/pwd pair
Encrypted communication
Web interface
HTTP
Authentication via user/pwd pair
Plain text
HTTPS (SSL)
Authentication via user/pwd pair
Encrypted communication
Encryption
As stated above, the SNMP/Web adapter offers interfaces providing encryption for protecting data confidentiality
and integrity, and particularly the following:
• SSH (Secure Shell)
• SFTP (SSH File Transfer Protocol)
•
HTTPS
In this context, encryption is based on public-key cryptography schemes. Normally, the SNMP/Web adapters will
be delivered already configured with all applicable keys and certificates – should the adapter miss these informa-
tion it will generate them at first start-up (this operation may take some time). The length of the keys used for
encryption is 1024 bits, providing complex encryption and a higher level of security.
SSH and SFTP
SSH allows running terminal sessions to the SNMP/Web adapter over a secure channel. SSH uses public- key cryp-
tography. The SSH server is authenticated using a host key as identification. Most SSH clients display the host key
fingerprint at the start of the SSH session. Below is an example from a popular SSH client (putty):