
Dimension ES-3148 User’s Guide
Chapter 18 Access Control
131
The client automatically saves any new server public keys. In subsequent connections,
the server public key is checked against the saved version on the client computer.
2
Encryption Method
Once the identification is verified, both the client and server must agree on the type of
encryption method to use.
3
Authentication and Data Transmission
After the identification is verified and data encryption activated, a secure tunnel is
established between the client and the server. The client then sends its authentication
information (user name and password) to the server to log in to the server.
18.6 SSH Implementation on the Switch
Your switch supports SSH version 2 using RSA authentication and three encryption methods
(DES, 3DES and Blowfish). The SSH server is implemented on the switch for remote
management and file transfer on port 22. Only one SSH connection is allowed at a time.
18.6.1 Requirements for Using SSH
You must install an SSH client program on a client computer (Windows or Linux operating
system) that is used to connect to the switch over SSH.
18.7 Introduction to HTTPS
HTTPS (HyperText Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is a web
protocol that encrypts and decrypts web pages. Secure Socket Layer (SSL) is an application-
level protocol that enables secure transactions of data by ensuring confidentiality (an
unauthorized party cannot read the transferred data), authentication (one party can identify the
other party) and data integrity (you know if data has been changed).
It relies upon certificates, public keys, and private keys.
HTTPS on the switch is used so that you may securely access the switch using the web
configurator. The SSL protocol specifies that the SSL server (the switch) must always
authenticate itself to the SSL client (the computer which requests the HTTPS connection with
the switch), whereas the SSL client only should authenticate itself when the SSL server
requires it to do so. Authenticating client certificates is optional and if selected means the SSL-
client must send the switch a certificate. You must apply for a certificate for the browser from
a CA that is a trusted CA on the switch.
Please refer to the following figure.
1
HTTPS connection requests from an SSL-aware web browser go to port 443 (by default)
on the switch’s WS (web server).
Summary of Contents for Dimension ES-3148
Page 1: ...Dimension ES 3148 Intelligent Layer 2 Switch User s Guide Version 3 60 12 2005...
Page 2: ......
Page 18: ...Dimension ES 3148 User s Guide 16...
Page 26: ...Dimension ES 3148 User s Guide 24...
Page 40: ...Dimension ES 3148 User s Guide 38 Chapter 2 Hardware Installation and Connection...
Page 56: ...Dimension ES 3148 User s Guide 54 Chapter 4 The Web Configurator...
Page 84: ...Dimension ES 3148 User s Guide 82 Chapter 8 VLAN Figure 35 VLAN Static VLAN...
Page 86: ...Dimension ES 3148 User s Guide 84 Chapter 8 VLAN Figure 36 VLAN VLAN Port Setting...
Page 104: ...Dimension ES 3148 User s Guide 102 Chapter 12 Bandwidth Control...
Page 108: ...Dimension ES 3148 User s Guide 106 Chapter 13 Broadcast Storm Control...
Page 110: ...Dimension ES 3148 User s Guide 108 Chapter 14 Mirroring Figure 45 Mirroring...
Page 112: ...Dimension ES 3148 User s Guide 110 Chapter 14 Mirroring...
Page 118: ...Dimension ES 3148 User s Guide 116 Chapter 15 Link Aggregation...
Page 124: ...Dimension ES 3148 User s Guide 122 Chapter 17 Port Security Figure 52 Port Security...
Page 126: ...Dimension ES 3148 User s Guide 124 Chapter 17 Port Security...
Page 140: ...Dimension ES 3148 User s Guide 138 Chapter 18 Access Control...
Page 144: ...Dimension ES 3148 User s Guide 142 Chapter 19 Queuing Method...
Page 150: ...Dimension ES 3148 User s Guide 148 Chapter 20 Classifier Figure 71 Classifier Example...
Page 156: ...Dimension ES 3148 User s Guide 154 Chapter 21 Policy Rule Figure 74 Policy Example...
Page 162: ...Dimension ES 3148 User s Guide 160 Chapter 22 VLAN Stacking...
Page 165: ...Dimension ES 3148 User s Guide Chapter 23 Multicast 163 Figure 77 Multicast Setting...
Page 170: ...Dimension ES 3148 User s Guide 168 Chapter 23 Multicast Figure 81 MVR...
Page 176: ...Dimension ES 3148 User s Guide 174 Chapter 23 Multicast...
Page 188: ...Dimension ES 3148 User s Guide 186 Chapter 27 Diagnostic...
Page 226: ...Dimension ES 3148 User s Guide 224 Chapter 31 Introducing the Commands...
Page 244: ...Dimension ES 3148 User s Guide 242 Chapter 32 Command Examples...
Page 254: ...Dimension ES 3148 User s Guide 252 Chapter 33 IEEE 802 1Q Tagged VLAN Commands...
Page 264: ...Dimension ES 3148 User s Guide 262 Chapter 34 Troubleshooting...
Page 268: ...Dimension ES 3148 User s Guide 266 Appendix A Product Specifications...
Page 276: ...Dimension ES 3148 User s Guide 274 Appendix B IP Subnetting...