GS-4012F User’s Guide
Chapter 32 Access Control
195
3
Authentication and Data Transmission
After the identification is verified and data encryption activated, a secure tunnel is
established between the client and the server. The client then sends its authentication
information (user name and password) to the server to log in to the server.
32.6 SSH Implementation on the Switch
Your switch supports SSH version 2 using RSA authentication and three encryption methods
(DES, 3DES and Blowfish). The SSH server is implemented on the switch for remote
management and file transfer on port 22. Only one SSH connection is allowed at a time.
32.6.1 Requirements for Using SSH
You must install an SSH client program on a client computer (Windows or Linux operating
system) that is used to connect to the switch over SSH.
32.7 Introduction to HTTPS
HTTPS (HyperText Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is a web
protocol that encrypts and decrypts web pages. Secure Socket Layer (SSL) is an application-
level protocol that enables secure transactions of data by ensuring confidentiality (an
unauthorized party cannot read the transferred data), authentication (one party can identify the
other party) and data integrity (you know if data has been changed).
It relies upon certificates, public keys, and private keys.
HTTPS on the switch is used so that you may securely access the switch using the web
configurator. The SSL protocol specifies that the SSL server (the switch) must always
authenticate itself to the SSL client (the computer which requests the HTTPS connection with
the switch), whereas the SSL client only should authenticate itself when the SSL server
requires it to do so. Authenticating client certificates is optional and if selected means the SSL-
client must send the switch a certificate. You must apply for a certificate for the browser from
a CA that is a trusted CA on the switch.
Please refer to the following figure.
1
HTTPS connection requests from an SSL-aware web browser go to port 443 (by default)
on the switch’s WS (web server).
2
HTTP connection requests from a web browser go to port 80 (by default) on the switch’s
WS (web server).
Summary of Contents for GS-4012F
Page 1: ...GS 4012F Ethernet Switch User s Guide Version 3 60 4 2005...
Page 19: ...GS 4012F User s Guide 18 Table of Contents...
Page 25: ...GS 4012F User s Guide 24 List of Figures...
Page 29: ...GS 4012F User s Guide 28 List of Tables...
Page 39: ...GS 4012F User s Guide 38 Chapter 1 Getting to Know Your Switch...
Page 43: ...GS 4012F User s Guide 42 Chapter 2 Hardware Installation and Connection...
Page 49: ...GS 4012F User s Guide 48 Chapter 3 Hardware Overview...
Page 63: ...GS 4012F User s Guide 62 Chapter 5 Initial Setup Example...
Page 69: ...GS 4012F User s Guide 68 Chapter 6 System Status and Port Statistics...
Page 101: ...GS 4012F User s Guide 100 Chapter 11 Spanning Tree Protocol...
Page 113: ...GS 4012F User s Guide 112 Chapter 15 Link Aggregation...
Page 117: ...GS 4012F User s Guide 116 Chapter 16 Port Authentication...
Page 125: ...GS 4012F User s Guide 124 Chapter 18 Classifier Figure 53 Classifier Example...
Page 131: ...GS 4012F User s Guide 130 Chapter 19 Policy Rule Figure 56 Policy Example...
Page 135: ...GS 4012F User s Guide 134 Chapter 20 Queuing Method...
Page 141: ...GS 4012F User s Guide 140 Chapter 21 VLAN Stacking...
Page 183: ...GS 4012F User s Guide 182 Chapter 30 VRRP...
Page 203: ...GS 4012F User s Guide 202 Chapter 32 Access Control...
Page 205: ...GS 4012F User s Guide 204 Chapter 33 Diagnostic...
Page 219: ...GS 4012F User s Guide 218 Chapter 38 Routing Table...
Page 267: ...GS 4012F User s Guide 266 Chapter 40 Command Examples...
Page 277: ...GS 4012F User s Guide 276 Chapter 41 IEEE 802 1Q Tagged VLAN Commands...
Page 287: ...GS 4012F User s Guide 286 Chapter 42 Troubleshooting...
Page 291: ...GS 4012F User s Guide 290 Product Specifications...