178
Fabric OS Administrator’s Guide
53-1002745-02
Secure Copy
6
Table 22
describes additional software or certificates that you must obtain to deploy secure
protocols.
The security protocols are designed with the four main use cases described in
Table 23
.
Secure Copy
The Secure Copy protocol (SCP) runs on port 22. It encrypts data during transfer, thereby avoiding
packet sniffers that attempt to extract useful information during data transfer. SCP relies on SSH to
provide authentication and security.
SSH
Secure Shell (SSH) is a network protocol that allows data to be exchanged over a secure channel
between two computers. Encryption provides confidentiality and integrity of data. SSH uses public-key
cryptography to authenticate the remote computer and allow the remote computer to authenticate the
user, if necessary.
SSL
Fabric OS uses Secure Socket Layer (SSL) to support HTTPS. A certificate must be generated and
installed on each switch to enable SSL. Supports SSLv3, 128-bit encryption by default.
TABLE 22
Items needed to deploy secure protocols
Protocol
Host side
Switch side
SSHv2
Secure shell client
None
HTTPS
No requirement on host side except a browser
that supports HTTPS
Switch IP certificate for SSL
SCP
SSH daemon, SCP server
None
SNMPv1, SNMPv2, SNMPv3
None
None
TABLE 23
Main security scenarios
Fabric
Management interfaces Comments
Nonsecure
Nonsecure
No special setup is needed to use Telnet or HTTP.
Nonsecure
Secure
Secure protocols may be used. An SSL switch certificate must be installed if
HTTPS is used.
Secure
Secure
Switches running earlier Fabric OS versions can be part of the secure fabric,
but they do not support secure management.
Secure management protocols must be configured for each participating
switch. Nonsecure protocols may be disabled on nonparticipating switches.
If SSL is used, then certificates must be installed. For more information on
installing certificates, refer to
“Installing a switch certificate”
on page 185.
Secure
Nonsecure
You must use SSH because Telnet is not allowed with some features.
TABLE 21
Secure protocol support (Continued)
Protocol Description
Содержание Fabric OS 7.1.0
Страница 1: ...53 1002745 02 25 March 2013 Fabric OS Administrator s Guide Supporting Fabric OS 7 1 0 ...
Страница 24: ...24 Fabric OS Administrator s Guide 53 1002745 02 ...
Страница 28: ...28 Fabric OS Administrator s Guide 53 1002745 02 ...
Страница 32: ...32 Fabric OS Administrator s Guide 53 1002745 02 ...
Страница 42: ...42 Fabric OS Administrator s Guide 53 1002745 02 ...
Страница 116: ...116 Fabric OS Administrator s Guide 53 1002745 02 Inter switch links 4 FIGURE 7 Virtual channels on a QoS enabled ISL ...
Страница 132: ...132 Fabric OS Administrator s Guide 53 1002745 02 Frame Redirection 4 ...
Страница 194: ...194 Fabric OS Administrator s Guide 53 1002745 02 Ports and applications used by switches 6 ...
Страница 254: ...254 Fabric OS Administrator s Guide 53 1002745 02 Brocade configuration form 8 ...
Страница 274: ...274 Fabric OS Administrator s Guide 53 1002745 02 Validating a firmware download 9 ...
Страница 302: ...302 Fabric OS Administrator s Guide 53 1002745 02 Creating a logical fabric using XISLs 10 ...
Страница 344: ...344 Fabric OS Administrator s Guide 53 1002745 02 Concurrent zone transactions 11 ...
Страница 374: ...374 Fabric OS Administrator s Guide 53 1002745 02 Setting up TI over FCR sample procedure 12 ...
Страница 432: ...432 Fabric OS Administrator s Guide 53 1002745 02 Access Gateway N_Port failover with FA PWWN 16 ...
Страница 462: ...462 Fabric OS Administrator s Guide 53 1002745 02 ...
Страница 490: ...490 Fabric OS Administrator s Guide 53 1002745 02 Ports on Demand 18 ...
Страница 498: ...498 Fabric OS Administrator s Guide 53 1002745 02 Supported topologies for ICL connections 19 ...
Страница 626: ...626 Fabric OS Administrator s Guide 53 1002745 02 Preparing a switch for FIPS B ...
Страница 630: ...630 Fabric OS Administrator s Guide 53 1002745 02 Hexadecimal Conversion C ...
Страница 666: ...666 Fabric OS Administrator s Guide 53 1002745 02 ...