
286
Managing services
Overview
Service management allows you to manage the following types of services: FTP, Telnet, SSH, SFTP, HTTP
and HTTPS.
You can enable or disable the services, modify HTTP and HTTPS port numbers, and associate the FTP,
HTTP, or HTTPS service with an ACL to block illegal users.
FTP service
FTP is an application layer protocol for sharing files between server and client over a TCP/IP network.
Telnet service
Telnet is an application layer protocol that provides remote login and virtual terminal functions.
SSH service
Secure Shell (SSH) offers an approach to securely logging in to a remote device. By encryption and
strong authentication, it protects devices against attacks such as IP spoofing and plain text password
interception.
SFTP service
The secure file transfer protocol (SFTP) is a new feature in SSH2.0. SFTP uses the SSH connection to
provide secure data transfer. The device can serve as the SFTP server, allowing a remote user to log in to
the SFTP server for secure file management and transfer. The device can also serve as an SFTP client,
enabling a user to login from the device to a remote device for secure file transfer.
HTTP service
HTTP is used for transferring webpage information across the Internet. It is an application-layer protocol
in the TCP/IP protocol suite.
You can log in to the device by using the HTTP protocol with HTTP service enabled, accessing and
controlling the device with Web-based network management.
HTTPS service
The Hypertext Transfer Protocol Secure (HTTPS) refers to the HTTP protocol that supports the Security
Socket Layer (SSL) protocol.
The SSL protocol of HTTPS enhances the security of the device in the following ways:
•
Uses the SSL protocol to ensure the legal clients to access the device securely and prohibit the illegal
clients.
•
Encrypts the data exchanged between the HTTPS client and the device to ensure the data security
and integrity.
•
Defines certificate attribute-based access control policy for the device to control user access.
Содержание HP 830 Series
Страница 37: ...25 Figure 18 Configuration complete ...
Страница 70: ...58 Figure 49 Displaying the rate settings of ports ...
Страница 78: ...66 Figure 56 Configuring the monitor port ...
Страница 82: ...70 Figure 59 Switching to the management level ...
Страница 87: ...75 Figure 64 Displaying port traffic statistics ...
Страница 167: ...155 Figure 154 Displaying the current voice VLAN information ...
Страница 304: ...292 Figure 280 Traceroute operation result ...
Страница 321: ...309 Request timed out Ping statistics for 10 0 0 1 Packets Sent 4 Received 0 Lost 4 100 loss ...
Страница 343: ...331 Figure 330 Ping operation summary ...
Страница 462: ...450 Figure 467 Configuring authorized IP ...