299
Service management configuration
The service management module provides the following types of services: FTP, Telnet, SSH, SFTP, HTTP and
HTTPS. You can enable or disable the services as needed. In this way, the performance and security of the
system can be enhanced, thus secure management of the device can be achieved.
The service management module also provides the function to modify HTTP and HTTPS port numbers, and
the function to associate the FTP, HTTP, or HTTPS service with an ACL, thus reducing attacks of illegal users
on these services.
FTP service
The File Transfer Protocol (FTP) is an application layer protocol for sharing files between server and client
over a TCP/IP network.
Telnet service
The Telnet protocol is an application layer protocol that provides remote login and virtual terminal functions
on the network.
SSH service
Secure Shell (SSH) offers an approach to securely logging in to a remote device. By encryption and strong
authentication, it protects devices against attacks such as IP spoofing and plain text password interception.
SFTP service
The secure file transfer protocol (SFTP) is a new feature in SSH2.0. SFTP uses the SSH connection to provide
secure data transfer. The device can serve as the SFTP server, allowing a remote user to log in to the SFTP
server for secure file management and transfer. The device can also serve as an SFTP client, enabling a user
to login from the device to a remote device for secure file transfer.
HTTP service
The Hypertext Transfer Protocol (HTTP) is used for transferring web page information across the Internet. It
is an application-layer protocol in the TCP/IP protocol suite.
You can log in to the device using the HTTP protocol with HTTP service enabled, accessing and controlling
the device with Web-based network management.
HTTPS service
The Secure HTTP (HTTPS) refers to the HTTP protocol that supports the Security Socket Layer (SSL) protocol.
The SSL protocol of HTTPS enhances the security of the device in the following ways:
Uses the SSL protocol to ensure the legal clients to access the device securely and prohibit the illegal
clients;
Encrypts the data exchanged between the HTTPS client and the device to ensure the data security and
integrity, thus realizing the security management of the device;
Defines certificate attribute-based access control policy for the device to control the access right of the
client, in order to further avoid attacks from illegal clients.
Содержание V1910
Страница 1: ...1 HP V1910 Switch Series User Guide 5998 2238 Part number 5998 2238 Document version 2 ...
Страница 85: ...73 c Display the rate settings of ports ...
Страница 102: ...90 a Port traffic statistics ...
Страница 186: ...174 a The MAC tab Click Add in the bottom to enter the page as shown in b b Create a MAC address entry ...
Страница 252: ...240 b The Port Setup tab ...
Страница 260: ...248 d The Port Setup tab ...
Страница 362: ...350 a Ping operation summary ...
Страница 421: ...409 c Configure authorized IP ...
Страница 479: ...467 Index A B C D E F G H I L M O P Q R S T V W ...