© Copyright IBM Corp. 2011
55
Chapter 4. Securing Administration
Secure switch management is needed for environments that perform significant
management functions across the Internet. Common functions for secured
management are described in the following sections:
•
“Secure Shell and Secure Copy” on page 55
•
“End User Access Control” on page 60
Note:
SNMP read and write functions are enabled by default. For best security
practices, if SNMP is not needed for your network, it is recommended that
you disable these functions prior to connecting the switch to the network
“Using Simple Network Management Protocol” on page 30
).
Secure Shell and Secure Copy
Because using Telnet does not provide a secure connection for managing a G8000,
Secure Shell (SSH) and Secure Copy (SCP) features have been included for G8000
management. SSH and SCP use secure tunnels to encrypt and secure messages
between a remote administrator and the switch.
SSH
is a protocol that enables remote administrators to log securely into the G8000
over a network to execute management commands.
SCP
is typically used to copy files securely from one machine to another. SCP uses
SSH for encryption of data on the network. On a G8000, SCP is used to download
and upload the switch configuration via secure channels.
Although SSH and SCP are disabled by default, enabling and using these features
provides the following benefits:
•
Identifying the administrator using Name/Password
•
Authentication of remote administrators
•
Authorization of remote administrators
•
Determining the permitted actions and customizing service for individual admin-
istrators
•
Encryption of management messages
•
Encrypting messages between the remote administrator and switch
•
Secure copy support
IBM Networking OS implements the SSH version 2.0 standard and is confirmed to
work with SSH version 2.0-compliant clients such as the following:
•
OpenSSH_5.4p1 for Linux
•
Secure CRT Version 5.0.2 (build 1021)
•
Putty SSH release 0.60
Содержание RackSwitch G8000
Страница 1: ...RackSwitch G8000 Application Guide...
Страница 2: ......
Страница 3: ...RackSwitch G8000 Application Guide...
Страница 16: ...16 RackSwitch G8000 Application Guide...
Страница 22: ...20 RackSwitch G8000 Application Guide...
Страница 23: ...Copyright IBM Corp 2011 21 Part 1 Getting Started...
Страница 24: ...22 RackSwitch G8000 Application Guide...
Страница 54: ...52 RackSwitch G8000 Application Guide...
Страница 55: ...Copyright IBM Corp 2011 53 Part 2 Securing the Switch...
Страница 56: ...54 RackSwitch G8000 Application Guide...
Страница 92: ...90 RackSwitch G8000 Application Guide...
Страница 94: ...92 RackSwitch G8000 Application Guide...
Страница 144: ...142 RackSwitch G8000 Application Guide...
Страница 145: ...Copyright IBM Corp 2011 143 Part 4 Advanced Switch ing Features...
Страница 146: ...144 RackSwitch G8000 Application Guide...
Страница 148: ...146 RackSwitch G8000 Application Guide...
Страница 182: ...180 RackSwitch G8000 Application Guide...
Страница 184: ...182 RackSwitch G8000 Application Guide...
Страница 212: ...210 RackSwitch G8000 Application Guide...
Страница 258: ...256 RackSwitch G8000 Application Guide...
Страница 286: ...284 RackSwitch G8000 Application Guide...
Страница 294: ...292 RackSwitch G8000 Application Guide...
Страница 298: ...296 RackSwitch G8000 Application Guide...
Страница 310: ...308 RackSwitch G8000 Application Guide...
Страница 311: ...Copyright IBM Corp 2011 309 Part 7 Network Management...
Страница 312: ...310 RackSwitch G8000 Application Guide...
Страница 320: ...318 RackSwitch G8000 Application Guide...
Страница 332: ...330 RackSwitch G8000 Application Guide...
Страница 334: ...332 RackSwitch G8000 Application Guide...
Страница 345: ...Copyright IBM Corp 2011 343 Part 9 Appendices...
Страница 346: ...344 RackSwitch G8000 Application Guide...
Страница 357: ...Copyright IBM Corp 2011 Appendix C Notices 355 Taiwan Class A compliance statement...
Страница 358: ...356 RackSwitch G8000 Application Guide...