Users Guide

Fabric OS Administrator’s Guide 195
53-1002920-02
Chapter
7
Configuring Protocols
In this chapter
Security protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Secure Copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Secure Shell protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Secure Sockets Layer protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Simple Network Management Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Telnet protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Listener applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Ports and applications used by switches. . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Security protocols
Security protocols provide endpoint authentication and communications privacy using
cryptography. Typically, you are authenticated to the switch while the switch remains
unauthenticated to you. This means that you can be sure with what you are communicating. The
next level of security, in which both ends of the conversation are sure with whom they are
communicating, is known as two-factor authentication. Two-factor authentication requires public
key infrastructure (PKI) deployment to clients.
Fabric OS supports the secure protocols shown in Table 26.
TABLE 26 Secure protocol support
Protocol Description
HTTPS HTTPS is a Uniform Resource Identifier scheme used to indicate a secure HTTP connection. Web Tools
supports the use of Hypertext Transfer Protocol over SSL (HTTPS).
IPsec Internet Protocol Security (IPsec) is a framework of open standards for providing confidentiality,
authentication and integrity for IP data transmitted over untrusted links or networks.
LDAP Lightweight Directory Access Protocol with TLS uses a certificate authority (CA). By default, LDAP traffic is
transmitted unsecured. With the import of signed certificates, you can make LDAP traffic confidential
and secure by using Secure Sockets Layer (SSL) / Transport Layer Security (TLS) technology in
conjunction with LDAP.
SCP Secure Copy (SCP) is a means of securely transferring computer files between a local and a remote host
or between two remote hosts, using the Secure Shell (SSH) protocol. Configuration upload and download
support the use of SCP.
SNMP Simple Network Management Protocol (SNMP) is used in network management systems to monitor
network-attached devices for conditions that warrant administrative attention. Supports SNMPv1, v2,
and v3.