beautypg.com

Avocent Single port KVM over IP switch User Manual

Page 56

background image

Single port KVM over IP switch

56

applet tries to make an encrypted connection. In case connection establishment fails for
any reason an unencrypted connection will be used.

If set to “Force” the applet tries to make an encrypted connection. An error will be
reported in case connection establishment fails.

6.5.4 Certificate

Figure 6-23. Certificate Settings

The IP-KVM switch uses the Secure Socket Layer (SSL) protocol for any encrypted network
traffic between itself and a connected client. During the connection establishment the
IP-KVM switch has to expose its identity to a client using a cryptographic certificate. Upon
delivery, this certificate and the underlying secret key is the same for all IP-KVM switch ever
produced and certainly will not match the network configuration that will be applied to the
IP-KVM switch cards by its user. The certificate's underlying secret key is also used for
securing the SSL handshake. Hence, this is a security risk (but far better than no encryption
at all).

However, it is possible to generate and install a new certificate that is unique for a particular
IP-KVM switch card. In order to do that, the IP-KVM switch is able to generate a new
cryptographic key and the associated Certificate Signing Request (CSR) that needs to be
certified by a certification authority (CA). A certification authority verifies that you are the
person who you claim you are, and signs and issues a SSL certificate to you.

The following steps are necessary to create and install a SSL certificate for the IP-KVM
switch:

• Create a SSL Certificate Signing Request using the panel shown in Figure 6-23. You need

to fill out a number of fields that are explained below. Once this is done, click on the button
“ Create ” which will initiate the Certificate Signing Request generation. The CSR can be