Encryption, Snmp gets, sets, and traps, User’s guide – Dell Metered PDU LED User Manual
Page 140: Mete red rac k pdu

USER’S GUIDE
Mete
red Rac
k
PDU
137
Encryption
SNMP GETS, SETS, and Traps
For encrypted communication when you use SNMP to monitor or configure the Rack
PDU, choose SNMPv3. The privacy passphrase used with SNMPv3 user profiles
ensures the privacy of the data (by means of encryption, using the AES or DES
encryption algorithm) that an NMS sends to or receives from the Rack PDU.
Secure SHell (SSH) and Secure CoPy (SCP) for the command line interface
The Secure SHell protocol.
SSH provides a secure mechanism to access computer
consoles, or shells, remotely. The protocol authenticates the server (in this case, the
Rack PDU) and encrypts all transmissions between the SSH client and the server.
• SSH is a high-security alternative to Telnet. Telnet does not provide encryption.
• SSH protects the user name and password, which are the credentials for
authentication, from being used by anyone intercepting network traffic.
• To authenticate the SSH server (the Rack PDU) to the SSH client, SSH uses a host
key unique to the SSH server. The host key is an identification that cannot be
falsified, and it prevents an invalid server on the network from obtaining a user name
and password by presenting itself as a valid server.
• The Rack PDU supports SSH version 2, which provides protection from attempts to
intercept, forge, or change data during transmission.
• When you enable SSH, Telnet is automatically disabled.
• The interface, user accounts, and user access rights are the same whether you
access the command line interface through SSH or Telnet.
For information on supported SSH client applications, see
. To create a host key, see
.