Secure copy, Table 19, Table 20 – Dell POWEREDGE M1000E User Manual
Page 158

118
Fabric OS Administrator’s Guide
53-1001763-02
Secure Copy
6
describes additional software or certificates that you must obtain to deploy secure
protocols.
The security protocols are designed with the four main use cases described in
Secure Copy
The secure copy protocol (SCP) runs on port 22. It encrypts data during transfer, thereby avoiding
packet sniffers that attempt to extract useful information during data transfer. SCP relies on SSH to
provide authentication and security.
SSH
Secure Shell (SSH) is a network protocol that allows data to be exchanged over a
secure channel between two computers. Encryption provides confidentiality and
integrity of data. SSH uses public-key cryptography to authenticate the remote
computer and allow the remote computer to authenticate the user, if necessary.
SSL
Fabric OS uses secure socket layer (SSL) to support HTTPS. A certificate must be
generated and installed on each switch to enable SSL. Supports SSLv3, 128-bit
encryption by default.
TABLE 19
Items needed to deploy secure protocols
Protocol
Host side
Switch side
SSHv2
Secure shell client
None
HTTPS
No requirement on host side
except a browser that
supports HTTPS
Switch IP certificate for SSL
SCP
SSH daemon, SCP server
None
SNMPv1, SNMPv2, SNMPv3
None
None
TABLE 20
Main security scenarios
Fabric
Management
interfaces
Comments
Nonsecure
Nonsecure
No special setup is needed to use Telnet or HTTP.
Nonsecure
Secure
Secure protocols may be used. An SSL switch certificate must be
installed if HTTPS is used.
Secure
Secure
Switches running earlier Fabric OS versions can be part of the
secure fabric, but they do not support secure management.
Secure management protocols must be configured for each
participating switch. Nonsecure protocols may be disabled on
nonparticipating switches.
If SSL is used, then certificates must be installed. For more
information on installing certificates, refer to
Secure
Nonsecure
You must use SSH because Telnet is not allowed with some features.
TABLE 18
Secure protocol support
Protocol
Description