Previous Topic

Next Topic

Book Contents

Book Index

Managing Security Settings

The following set of options can be managed in security settings:

To access security settings preview pane, click Security > Security Settings. The Security Settings page is displayed.

Security settings

Security settings parameters

Parameter

Description

BlockedPorts

Clicking on this link displays the list of ports Blocked.

BlockedIPs

Clicking on this link displays the list of IPs Blocked.

CHAP Settings

Allows you to select the value from the drop-down list.

CHAP Secret

Allows you to edit/enter the CHAP secret.

Login Warning

Allows you to enter the warning that is displayed in the Login page.

Login Notice

Allows you to enter the notice that is displayed in the Login page.

SNMP Community

Allows you to enter the community name to which this entry grants access. A community name is a name associated with the switch and with a set of SNMP managers that manage it with a specified privileged level. The length of name can be up to 16 case-sensitive characters.

UserLock Settings

Allows you to enable and disable UserLock Settings.

Local Auth on Fallback

Allows you to define the settings for fall back.

  • Enable: Enables the local user login when the CHAP settings is enabled.
  • Disable: Disables the local user login when the CHAP settings is enabled.

Configure Ssh

Allows you to turn on Secure Shell (Ssh) protocol. The protocol secures the sessions using standard cryptographic mechanisms.

Regenerate Keys

Allows you to regenerate keys. Clicking on this link allows you to select the key type for Secure Shell (Ssh) from the following:

  • dsa
  • rsa

Provision Keys

Clicking on this link allows you to provision Secure Shell (ssh) keys. You can enter the location of the public and private key files, and select the key type.

HMAC Selection

Clicking on this link allows you to select the Hmac to be supported. HMAC is used for calculating message authentication code involving a cryptographic hash function(MD5 and SHA1) in combination with a secret key. HMAC can verify the data integrity and authenticity of a message. The size of the output for Hmacs are as follows.

  • hmac-md5(128 bits)
  • hmac-md5-96(96 bits)
  • hmac-sha1(160 bits)
  • hmac-sha1-96(96 bits)

Cipher Selection

Clicking on this link allows you to select the Cipher to be supported. In Ciphers, “aes” and “des” are symmetric-key encryption standards, and the number following specifies the key size.

In This Section

Blocking Ports

Viewing Blocked Ports

Unblocking Ports

Blocking an IP

Viewing Blocked IPs

Unblocking an IP

Enabling Challenge-Response Authentication

Regenerate Keys

Provision Keys

HMAC Selection

Cipher Selection

See Also

Security

Working with RADIUS Server

Managing User Accounts

User-Lockout

Audit Logs

Collecting Audit Logs Archive

User Sessions