Cisco Sg3008 Manual
Here you can view all the pages of manual Cisco Sg3008 Manual. The Cisco manuals for Switch are available online for free. You can easily download all the documents as PDF.
Page 491
Security: Secure Sensitive Data Management Configuring SSD Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 453 21 Password recovery is currently activated from the boot menu and allows the user to log on to the terminal without authentication. If SSD is supported, this option is only permitted if the local passphrase is identical to the default passphrase. If a device is configured with a user-defined passphrase, the user is unable to activate...
Page 492
Security: Secure Sensitive Data Management Configuring SSD 454 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 21 •User Defined (Plaintext)—Enter a new passphrase. •Confirm Passphrase—Confirm the new passphrase. SSD Rules Only users with SSD read permission of Plaintext-only or Both are allowed to set SSD rules. To configure SSD rules: STEP 1Click Security > Secure Sensitive Data Management > SSD Rules. The currently-defined rules are displayed. STEP...
Page 493
Security: Secure Sensitive Data Management Configuring SSD Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 455 21 •Read Permission—The read permissions associated with the rule. These can be the following: -Exclude—Lowest read permission. Users are not permitted to get sensitive data in any form. -Plaintex t Only—Higher read permission than above ones. Users are permitted to get sensitive data in plaintext only. -Encr ypted Only—Middle read...
Page 494
Security: Secure Sensitive Data Management Configuring SSD 456 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 21
Page 495
22 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 457 Security: SSH Client This section describes the device when it functions as an SSH client. It covers the following topics: •Secure Copy (SCP) and SSH •Protection Methods •SSH Server Authentication •SSH Client Authentication •Before You Begin •Common Tasks •SSH Client Configuration Through the GUI Secure Copy (SCP) and SSH Secure Shell or SSH is a network protocol that enables data to be exchanged...
Page 496
Security: SSH Client Protection Methods Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 458 22 When files are downloaded via TFTP or HTTP, the data transfer is unsecured. When files are downloaded via SCP, the information is downloaded from the SCP server to the device via a secure channel. The creation of this secure channel is preceded by authentication, which ensures that the user is permitted to perform the operation. Authentication...
Page 497
Security: SSH Client Protection Methods 459 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 22 The username/password must then be created on the device. When data is transferred from the server to the device, the username/password supplied by the device must match the username/password on the server. Data can be encrypted using a one-time symmetric key negotiated during the session. Each device being managed must have its own username/password,...
Page 498
Security: SSH Client SSH Server Authentication Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 460 22 When a private key is created on a device, it is also possible to create an associated passphrase. This passphrase is used to encrypt the private key and to import it into the remaining switches. In this way, all the switches can use the same public/private key. SSH Server Authentication A device, as an SSH client, only communicates with a trusted...
Page 499
Security: SSH Client SSH Client Authentication 461 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 22 SSH Client Authentication SSH client authentication by password is enabled by default, with the username/ password being “anonymous”. The user must configure the following information for authentication: •The authentication method to be used. •The username/password or public/private key pair. In order to support auto configuration of an out-of-box...
Page 500
Security: SSH Client Before You Begin Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 462 22 Before You Begin The following actions must be performed before using the SCP feature: •When using the password authentication method, a username/password must be set up on the SSH server. •When using public/private keys authentication method, the public key must be stored on the SSH server. Common Tasks This section describes some common tasks performed...