Home > Cisco > Switch > Cisco Sg3008 Manual

Cisco Sg3008 Manual

Here you can view all the pages of manual Cisco Sg3008 Manual. The Cisco manuals for Switch are available online for free. You can easily download all the documents as PDF.

Page 491

Security: Secure Sensitive Data Management
Configuring SSD
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  453
21
 
Password recovery is currently activated from the boot menu and allows the user 
to log on to the terminal without authentication. If SSD is supported, this option is 
only permitted if the local passphrase is identical to the default passphrase. If a 
device is configured with a user-defined passphrase, the user is unable to activate...

Page 492

Security: Secure Sensitive Data Management
Configuring SSD
454 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
21
•User Defined (Plaintext)—Enter a new passphrase.
•Confirm Passphrase—Confirm the new passphrase.
SSD Rules
Only users with SSD read permission of Plaintext-only or Both are allowed to set 
SSD rules.
To configure SSD rules:
STEP 1Click Security > Secure Sensitive Data Management > SSD Rules.
The currently-defined rules are displayed.
STEP...

Page 493

Security: Secure Sensitive Data Management
Configuring SSD
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  455
21
 
•Read Permission—The read permissions associated with the rule. These 
can be the following:
-Exclude—Lowest read permission. Users are not permitted to get 
sensitive data in any form.
-Plaintex t Only—Higher read permission than above ones. Users are 
permitted to get sensitive data in plaintext only.
-Encr ypted Only—Middle read...

Page 494

Security: Secure Sensitive Data Management
Configuring SSD
456 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
21 

Page 495

22
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  457
 
Security: SSH Client
This section describes the device when it functions as an SSH client.
It covers the following topics:
•Secure Copy (SCP) and SSH
•Protection Methods
•SSH Server Authentication
•SSH Client Authentication
•Before You Begin
•Common Tasks
•SSH Client Configuration Through the GUI
Secure Copy (SCP) and SSH
Secure Shell or SSH is a network protocol that enables data to be exchanged...

Page 496

Security: SSH Client
Protection Methods
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  458
22
 
When files are downloaded via TFTP or HTTP, the data transfer is unsecured. 
When files are downloaded via SCP, the information is downloaded from the SCP 
server to the device via a secure channel. The creation of this secure channel is 
preceded by authentication, which ensures that the user is permitted to perform 
the operation. 
Authentication...

Page 497

Security: SSH Client
Protection Methods
459 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
22
The username/password must then be created on the device. When data is 
transferred from the server to the device, the username/password supplied by the 
device must match the username/password on the server.
Data can be encrypted using a one-time symmetric key negotiated during the 
session.
Each device being managed must have its own username/password,...

Page 498

Security: SSH Client
SSH Server Authentication
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  460
22
 
When a private key is created on a device, it is also possible to create an 
associated passphrase. This passphrase is used to encrypt the private key and to 
import it into the remaining switches. In this way, all the switches can use the same 
public/private key.
SSH Server Authentication
A device, as an SSH client, only communicates with a trusted...

Page 499

Security: SSH Client
SSH Client Authentication
461 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 
22
SSH Client Authentication
SSH client authentication by password is enabled by default, with the username/
password being “anonymous”.
The user must configure the following information for authentication:
•The authentication method to be used.
•The username/password or public/private key pair.
In order to support auto configuration of an out-of-box...

Page 500

Security: SSH Client
Before You Begin
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)  462
22
 
Before You Begin
The following actions must be performed before using the SCP feature:
•When using the password authentication method, a username/password 
must be set up on the SSH server.
•When using public/private keys authentication method, the public key must 
be stored on the SSH server.
Common Tasks
This section describes some common tasks performed...
Start reading Cisco Sg3008 Manual

Related Manuals for Cisco Sg3008 Manual

All Cisco manuals