oductnames are trademarks or registered trademarks of their respective holders. Information in this document issubject to change without notice. Certain features may
not yet be generally available. Force10Networks, Inc. assumes noresponsibility for any errors that may appear in this document.
Enabling secure management via Secure SHell (SSH) or Secure Sockets Layer (SSL/HTTPS) on the S-Series is a
four-step process. SSH and SSL both provide an encrypted transport session between the management station and
switch.
1. Generate the SSH keys or SSL certificates offline.
2. Copy the SSH keys or SSL certificates to the switch using TFTP.
3. Enable the secure management server (SSH or HTTPS) on the switch.
4. Disable the insecure version of the management server (Telnet or HTTP).
If you received this document as part of a .zip file, the file should contain two directories: ssh and ssl (the directories
are also on the S-Series CD-ROM). If you did not get the entire .zip file, please contact your Force10 account team.
•The ssh directory has example RSA1, RSA2 and DSA keys and a shell script called “generate-keys.sh” that can
be used to generate your own SSH keys.
•The ssl directory has example certificates and a shell script called “generate-pem.sh” that can be used to generate
your own SSL certificates.
The scripts provided use OpenSSH (
certificate generation. Other free and commercial tools exist that can provide the same functionality and you can use
them if you like.
For additional options and commands related to the Telnet, SSH and HTTP/HTTPS features, please consult the
SFTOS manuals.
http://www.openssh.org/) and OpenSSL (http://www.openssl.org/) for key and
Enabling SSH
1. Generate the SSH keys using the script in the ssh directory, or copy the example keys (which end in .key) to your
TFTP server.
2. Copy the keys to NVRAM with TFTP as follows from this example, using the IP address of your TFTP server. For
SSHv1, copy the RSA1 key. For SSHv2, copy the RSA1, RSA2, and DSA keys, as shown below.
Using an SSH client, connect to the switch and login to verify that the SSH server is working.
4. Once you have verified that you can connect to the switch with an SSH client, the Telnet server can be disabled
with this command for additional security, if it was enabled. The Telnet server is disabled by default.
SFTOS Version <= 2.2.1 SFTOS Version >= 2.3.1
(SFTOS) #no ip telnet server enable
SFTOS (Config)#no ip telnet server enable
Enabling SSL/HTTPS
1. Generate the SSL certificates using the script in the ssl directory, or copy the example certificates (which end in
.pem) to your TFTP server.
2. Copy the certificates to NVRAM with TFTP as follows from this example, using the IP address of your TFTP
server.
JAN 01 01:16:19 192.168.0.34-1 UNKN[209189968]: sslt_util.c(321) 39 %% SSLT: Successfully
loaded all required SSL PEM files
Using a web browser, connect to the switch using an https:// URL and login to verify that the SSL server is working.
The padlock icon on your browser should indicate an encrypted connection.
If you used the example certificates, your browser will display a warning that it cannot verify the authenticity of the
certificate. This is because the example certificates have not been certified by a Certification Authority. When
certificates are acquired from a Certification Authority and loaded on the switch this warning will not occur.
4. Once you have verified that you can connect to the switch with a web browser, the HTTP server can be disabled
with this command for additional security if it was enabled previously. The HTTP server is disabled by default.
SFTOS Version <= 2.2.1 SFTOS Version >= 2.3.1
(SFTOS) #no ip http server
SFTOS (Config)#no ip http server enable
- 5 -
Force10 Networks, Inc.
1440 McCarthy Boulevard
Milpitas, CA 95035
www.force10networks.com
Phone: 408-571-3500
Fax: 408-571-3550
Email:
info@force10networks.com
S-Series Secure Management
- 6 -
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.