350 - Ceragon - IP-10G EMS Security - Presentation v1.2
350 - Ceragon - IP-10G EMS Security - Presentation v1.2
350 - Ceragon - IP-10G EMS Security - Presentation v1.2
Agenda
SSH
HTTPS
SFTP
Users & Groups
Password
Security Configuration
Update first FTP connection
disable
"Telnet" protocol, which will be "enabled" by default. Server authentication
will be based on IP-10s "public key".
Key exchange algorithm is RSA.
Supported Encryptions: aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc,
arcfour128, arcfour256, arcfour, aes192-cbc, aes256-cbc, aes128-ctr,
aes192-ctr, aes256-ctr.
MAC (Message Authentication Code): SHA-1-96 (MAC length = 96 bits, key
length = 160 bit). Supported MAC: hmac-md5, hmac-sha1, hmacripemd160, hmac-sha1-96, hmacmd5-96'
The server will authenticate the user based on user name and password.
Number of failed authentication attempts is not limited.
Server timeout for authentication: 10 min. This value cannot be configured.
HTTPS
In order to manage the system using HTTPS protocol, user should
follow the following steps:
The status of the download operation can be monitored. The returned status
values are: ready, in-progress, success, failed.
To apply the new certificate, the WEB server should be restarted (Admin
privilege). WEB server will be automatically restarted when it is configured to
HTTPS.
HTTPS - Activation
WEB interface protocol can be configured to be HTTP (default) or HTTPS
(cannot be both at the same time).
While switching to HTTPS mode, the following must be fulfilled:
WEB server certificate file exist.
Certificate public key is compatible to IDUs private key.
If one of the above tests fails, the operation will return an appropriate error
indication.
Open WEB Browser and type the URL https:\\<IP of target IDU>.
Note:
This parameter is NOT copied when copy to mate operation is initiated,
for security reasons (unsecured unit should not be able to override security
parameters of secured unit).
Configuration upload/download,
Upload the unit info.
Upload public key.
Download certificate files.
SW download
USERS,
GROUPS
&
PASSWORD
Proprietary and Confidential
Adding Users
Adding Users
Adding Users
Changing Password
A valid password should be a mix of upper and lower case letters, digits, and other
characters.
You can use an 8 character long password with characters from at least 3 of these 4
classes. An upper case letter that begins the password and a digit that ends it do not
count towards the number of character classes used.
Changing Password
Good example:
L00pBack using capital letters, small letters and digits (zeros instead of O)
Bad example:
Loopback missing digits or other characters
Loopbacks using more than 8 characters
Thank You !
[email protected]
17