User`s guide
®
USER’S GUIDE
AUTOMATIC TRANSFER SWITCH
120
Authentication versus encryption
You can select to use security features for the Automatic Transfer Switch
that control access by providing basic authentication through user names,
passwords, and IP addresses, without using encryption. These basic
security features are sufficient for most environments in which sensitive
data is not being transferred.
To ensure that data and communication between the Automatic Transfer
Switch and the client interfaces, such as the control console and the Web
interface, cannot be intercepted, you can provide a greater level of security
by using one or more of the following encryption-based methods:
• For the Web interface, use the Secure Sockets Layer (SSL) and
Transport Layer Security (TLS) protocols.
• To encrypt user names and passwords for control console access, use
the Secure SHell (SSH) protocol.
• To encrypt user names, passwords, and data for the secure transfer of
files, use the SCP protocol.
For more information on these protocols for encryption-based
security, see Secure SHell (SSH) and Secure CoPy (SCP) and
Secure Sockets Layer (SSL).