User`s guide
®
USER’S GUIDE
AUTOMATIC TRANSFER SWITCH
185
Secure hash algorithm (SHA) 93
Secure SHell. See SSH.
Security 10
access methods 116
authentication
authentication vs. encryption 120
through digital
certificates with SSL
123
certificate-signing requests 124
disabling less secure interfaces 122
encryption with SSH and SCP 121
how certificates are used 134
how SSH host keys are used 134
planning and implementing 120
Port assignments 119
SCP as alternative to FTP 122
SSL
CipherSuite algorithms and
ciphers
124
supported SSH clients 77
using non-standards ports as extra
passwords
119
Watchdog feature 10
Security wizard 133
creating certificates
without a
certificate authority
136
creating server certificates
to use with a certificate authority 142
creating signing requests 142
creating SSH host keys 147
Send DNS query 74
Sensitivity 45
Server certificates
creating to use with a
certificate authority
142
creating without a
certificate authority
136
SET commands, troubleshooting 177
Set manually (date and time) 103
Severity levels (of Events)
Informational 56
None 56
Severe 56
Warning 56
Signing requests
creating 142
SMTP Server setting 61
SNMP
Access Type setting 85
Authentication Traps 58
Community Name setting 84
NMS IP/Domain Name setting 84
SNMP traps option 57
troubleshooting problems 177
Source A and Source B
configuring names of sources 45
displaying names of sources 43
SSH
enabling 77, 79
encryption 121
host key
as identifier that cannot be falsified 121
creating 147
file name 82
file status 82
transferring to the Automatic
Transfer Switch
78
modifying the port setting 80, 92
obtaining an SSH client 77
server configuration 81
v1 encryption algorithms 81
v2 encryption algorithms 81
SSL
authentication through
digital certificates
123
certificate signing requests 124
encryption ciphers
and hash algorithms
93
Status
in Web interface 36