User guide

USER GUIDE
75. Security Settings
From the IP Extender Menu choose Security Settings. The Security Settings appears.
See Figure 34.
Figure 34 Security Settings
SSL settings
Force HTTPS - Access the Web front-end only using an HTTPS connection. IP
Extender won't listen on the HTTP port for incoming connections.
Disable SSLv2 ciphers – disables SSLv2 ciphers. Only version 3 or higher is
enabled.
KVM encryption - Controls the encrypting of the RFB protocol, used by the
Remote Console to transmit the screen data to the administrator machine and
keyboard and mouse data back to the host.
Off - No encrypting used.
Try - Tries to make an encrypted connection. If unsuccessful, an unencrypted
connection is used.
Force - Tries to make an encrypted connection.
SSL Certificate Management
IP Extender uses the SSL (Secure Socket Layer) protocol for any encrypted network
traffic between itself and a connected client. When connecting, IP Extender reveals
its identity to a client using a cryptographic certificate. This is the same for all IP
Extenders and won't match the network configurations applied to the card by its
user. The certificate's underlying secret key is also used for securing the SSL
handshake. Hence, this is a security risk (but better than no encryption at all).
50