Security

Overview
The Web/SNMP Management Card provides several different security options, depending on the access interface used. Each of these individual elements is described below, and a summary table is given for each interface. In general, the security aspects of the Management Card should provide a reasonable level of access and authentication control. As a network device that passes information across the network, though, it is subject to the same exposure as other devices on the network. Protecting intranet networks that are connected to external networks (the Internet) with devices such as firewalls, is also an extremely important element in security.

Authentication versus Encryption
The Management Card does not currently use any type of encryption. This means that all the data and communication between the Management Card and any of the client interfaces, such as Telnet and the web server, is "readable" by capturing the network traffic going to and from the Management Card. For almost all applications this should not be a problem since sensitive data is not being transferred. The card does provide basic authentication via user names and passwords to control access as well as IP address verification. While these basic access modes are sufficient for most environments, the Management Card can also provide a greater level of security by enabling MD5 authentication for the web interface. For information on using MD5 see MD5 AUTHENTICATION.

User Names, Passwords and Community Names
The Administrator and Device Manager User user names and passwords are for logging into the Control Console and web interfaces. All user names, passwords and community names, for SNMP, are transferred over the network as plain-text. This means that someone capable of monitoring the network traffic can determine the user names and passwords required to access the Management Card. Any similar device with Telnet server, web server, or SNMPv1 agent will have the same constraints due to the limitations in the protocols themselves.

Port Assignments
It is possible to define the TCP ports that the Telnet, FTP and web servers utilize. These are initially set at the standard "well known port" for the particular protocol. To enable users to hide the interfaces, one can use arbitrary ports from 5000-65535. Once an interface uses a non-standard port, it is required to specify the port when using a client interface, such as a web browser. Hiding the servers provides a level of security in obscurity. In a sense, the non-standard ports are extra passwords.

MD5 Authentication
The web interface option for MD5 authentication enables a higher level of access security than provided by the basic http authentication scheme. The MD5 scheme is very similar to the the CHAP and PAP remote access protocols. When enabled, the web server will request a user name and a password phrase (distinct from the passwords). As opposed to the basic scheme, the user name and password phrase are not transmitted over the network. The small Java login applet combines the user name, password phrase and session-unique challenge number and calculates an MD5 hash number. This number is then returned to the server so that it can verify that the user has the correct login information. By passing back only the hash number, the login information is not revealed. In addition to the login authentication, each form post for configuration or control operations is also authenticated with a unique challenge and hash response. The scheme does not involve any encryption, so pages are transmitted in their plain-text form. In addition, after the authentication login, subsequent page access is restricted by IP address and a hidden session cookie. Since the MD5 authentication scheme is available only for the web interface, it is important to disable the less secure interfaces including Telnet, FTP and SNMP. For SNMP, it is possible to disable write access only so that read and trap facilities are still available. The MD5 authentication scheme provides a much higher level of security than the plain-text type access methods. Sophisticated attacks are, however, almost impossible to prevent. Well-configured firewalls are an essential element in an overall security scheme.

Each of the interfaces and access methods is described below.

 
Interface Security Access Notes
Serial Control Console User name & password Always enabled.
Telnet Control Console User name & password
Selectable server port
Server Enable/Disable
The user name and password are transmitted plain-text./td>
SNMP Community Name
NMS IP filters
Agent Enable/Disable
Four access communities with read/write/disable capability
IP filters only allow access from designated IP addresses.
FTP Server User name & password
Selectable server port
Server Enable/Disable
Administrator access only.
Web Server User name & password
Selectable server port
Server Enable/Disable
MD5 Authentication option
In basic HTTP authentication. mode, the user name and password are transmitted base-64 encoded (no encryption). In MD5, authentication mode uses user name and password phrase.