SSHv2 Encrytion – An Important Feature for Console Terminal Server Security

When choosing a console terminal server solution, it’s especially important to make certain that the console terminal server supports multiple layers of security. The reason for this is simple: since the whole purpose of the console terminal server is to provide remote access to console port command functions on remote network elements, it’s absolutely vital to prevent access by unauthorized users. Ideally, a console terminal server should include general security features such as password protection and IP filtering, authentication protocols such as LDAP, Kerberos, RADIUS and TACACS, plus SSHv2 encryption to make certain that passwords and commands are safe from interception by outsiders.

The main advantage of SSHv2 encryption is that it ensures that even if unauthorized users somehow manage to intercept data being sent to or from the console terminal server, intercepted packets will still remain protected by powerful, up-to-date encryption. When a console terminal server product supports SSHv2 encryption, this allows the console terminal server to issue public keys which are used to further verify each authorized user, provide a means to decode encrypted data and protect data transfers from password sniffing attacks.

Once a public key has been issued, SSHv2 encryption is basically transparent to the user; data and commands are encoded, transmitted and decoded without noticeable delays. This ensures that all data sent to and from the console terminal server is safe from outside access, without slowing down the data transfer process.

The ability to securely transfer files to and from the console terminal server protects sensitive data such as passwords from unauthorized access and helps to ensure that console port command access is only available to authorized users. Given the powerful remote command access capabilities of a console terminal server, it’s plain to see that encryption protocols such as SSHv2 should be a vital element in any out of band management application.

Link to Original Content

Tags: , , , , , ,

Comments are closed.