User manual SONY VAIO VGN-Z790Y

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual SONY VAIO VGN-Z790Y. We hope that this SONY VAIO VGN-Z790Y user guide will be useful to you.


SONY VAIO VGN-Z790Y : Download the complete user guide (3426 Ko)

You may also download the following manuals related to this product:

   SONY VAIO VGN-Z790Y QUICK START GUIDE (1244 ko)
   SONY VAIO VGN-Z790Y HOW TO ATTACH THE CARRYING COVER (219 ko)
   SONY VAIO VGN-Z790Y DATASHEET (1138 ko)
   SONY VAIO VGN-Z790Y QUICK START GUIDE (1244 ko)
   SONY VAIO VGN-Z790Y HOW TO ATTACH THE CARRYING COVER (219 ko)

Manual abstract: user guide SONY VAIO VGN-Z790Y

Detailed instructions for use are in the User's Guide.

[. . . ] assumes no responsibility for customer product design or the use or application of customers' products or for any infringements of patents or rights of others which may result from SONY, Inc. may have patents or pending patent applications covering subject matter in this document. The furnishing of this document does not give any license to these patents. Product and Publication Details Model Number: Publication Date: Product Family: Product Name: Home or Business Product: Language: Publication Part Number: Publication Version Number February 2006 SONY managed switch 7xxx Series Managed Switch Business English Beta Draft 1 1. 0 ii Publication Version 1. 0, February 2006 Contents Application Note: Configuring and Enabling Management Security Chapter 1 Introduction Chapter 2 Enabling Management Security Certificate Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1 Configuring Secure Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2 Disabling Insecure Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3 Configuring Secure Socket Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3 Preventing Insecure Web Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4 Appendix A Certificate Generation Scripts SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1 SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] A-1 SSL Helper Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-3 iii Publication Version 1. 0, February 2006 iv Publication Version 1. 0, February 2006 Application Note: Configuring and Enabling Management Security Chapter 1 Introduction In the past, network communications were simply a matter of packaging frames of information and shipping them over the wire to their destination. Protocols gave little thought to who might be viewing the frames as they crossed the wire, or what illegitimate parties might do with the information so gleaned. More and more, security has become an ever-present concern amongst the members of the networking community. Networking infrastructure is far too important to risk abuse by hackers, whether they are malevolent or simply mischievous. As a whole, the community has turned to encryption as a means of ensuring the security of network transactions. Interactive login is a mainstay for providing a means to control and/or configure an entity across the network. For decades the telnet protocol has provided this capability for devices wishing to provide interactive login over a network. However, these protocols are chief culprits with regard to the transmission of sensitive information (e. g. The current de facto standard for providing interactive login in a secure fashion is the Secure Shell (SSH). This set of files can be freely modified and used to generate the appropriate self-signed credentials. Generation of these credentials has been verified using both cygwin and Linux. Once the component files are created, the credentials must be loaded onto the switch running the SONY managed switch. From privileged EXEC mode, issue the following command: #copy tftp://192. 168. 77. 122/rsa1. key nvram:sshkey-rsa1 where the IP address of the tftp server should be substituted as appropriate. Enabling Management Security v1. 0, February 2006 2-1 Application Note: Configuring and Enabling Management Security 2. Repeat the copy command for all the other authentication components: · · · · · · rsa2. key dsa. key dh512. pem dh1024. pem server. pem rootcert. pem nvram:sshkey-rsa2 nvram:sshkey-dsa nvram:sslpem-dhweak nvram:sslpem-dhstrong nvram:sslpem-server nvram:sslpem-root The SSL and SSH credentials may be uploaded separately as needed. However, it is likely that if security is required for one access method it will be required for all access methods. Therefore, best practice is to create the certificates and authentication key simultaneously. Configuring Secure Shell Once the authentication credentials are loaded and the certificates and authentication keys are formed, management security may be configured on the SONY managed switch device. From privileged EXEC mode, issue the command # ip ssh as described in the Command Line Interface Reference manual. This will allow secure shell sessions to be instantiated on the SONY managed switch. Check the message log to determine the success or failure of the command. [. . . ] This will allow secure shell sessions to be instantiated on the SONY managed switch. Check the message log to determine the success or failure of the command. Messages indicating successful start of the ssh service look like this: 0 days 00:17:07 Unit: 1 : File: sshd_main. c : Line: 349 : SSHD: Done generating server key 0 days 00:17:06 Unit: 1 : File: sshd_main. c : Line: 639 : SSHD: successfully loaded RSA2 key 0 days 00:17:06 Unit: 1 : File: sshd_main. c : Line: 627 : SSHD: successfully opened file ssh_host_rsa_key 0 days 00:17:06 Unit: 1 : File: sshd_main. c : Line: 605 : SSHD: successfully loaded DSA key 2-2 v1. 0, February 2006 Enabling Management Security Application Note: Configuring and Enabling Management Security 0 days 00:17:06 Unit: 1 : File: sshd_main. c : Line: 592 : SSHD: successfully opened file ssh_host_dsa_key 0 days 00:17:06 Unit: 1 : File: sshd_control. c : Line: 400 : SSHD: sshdListenTask started If a secure connection cannot be established, entries such as the following indicate the nature of the problem. 0 days 02:30:30 File: ssh_sys_fastpath. c : Line: 584 : tid 40052584, context 0x0x157dba0, deleting 40052584, retval = 1 0 days 02:30:30 File: ssh_sys_fastpath. c : Line: 401 : SSHD: exiting global context 0x0x157dba0 0 days 02:30:30 File: sshd_main. c : Line: 550 : SSHD: host key is corrupt (did not decode). In this case, the authentication credentials were invalid and should be regenerated. Disabling Insecure Access To disable insecure access to the SONY managed switch, issue the following command: # no telnet Note: Caution should be exercised before issuing this command as once the active telnet sessions are terminated, no new telnet sessions will be allowed. Please consult the appropriate Command Reference for more information on configuring remote sessions. Configuring Secure Socket Layer Optionally or in concert with SSH, SSL may be enabled. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE SONY VAIO VGN-Z790Y




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual SONY VAIO VGN-Z790Y will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.