3com 2928 User Guide

Page of 505
 
1-1 
1  
Service Management 
Overview 
The service management module provides six types of services: FTP, Telnet, SSH, SFTP, HTTP and 
HTTPS. You can enable or disable the services as needed. In this way, the performance and security of 
the system can be enhanced, thus secure management of the device can be achieved. 
The service management module also provides the function to modify HTTP and HTTPS port numbers, 
and the function to associate the FTP, HTTP, or HTTPS service with an ACL, thus reducing attacks of 
illegal users on these services. 
FTP service 
The File Transfer Protocol (FTP) is an application layer protocol for sharing files between server and 
client over a TCP/IP network. 
Telnet service 
The Telnet protocol is an application layer protocol that provides remote login and virtual terminal 
functions on the network. 
SSH service 
Secure Shell (SSH) offers an approach to securely logging in to a remote device. By encryption and 
strong authentication, it protects devices against attacks such as IP spoofing and plain text password 
interception.  
SFTP service 
The secure file transfer protocol (SFTP) is a new feature in SSH2.0. SFTP uses the SSH connection to 
provide secure data transfer. The device can serve as the SFTP server, allowing a remote user to log in 
to the SFTP server for secure file management and transfer. The device can also serve as an SFTP 
client, enabling a user to login from the device to a remote device for secure file transfer. 
HTTP service 
The Hypertext Transfer Protocol (HTTP) is used for transferring web page information across the 
Internet. It is an application-layer protocol in the TCP/IP protocol suite.  
You can log in to the device using the HTTP protocol with HTTP service enabled, accessing and 
controlling the device with Web-based network management. 
HTTPS service 
The Secure HTTP (HTTPS) refers to the HTTP protocol that supports the Security Socket Layer (SSL) 
protocol. 
The SSL protocol of HTTPS enhances the security of the device in the following ways: 
z
 
Uses the SSL protocol to ensure the legal clients to access the device securely and prohibit the 
illegal clients;