PointRed Telecom Ltd. MCRD-2458 Manuale Utente
M i c r o R e d & M i c r o V i e w N M S U s e r M a n u a l v 1 . 0
Page 133
Select the HTTP Enable checkbox to enable HTTP
Port
The Port field contains the router port that the HTTP module listens to for HTTP
requests (default 80). Typically you will not have to change this value.
The Port field contains the router port that the HTTP module listens to for HTTP
requests (default 80). Typically you will not have to change this value.
Upload SSL Certificate
Click Upload SSL Certificate to open a Select dialog box and upload your own
SSL certificate for Secure HTTP requests (HTTPS). A default certificate is included
in every newly installed MicroRed.
Click Upload SSL Certificate to open a Select dialog box and upload your own
SSL certificate for Secure HTTP requests (HTTPS). A default certificate is included
in every newly installed MicroRed.
Upload Key File
Click Upload Key File to open a Select dialog box and upload your own keys
file for Secure HTTP requests (HTTPS). A default file is included in every newly
installed MicroRed.
Click Upload Key File to open a Select dialog box and upload your own keys
file for Secure HTTP requests (HTTPS). A default file is included in every newly
installed MicroRed.
Submit
Click Submit to apply the configuration.
Click Submit to apply the configuration.
Figure 136. HTTP Service Configuration
11.3.
Configuring SSH Settings
Developed by SSH Communications Security Ltd., Secure Shell is a program to
log into another computer over a network, to execute commands in a remote
machine, and to move files from one machine to another. It provides strong
authentication and secure communications over insecure channels.
log into another computer over a network, to execute commands in a remote
machine, and to move files from one machine to another. It provides strong
authentication and secure communications over insecure channels.
SSH protects a network from attacks such as IP spoofing, IP source routing, and
DNS spoofing. An attacker who has managed to take over a network can only
force SSH to disconnect. He or she cannot play back the traffic or hijack the
connection when
DNS spoofing. An attacker who has managed to take over a network can only
force SSH to disconnect. He or she cannot play back the traffic or hijack the
connection when
encryption
is enabled.