Securing Controller-to-Controller Communication

xSec can be used to secure data and control traffic passed between two Dell controllers. The only requirement is that both Dell controllers be members of the same VLAN. To establish a point-to-point tunnel between the two Dell controllers, you need to configure the following for the connecting ports on each controller:

The MAC address of the xSec tunnel termination point. This would be the MAC address of the “other” controller.

A 16-byte shared key used to authenticate the Dell controllers to each other. You must configure the same shared key on both Dell controllers.

The VLAN IDs for the VLANs that will extend across both the Dell controllers via the xSec. Figure 279 shows an example network where two Dell controllers are connected to the same VLAN, VLAN 1. On controller 1, you configure the MAC address of controller 2 for the xSec tunnel termination point. On controller 2, you configure the MAC address of controller 1 for the xSec tunnel termination point. On both Dell controllers, you configure the same 16-byte shared key and the IDs for the VLANs which are allowed to pass through the xSec tunnel.

Figure 279: Controller-to-Controller xSec Example

Configuring Controllers for xSec

The following sections describe how to use the WebUI or CLI to configure the port that connects to the wired network on which the other controller is installed. Other chapters in this manual describe the configuration of VLANs.

In the WebUI

1.On each controller, navigate to the Configuration > Network > Port page.

2.Click on the port to be configured.

3.Select the VLAN from the drop-down list.

4.Configure the xSec point-to-point settings:

a.Enter the MAC address of the tunnel termination point (the “other” controller’s MAC address).

b.Enter the key (for example, 1234567898765432) used by xSec to establish the tunnel between the Dell controllers.

c.Select the VLANs that would be allowed across the point-to-point connection from the Allowed VLANs drop- down menu, and click the <-- button.

5.Click Apply.

In the CLI

For Controller 1:

interface gigabitethernetfastethernet slot/port vlan 1

xsec point-to-point 10:11:12:13:14:15 1234567898765432 allowed vlan 101,200,250

For Controller 2:

interface gigabitethernetfastethernet slot/port

677 Advanced Security

Dell PowerConnect W-Series ArubaOS 6.2 User Guide

Page 677
Image 677
Dell 6.2 manual Securing Controller-to-Controller Communication, Configuring Controllers for xSec, For Controller

6.2 specifications

Dell 6.2 is an advanced enterprise solution that caters to the needs of businesses seeking robust performance and efficiency. As a part of Dell's commitment to innovation, the 6.2 series combines cutting-edge technologies and features that enhance productivity and deliver reliable computing experiences.

One of the standout features of the Dell 6.2 is its impressive processing power. Equipped with the latest Intel processors, it offers exceptional speed and multitasking capabilities. This allows businesses to run demanding applications effortlessly, making it ideal for data-intensive tasks such as data analysis, software development, and virtualization. The series also supports substantial RAM configurations, enabling users to manage extensive workloads without experiencing slowdowns.

In terms of storage, the Dell 6.2 line includes advanced SSD options that significantly boost data access speeds compared to traditional hard drives. This rapid access to information is vital for businesses that require quick retrieval of large datasets. Furthermore, the devices support RAID configurations, which enhances data redundancy and security, protecting critical business information from loss.

Connectivity is another critical aspect of the Dell 6.2 series. It includes multiple USB ports, HDMI outputs, and high-speed Ethernet options, ensuring that users can easily connect to various peripherals and networks. The integration of Wi-Fi 6 technology enables faster wireless connections, resulting in improved internet speeds and bandwidth efficiency, which is crucial in today’s increasingly connected workplaces.

Dell has also prioritized security in the 6.2 series. It features enhanced biometric authentication and advanced encryption methods, safeguarding sensitive data from unauthorized access. Additionally, the system's BIOS protection and automatic updates provide an added layer of security, ensuring that the device remains safe from emerging threats.

The design of the Dell 6.2 is not only sleek and modern but also built for durability. Its robust chassis is engineered to withstand the rigors of daily use, making it suitable for various business environments. This durability ensures that the investment in Dell 6.2 will last for years while maintaining performance integrity.

In summary, the Dell 6.2 series embodies a blend of speed, storage efficiency, connectivity, and security, making it a top choice for enterprises looking to enhance their computing capabilities. With its modern features and durable design, Dell 6.2 is positioned as a reliable partner in driving business success.