114
C
HAPTER
6: C
ONFIGURING
AND
M
ANAGING
IP I
NTERFACES
AND
S
ERVICES
SSH requires an SSH authentication key. You can generate one or allow
MSS to generate one. The first time an SSH client attempts to access the
SSH server on a WX switch, the switch automatically generates a
1024-byte SSH key. If you want to use a 2048-byte key instead, use the
following command to generate one:
WX1200#
crypto generate key ssh 2048
key pair generated
If a key has already been generated, the command replaces the old key
with a new one. The new key takes affect for all new SSH sessions.
You can verify the key using the following command:
display crypto key ssh
For example:
WX1200#
display crypto key ssh
ec:6f:56:7f:d1:fd:c0:28:93:ae:a4:f9:7c:f5:13:04
This command displays the checksum (also called a
fingerprint
) of the
public authentication key. When you initially connect to the WX switch
with an SSH client, you can compare the SSH key checksum displayed by
the WX switch with the one displayed by the client to verify that you
really are connected to the WX switch and not another device. Generally,
SSH clients remember the encryption key after the first connection, so
you need to check the key only once.
The WX switch stores the key in nonvolatile storage where the key
remains even after software reboots.
Adding an SSH User
To log in with SSH, a user must supply a valid username and password. To
add a username and password to the local database, use the following
command:
set user
username
password
password
Optionally, you also can configure MSS either to locally authenticate the
user or to use a RADIUS server to authenticate the user. Use the following
command:
set authentication admin
{
user-glob
}
method1
[
method2
] [
method3
] [
method4
]
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...