SSH Terminal Services
507
way: The RSA public key of the client user is configured at the server. The client
first sends the member modules of its RSA public key to the server, which checks
its validity. If it is valid, the server generates a random number, which is sent to the
client after being encrypted with RSA public key. Both ends calculate
authentication data based on the random number and session ID. The client sends
the authentication data calculated back to the server, which compares it with its
attention data obtained locally. If they match exactly, the user is allowed to access
the Switch. Otherwise, authentication process fails.
■
Session request stage: The client sends session request messages to the server
which processes the request messages.
■
Interactive session stage: Both ends exchange data till the session ends.
Session packets are encrypted in transfer and the session key is generated
randomly. Encryption is used in exchanging session key and RSA authentication
achieves key exchange without transfer over the network. SSH can protect
server-client data security. The authentication will also start even if the username
received is not configured at the server, so malicious intruders cannot judge
whether a username they key in exists or not. This is also a way to protect a
username.
Configuring SSH Server
Basic configuration tasks refer to those required for successful connection from SSH
client to SSH server, which advanced configuration tasks are those modifying SSH
parameters.
Configuration tasks on the SSH server include:
■
Setting system protocol and link maximum
■
Configuring and deleting local RSA key pair
■
Configuring authentication type
■
Defining update interval of server key
■
Defining SSH authentication timeout value
■
Defining SSH authentication retry value
■
Entering public key view and editing public key
■
Associating public key with SSH user
Setting System Protocol
You must specify SSH protocol for the system before enabling SSH.
Perform the following configuration in System View.
Table 577
Setting System Protocols and Link Maximum
By default, the system supports Telnet and SSH protocols.
If SSH protocol is specified, to ensure a successful login, you must configure the AAA
authentication using the
authentication-mode scheme
command. The
protocol
inbound ssh
configuration fails if you configure
authentication-mode password
and
authentication-mode none
. When you configure SSH protocol successfully for
the user interface, then you cannot configure
authentication-mode password
and
authentication-mode none
any more.
Operation
Command
Set system protocol and link maximum
protocol inbound { all | ssh | telnet }
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...