i
Table of Contents
1 SSH Configuration·····································································································································1-1
SSH Overview·········································································································································1-1
Introduction to SSH ·························································································································1-1
Algorithm and Key ···························································································································1-1
Asymmetric Key Algorithm ··············································································································1-2
SSH Operating Process ··················································································································1-2
SSH Server and Client Configuration Task List······················································································1-4
Configuring the SSH Server····················································································································1-4
Configuring the User Interfaces for SSH Clients·············································································1-5
Configuring the SSH Management Functions ·················································································1-6
Configuring the SSH Server to Be Compatible with SSH1 Clients ·················································1-7
Generating/Destroying Key Pairs ····································································································1-7
Creating an SSH User and Specifying an Authentication Type ······················································1-8
Specifying a Service Type for an SSH User····················································································1-9
Configuring the Public Key of a Client on the Server ······································································1-9
Assigning a Public Key to an SSH User························································································1-10
Exporting the RSA or DSA Public Key ··························································································1-11
Configuring the SSH Client ···················································································································1-12
SSH Client Configuration Task List ·······························································································1-12
Configuring an SSH Client that Runs SSH Client Software ··························································1-12
Configuring an SSH Client Assumed by an SSH2-Capable Switch··············································1-18
Displaying and Maintaining SSH Configuration ····················································································1-20
Comparison of SSH Commands with the Same Functions ··································································1-20
SSH Configuration Examples ···············································································································1-21
When Switch Acts as Server for Local Password Authentication ·················································1-21
When Switch Acts as Server for Password and RADIUS Authentication ·····································1-24
When Switch Acts as Server for Password and HWTACACS Authentication ······························1-29
When Switch Acts as Server for Publickey Authentication ···························································1-31
When Switch Acts as Client for Password Authentication ····························································1-37
When Switch Acts as Client for Publickey Authentication·····························································1-38
When Switch Acts as Client and First-Time Authentication is not Supported ····································1-41