![Asante IC40240-10G User Manual Download Page 145](http://html.mh-extra.com/html/asante/ic40240-10g/ic40240-10g_user-manual_2980494145.webp)
d.
The client uses its private key to decrypt the challenge string, computes the
MD5 checksum, and sends the checksum back to the switch.
e.
The switch compares the checksum sent from the client against that
computed for the original string it sent. If the two checksums match, this
means that the client's private key corresponds to an authorized public key,
and the client is authenticated.
Authenticating SSH v2 Clients
a.
The client first queries the switch to determine if DSA public key
authentication using a preferred algorithm is acceptable.
b. If the specified algorithm is supported by the switch, it notifies the client to
proceed with the authentication process. Otherwise, it rejects the request.
c.
The client sends a signature generated using the private key to the switch.
d.
When the server receives this message, it checks whether the supplied key
is acceptable for authentication, and if so, it then checks whether the
signature is correct. If both checks succeed, the client is authenticated.
Note:
The SSH server supports up to four client sessions. The maximum number of
client sessions includes both current Telnet sessions and SSH sessions.
Generating the Host Key Pair
A host public/private key pair is used to provide secure communications between an
SSH client and the switch. After generating this key pair, you must provide the host
public key to SSH clients and import the client’s public key to the switch as
described in the preceding section (Command Usage).
Field Attributes
•
Public-Key of Host-Key
– The public key for the host.
- RSA: The first field indicates the size of the host key (e.g., 1024), the second
field is the encoded public exponent (e.g., 65537), and the last string is the
encoded modulus.
-
DSA: The first field indicates that the encryption method used by SSH is based
on the Digital Signature Standard (DSS). The last string is the encoded modulus.
•
Host-Key Type
– The key type used to generate the host key pair (i.e., public and
private keys). (Range: RSA, DSA, Both: Default: Both)
The SSH server uses RSA or DSA for key exchange when the client first
establishes a connection with the switch, and then negotiates with the client to
select either DES (56-bit) or 3DES (168-bit) for data encryption.
6-10
User Authentication
6
Summary of Contents for IC40240-10G
Page 1: ...IntraCore 40240 40480 10G Layer 3 Gigabit Stackable Ethernet Switch User s Manual ...
Page 4: ...IC40240 10G 99 00837 IC40480 10G 99 00836 ...
Page 6: ...ii ...
Page 33: ...Getting Started ...
Page 43: ...1 1 10 Introduction ...
Page 61: ...2 2 18 Initial Configuration ...
Page 63: ...Switch Management ...
Page 75: ...3 3 12 Configuring the Switch ...
Page 117: ...4 4 42 Basic Management Tasks ...
Page 163: ...6 6 28 User Authentication ...
Page 175: ...7 7 12 Access Control Lists ...
Page 283: ...14 14 8 Quality of Service ...
Page 293: ...15 15 10 Multicast Filtering ...
Page 299: ...16 16 6 Domain Name Service ...
Page 309: ...17 17 10 Dynamic Host Configuration Protocol ...
Page 319: ...18 18 10 Configuring Router Redundancy ...
Page 343: ...19 19 24 IP Routing ...
Page 355: ...Web Click Routing Protocol RIP Statistics Figure 20 5 RIP Statistics 20 12 Unicast Routing 20 ...
Page 385: ...20 20 42 Unicast Routing ...
Page 387: ...Command Line Interface ...
Page 399: ...21 21 12 Overview of the Command Line Interface ...
Page 465: ...24 24 16 SNMP Commands ...
Page 519: ...26 26 18 Access Control List Commands ...
Page 545: ...30 30 2 Rate Limit Commands ...
Page 611: ...34 34 24 VLAN Commands ...
Page 625: ...35 35 14 Class of Service Commands ...
Page 633: ...36 7 police 36 ...
Page 670: ...39 39 16 DHCP Commands ...
Page 716: ...41 41 36 IP Interface Commands ...
Page 768: ...42 42 52 IP Routing Commands ...
Page 770: ...Appendices ...
Page 791: ......
Page 792: ...IC40240 10G IC40480 10G ...