– 292 –
C
HAPTER
14
| Security Measures
Configuring the Secure Shell
C
ONFIGURING THE
S
ECURE
S
HELL
The Berkeley-standard includes remote access tools originally designed for
Unix systems. Some of these tools have also been implemented for
Microsoft Windows and other environments. These tools, including
commands such as
rlogin
(remote login),
rsh
(remote shell), and
rcp
(remote copy), are not secure from hostile attacks.
The Secure Shell (SSH) includes server/client applications intended as a
secure replacement for the older Berkeley remote access tools. SSH can
also provide remote management access to this switch as a secure
replacement for Telnet. When the client contacts the switch via the SSH
protocol, the switch generates a public-key that the client uses along with a
local user name and password for access authentication. SSH also encrypts
all data transfers passing between the switch and SSH-enabled
management station clients, and ensures that data traveling over the
network arrives unaltered.
N
OTE
:
You need to install an SSH client on the management station to
access the switch for management via the SSH protocol.
N
OTE
:
The switch supports both SSH Version 1.5 and 2.0 clients.
C
OMMAND
U
SAGE
The SSH server on this switch supports both password and public key
authentication. If password authentication is specified by the SSH client,
then the password can be authenticated either locally or via a RADIUS or
remote authentication server, as specified on the System
Authentication page (
page 261
). If public key authentication is specified by
the client, then you must configure authentication keys on both the client
and the switch as described in the following section. Note that regardless of
whether you use public key or password authentication, you still have to
generate authentication keys on the switch (SSH Host Key Settings) and
enable the SSH server (Authentication Settings).
To use the SSH server, complete these steps:
1.
Generate a Host Key Pair
– On the SSH Host Key Settings page, create
a host public/private key pair.
2.
Provide Host Public Key to Clients
– Many SSH client programs
automatically import the host public key during the initial connection
setup with the switch. Otherwise, you need to manually create a known
hosts file on the management station and place the host public key in
it. An entry for a public key in the known hosts file would appear similar
to the following example:
10.1.0.54 1024 35
15684995401867669259333946775054617325313674890836547254
15020245593199868544358361651999923329781766065830956
10825913212890233 76546801726272571413428762941301196195566782
59566410486957427888146206519417467729848654686157177393901647
Summary of Contents for LGB6026A
Page 6: ...ABOUT THIS GUIDE 4...
Page 40: ...38 CONTENTS...
Page 60: ...58 SECTION I Getting Started...
Page 86: ...84 SECTION II Web Configuration Unicast Routing on page 517 Multicast Routing on page 575...
Page 162: ...160 CHAPTER 5 Interface Configuration VLAN Trunking...
Page 196: ...194 CHAPTER 6 VLAN Configuration Configuring MAC based VLANs...
Page 204: ...CHAPTER 7 Address Table Settings Clearing the Dynamic Address Table 202...
Page 238: ...CHAPTER 11 Class of Service Layer 2 Queue Settings 236...
Page 254: ...252 CHAPTER 12 Quality of Service Attaching a Policy Map to a Port...
Page 448: ...446 CHAPTER 16 Multicast Filtering Multicast VLAN Registration...
Page 470: ...468 CHAPTER 17 IP Configuration Setting the Switch s IP Address IP Version 6...
Page 576: ...574 CHAPTER 21 Unicast Routing Configuring the Open Shortest Path First Protocol Version 2...
Page 606: ...604 CHAPTER 22 Multicast Routing Configuring PIMv6 for IPv6...
Page 620: ...618 CHAPTER 23 Using the Command Line Interface CLI Command Groups...
Page 672: ...670 CHAPTER 25 System Management Commands Time Range...
Page 692: ...690 CHAPTER 26 SNMP Commands...
Page 700: ...698 CHAPTER 27 Remote Monitoring Commands...
Page 854: ...CHAPTER 34 Port Mirroring Commands Local Port Mirroring Commands 852...
Page 862: ...860 CHAPTER 36 Address Table Commands...
Page 958: ...956 CHAPTER 40 Quality of Service Commands...
Page 1034: ...1032 CHAPTER 42 LLDP Commands...
Page 1044: ...1042 CHAPTER 43 Domain Name Service Commands...
Page 1062: ...1060 CHAPTER 44 DHCP Commands DHCP Server...
Page 1206: ...CHAPTER 47 IP Routing Commands Open Shortest Path First OSPFv3 1204...
Page 1250: ...1248 SECTION IV Appendices...
Page 1256: ...1254 APPENDIX A Software Specifications Management Information Bases...
Page 1278: ...1276 COMMAND LIST...