![Cisco 350XG series Administration Manual Download Page 509](http://html.mh-extra.com/html/cisco/350xg-series/350xg-series_administration-manual_67491509.webp)
Security: SSH Client
Overview
Cisco 350XG & 550XG Series 10G Stackable Managed Switches
490
23
SSH Server Authentication
A device, as an SSH client, only communicates with a trusted SSH server. When
SSH server authentication is disabled (the default setting), any SSH server is
considered trusted. When SSH server authentication is enabled, the user must
add an entry for the trusted servers to the Trusted SSH Servers Table. This table
stores the following information per each SSH Trusted server for a maximum of 16
servers, and contains the following information:
•
Server IP address/host name
•
Server public key fingerprint
When SSH server authentication is enabled, the SSH client running on the device
authenticates the SSH server using the following authentication process:
•
The device calculates the fingerprint of the received SSH server’s public
key.
•
The device searches the SSH Trusted Servers table for the SSH server’s IP
address/host name. One of the following can occur:
-
If a match is found, both for the server’s IP address/host name and its
fingerprint, the server is authenticated.
-
If a matching IP address/host name is found, but there is no matching
fingerprint, the search continues. If no matching fingerprint is found, the
search is completed and authentication fails.
-
If no matching IP address/host name is found, the search is completed
and authentication fails.
•
If the entry for the SSH server is not found in the list of trusted servers, the
process fails.
In order to support auto configuration of an out-of-box device (device with factory
default configuration), SSH server authentication is disabled by default.
SSH User Authentication
When a device (SSH client) attempts to establish a SSH session to a SSH server,
the SSH server uses various methods for client authentication. These are
described below.