
C
HAPTER
14
| Security Measures
Configuring the Secure Shell
– 306 –
5.
Enable SSH Service
– On the SSH Settings page, enable the SSH server
on the switch.
6.
Authentication – One of the following authentication methods is
employed:
Password Authentication (for SSH v1.5 or V2 Clients)
a.
The client sends its password to the server.
b.
The switch compares the client's password to those stored in
memory.
c.
If a match is found, the connection is allowed.
N
OTE
:
To use SSH with only password authentication, the host public key
must still be given to the client, either during initial connection or manually
entered into the known host file. However, you do not need to configure
the client’s keys.
Public Key Authentication
– When an SSH client attempts to contact the
switch, the SSH server uses the host key pair to negotiate a session
key and encryption method. Only clients that have a private key
corresponding to the public keys stored on the switch can access it. The
following exchanges take place during this process:
Authenticating SSH v1.5 Clients
a.
The client sends its RSA public key to the switch.
b.
The switch compares the client's public key to those stored in
memory.
c.
If a match is found, the switch uses its secret key to generate a
random 256-bit string as a challenge, encrypts this string with
the user’s public key, and sends it to the client.
d.
The client uses its private key to decrypt the challenge string,
computes the MD5 checksum, and sends the checksum back to
the switch.
e.
The switch compares the checksum sent from the client against
that computed for the original string it sent. If the two
checksums match, this means that the client's private key
corresponds to an authorized public key, and the client is
authenticated.
Authenticating SSH v2 Clients
a.
The client first queries the switch to determine if DSA public key
authentication using a preferred algorithm is acceptable.
b.
If the specified algorithm is supported by the switch, it notifies
the client to proceed with the authentication process. Otherwise,
it rejects the request.
c.
The client sends a signature generated using the private key to
the switch.
d.
When the server receives this message, it checks whether the
supplied key is acceptable for authentication, and if so, it then
Summary of Contents for DG-FS4526E
Page 4: ...ABOUT THIS GUIDE 4...
Page 34: ...CONTENTS 34...
Page 50: ...TABLES 50...
Page 52: ...SECTION I Getting Started 52...
Page 62: ...CHAPTER 1 Introduction System Defaults 62...
Page 80: ...CHAPTER 2 Initial Switch Configuration Managing System Files 80...
Page 82: ...SECTION II Web Configuration 82...
Page 100: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 100...
Page 128: ...CHAPTER 4 Basic Management Tasks Resetting the System 128...
Page 166: ...CHAPTER 5 Interface Configuration VLAN Trunking 166...
Page 198: ...CHAPTER 6 VLAN Configuration Configuring VLAN Mirroring 198...
Page 516: ...CHAPTER 17 IP Services Displaying the DNS Cache 516...
Page 562: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 562...
Page 652: ...CHAPTER 22 SNMP Commands 652...
Page 660: ...CHAPTER 23 Remote Monitoring Commands 660...
Page 714: ...CHAPTER 24 Authentication Commands Management IP Filter 714...
Page 802: ...CHAPTER 27 Interface Commands 802...
Page 824: ...CHAPTER 29 Port Mirroring Commands RSPAN Mirroring Commands 824...
Page 846: ...CHAPTER 32 Address Table Commands 846...
Page 874: ...CHAPTER 33 Spanning Tree Commands 874...
Page 886: ...CHAPTER 34 ERPS Commands 886...
Page 928: ...CHAPTER 35 VLAN Commands Configuring Voice VLANs 928...
Page 942: ...CHAPTER 36 Class of Service Commands Priority Commands Layer 3 and 4 942...
Page 998: ...CHAPTER 38 Multicast Filtering Commands Multicast VLAN Registration 998...
Page 1022: ...CHAPTER 39 LLDP Commands 1022...
Page 1064: ...CHAPTER 40 CFM Commands 1064...
Page 1084: ...CHAPTER 42 Domain Name Service Commands 1084...
Page 1090: ...CHAPTER 43 DHCP Commands DHCP Client 1090...
Page 1122: ...CHAPTER 44 IP Interface Commands IPv6 Interface 1122...
Page 1124: ...SECTION IV Appendices 1124...
Page 1130: ...APPENDIX A Software Specifications Management Information Bases 1130...
Page 1152: ...COMMAND LIST 1152...
Page 1161: ......
Page 1162: ...DG FS4526E 042012 HW R01...