Secure Shell Commands
41-17
41
c.If a match is found, the switch uses its secret key to generate a random
256-bit string as a challenge, encrypts this string with the user’s public key,
and sends it to the client.
d.The client uses its private key to decrypt the challenge string, computes the
MD5 checksum, and sends the checksum back to the switch.
e.The switch compares the checksum sent from the client against that
computed for the original string it sent. If the two checksums match, this
means that the client's private key corresponds to an authorized public key,
and the client is authenticated.
Authenticating SSH v2 Clients
a.The client first queries the switch to determine if DSA public key
authentication using a preferred algorithm is acceptable.
b.If the specified algorithm is supported by the switch, it notifies the client to
proceed with the authentication process. Otherwise, it rejects the request.
c.The client sends a signature generated using the private key to the switch.
d.When the server receives this message, it checks whether the supplied key is
acceptable for authentication, and if so, it then checks whether the signature
is correct. If both checks succeed, the client is authenticated.
Note:
The SSH server supports up to four client sessions. The maximum number of
client sessions includes both current Telnet sessions and SSH sessions.
ip ssh server
This command enables the Secure Shell (SSH) server on this switch. Use the
no
form to disable this service.
Syntax
[
no
]
ip ssh server
Default Setting
Disabled
Command Mode
Global Configuration
Command Usage
• The SSH server supports up to four client sessions. The maximum number of
client sessions includes both current Telnet sessions and SSH sessions.
• The SSH server uses DSA or RSA for key exchange when the client first
establishes a connection with the switch, and then negotiates with the client
to select either DES (56-bit) or 3DES (168-bit) for data encryption.
• You must generate DSA and RSA host keys before enabling the SSH server.
Summary of Contents for Direk Tronik 24/48-Port
Page 2: ......
Page 4: ...ES4524D ES4548D F0 0 0 4 E112006 CS R01 149100030400A...
Page 22: ...xxii Tables...
Page 26: ...xxvi Figures...
Page 28: ...Getting Started...
Page 50: ...Initial Configuration 2 14 2...
Page 52: ...Switch Management Configuring Domain Name Service 29 1 Switch Clustering 30 1...
Page 68: ...Basic System Settings 4 8 4...
Page 118: ...Simple Network Management Protocol 11 18 11...
Page 142: ...Configuring 802 1X Port Authentication 14 8 14...
Page 154: ...Access Control Lists 15 12 15...
Page 232: ...Configuring Protocol Based VLANs 25 4 25...
Page 252: ...Quality of Service 27 8 27...
Page 282: ...Using the Command Line Interface 31 10 31...
Page 290: ...General Commands 33 6 33...
Page 300: ...System Management Commands 34 10 34...
Page 308: ...File Management Commands 35 8 35...
Page 326: ...Event Logging Commands 37 8 37...
Page 336: ...Time Commands 39 6 39...
Page 406: ...Access Control List Commands 44 18 44...
Page 418: ...Interface Commands 45 12 45...
Page 432: ...Broadcast Storm Control Commands 47 2 47...
Page 436: ...Rate Limit Commands 49 2 49...
Page 478: ...VLAN Commands 52 18 52...
Page 508: ...Quality of Service Commands 56 10 56...
Page 518: ...Multicast Filtering Commands 57 10 57...
Page 532: ...IPv4 Interface Commands 59 6 59...
Page 560: ...IPv6 Interface Commands 60 28 60...
Page 566: ...Switch Cluster Commands 61 6 61...
Page 568: ...Appendices...
Page 582: ...Glossary Glossary 8...
Page 587: ......
Page 588: ...ES4524D ES4548D E112006 CS R01 149100030400A...