Chapter 12
| Security Measures
Configuring the Secure Shell
– 258 –
Generating the
Host Key Pair
Use the Security > SSH (Configure Host Key - Generate) page to generate a host
public/private key pair used to provide secure communications between an SSH
client and the switch. After generating this key pair, you must provide the host
public key to SSH clients and import the client’s public key to the switch as
described in the section
“Importing User Public Keys” on page 259
Note:
A host key pair must be configured on the switch before you can enable the
SSH server. See
“Configuring the SSH Server” on page 256
Parameters
These parameters are displayed:
◆
Host-Key Type
– The key type used to generate the host key pair (i.e., public
and private keys). (Range: RSA (Version 1), DSA (Version 2), Both; Default: Both)
The SSH server uses RSA or DSA for key exchange when the client first
establishes a connection with the switch, and then negotiates with the client to
select either DES (56-bit) or 3DES (168-bit) for data encryption.
Note:
The switch uses only RSA Version 1 for SSHv1.5 clients and DSA Version 2 for
SSHv2 clients.
◆
Save
– Saves the host key from RAM (i.e., volatile memory) to flash memory.
Otherwise, the host key pair is stored to RAM by default. Note that you must
select this item from the Show page. (Default: Disabled)
Web Interface
To generate the SSH host key pair:
1.
Click Security, SSH.
2.
Select Configure Host Key from the Step list.
3.
Select Generate from the Action list.
4.
Select the host-key type from the drop-down box.
5.
Click Apply.
Figure 164: Generating the SSH Host Key Pair
Summary of Contents for GEL-1061
Page 14: ...Contents 14...
Page 28: ...Section I Getting Started 28...
Page 38: ...Chapter 1 Introduction System Defaults 38...
Page 40: ...Section II Web Configuration 40...
Page 60: ...Chapter 2 Using the Web Interface Navigating the Web Browser Interface 60...
Page 164: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 164...
Page 192: ...Chapter 8 Congestion Control Storm Control 192...
Page 204: ...Chapter 9 Class of Service Layer 3 4 Priority Settings 204...
Page 216: ...Chapter 10 Quality of Service Attaching a Policy Map to a Port 216...
Page 430: ...Chapter 14 Multicast Filtering MLD Snooping Snooping and Query for IPv4 430...
Page 436: ...Chapter 15 IP Tools Address Resolution Protocol 436...
Page 474: ...Section III Appendices 474...
Page 492: ...Glossary 492...
Page 500: ...E052016 ST R02 150200001416A...