Chapter 12
| Security Measures
Configuring the Secure Shell
–
272
–
e.
The switch compares the checksum sent from the client against that
computed for the original string it sent. If the two checksums match,
this means that the client's private key corresponds to an authorized
public key, and the client is authenticated.
Authenticating SSH v2 Clients
a.
The client first queries the switch to determine if DSA public key
authentication using a preferred algorithm is acceptable.
b.
If the specified algorithm is supported by the switch, it notifies the
client to proceed with the authentication process. Otherwise, it rejects
the request.
c.
The client sends a signature generated using the private key to the
switch.
d.
When the server receives this message, it checks whether the supplied
key is acceptable for authentication, and if so, it then checks whether
the signature is correct. If both checks succeed, the client is
authenticated.
Note:
The SSH server supports up to eight client sessions. The maximum number
of client sessions includes both current Telnet sessions and SSH sessions.
Note:
The SSH server can be accessed using any configured IPv4 or IPv6 interface
address on the switch.
Configuring the
SSH Server
Use the Security > SSH (Configure Global) page to enable the SSH server and
configure basic settings for authentication.
Note:
You must generate DSA and RSA host keys before enabling the SSH server.
“Generating the Host Key Pair” on page 273
Parameters
These parameters are displayed:
◆
SSH Server Status
–
Allows you to enable/disable the SSH server on the switch.
(Default: Disabled)
◆
Version
–
The Secure Shell version number. Version 2.0 is displayed, but the
switch supports management access via either SSH Version 1.5 or 2.0 clients.
◆
Authentication Timeout
–
Specifies the time interval in seconds that the SSH
server waits for a response from a client during an authentication attempt.
(Range: 1-120 seconds; Default: 120 seconds)
◆
Authentication Retries
–
Specifies the number of authentication attempts
that a client is allowed before authentication fails and the client has to restart
the authentication process. (Range: 1-5 times; Default: 3)
Summary of Contents for GEL-5261
Page 14: ...14 Contents Glossary 551 Index 559...
Page 26: ...26 Figures...
Page 30: ...30 Section I Getting Started...
Page 42: ...42 Section II Web Configuration IP Services on page 527...
Page 45: ...Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface 45 Figure 1 Dashboard...
Page 62: ...62 Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface...
Page 180: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 180...
Page 208: ...Chapter 8 Congestion Control Storm Control 208 Figure 121 Configuring Storm Control...
Page 228: ...228 Chapter 10 Quality of Service Attaching a Policy Map to a Port...
Page 332: ...Chapter 12 Security Measures ARP Inspection 332 Figure 207 Displaying the ARP Inspection Log...
Page 436: ...Chapter 13 Basic Administration Protocols LBD Configuration 436...
Page 488: ...488 Chapter 14 Multicast Filtering Filtering MLD Query Packets on an Interface...
Page 498: ...Chapter 15 IP Tools Address Resolution Protocol 498...
Page 517: ...517 Chapter 16 IP Configuration Setting the Switch s IP Address IP Version 6 interface...
Page 542: ...540 Section III Appendices...
Page 560: ...Glossary 558...
Page 570: ...568 Index E062017 ST R01...