Chapter 12
| Security Measures
Configuring the Secure Shell
–
275
–
To display or clear the SSH host key pair:
1.
Click Security, SSH.
2.
Select Configure Host Key from the Step list.
3.
Select Show from the Action list.
4.
Select the option to save the host key from memory to flash by clicking Save, or
select the host-key type to clear and click Clear.
Figure 173: Showing the SSH Host Key Pair
Importing
User Public Keys
Use the Security > SSH (Configure User Key -
Copy) page to upload a user’s public
key to the switch. This public key must be stored on the switch for the user to be
able to log in using the public key authentication mechanism. If the user’s public
key does not exist on the switch, SSH will revert to the interactive password
authentication mechanism to complete authentication.
Parameters
These parameters are displayed:
◆
User Name
–
This drop-down box selects the user
who’s
public key you wish to
manage. Note that you must first create users on the User Accounts page (see
“Configuring User Accounts” on page
◆
User Key Type
–
The type of public key to upload.
■
RSA: The switch accepts a RSA version 1 encrypted public key.
■
DSA: The switch accepts a DSA version 2 encrypted public key.
The SSH server uses RSA or DSA for key exchange when the client first
establishes a connection with the switch, and then negotiates with the client to
select either DES (56-bit) or 3DES (168-bit) for data encryption.
Summary of Contents for GEL-5261
Page 14: ...14 Contents Glossary 551 Index 559...
Page 26: ...26 Figures...
Page 30: ...30 Section I Getting Started...
Page 42: ...42 Section II Web Configuration IP Services on page 527...
Page 45: ...Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface 45 Figure 1 Dashboard...
Page 62: ...62 Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface...
Page 180: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 180...
Page 208: ...Chapter 8 Congestion Control Storm Control 208 Figure 121 Configuring Storm Control...
Page 228: ...228 Chapter 10 Quality of Service Attaching a Policy Map to a Port...
Page 332: ...Chapter 12 Security Measures ARP Inspection 332 Figure 207 Displaying the ARP Inspection Log...
Page 436: ...Chapter 13 Basic Administration Protocols LBD Configuration 436...
Page 488: ...488 Chapter 14 Multicast Filtering Filtering MLD Query Packets on an Interface...
Page 498: ...Chapter 15 IP Tools Address Resolution Protocol 498...
Page 517: ...517 Chapter 16 IP Configuration Setting the Switch s IP Address IP Version 6 interface...
Page 542: ...540 Section III Appendices...
Page 560: ...Glossary 558...
Page 570: ...568 Index E062017 ST R01...