C
HAPTER
14
| Security Measures
Configuring the Secure Shell
– 300 –
ES-4500G Series
C
ONFIGURING
THE
S
ECURE
S
HELL
The Berkeley-standard includes remote access tools originally designed for
Unix systems. Some of these tools have also been implemented for
Microsoft Windows and other environments. These tools, including
commands such as
rlogin
(remote login),
rsh
(remote shell), and
rcp
(remote copy), are not secure from hostile attacks.
The Secure Shell (SSH) includes server/client applications intended as a
secure replacement for the older Berkeley remote access tools. SSH can
also provide remote management access to this switch as a secure
replacement for Telnet. When the client contacts the switch via the SSH
protocol, the switch generates a public-key that the client uses along with a
local user name and password for access authentication. SSH also encrypts
all data transfers passing between the switch and SSH-enabled
management station clients, and ensures that data traveling over the
network arrives unaltered.
N
OTE
:
You need to install an SSH client on the management station to
access the switch for management via the SSH protocol.
N
OTE
:
The switch supports both SSH Version 1.5 and 2.0 clients.
C
OMMAND
U
SAGE
The SSH server on this switch supports both password and public key
authentication. If password authentication is specified by the SSH client,
then the password can be authenticated either locally or via a RADIUS or
remote authentication server, as specified on the System
Authentication page (
). If public key authentication is specified by
the client, then you must configure authentication keys on both the client
and the switch as described in the following section. Note that regardless of
whether you use public key or password authentication, you still have to
generate authentication keys on the switch (SSH Host Key Settings) and
enable the SSH server (Authentication Settings).
To use the SSH server, complete these steps:
1.
Generate a Host Key Pair
– On the SSH Host Key Settings page, create
a host public/private key pair.
2.
Provide Host Public Key to Clients
– Many SSH client programs
automatically import the host public key during the initial connection
setup with the switch. Otherwise, you need to manually create a known
hosts file on the management station and place the host public key in
it. An entry for a public key in the known hosts file would appear similar
to the following example:
10.1.0.54 1024 35
15684995401867669259333946775054617325313674890836547254
15020245593199868544358361651999923329781766065830956
10825913212890233 76546801726272571413428762941301196195566782
59566410486957427888146206519417467729848654686157177393901647
Summary of Contents for iPECS ES-4526G
Page 1: ...USER GUIDE User Manual ES 4550G ES 4526G Managed Layer 3 Stackable GE Switch ...
Page 38: ...CONTENTS 38 ES 4500G Series ...
Page 58: ...SECTION I Getting Started 58 ES 4500G Series ...
Page 70: ...CHAPTER 1 Introduction System Defaults 70 ES 4500G Series ...
Page 86: ...SECTION I Web Configuration 86 ES 4500G Series Multicast Filtering on page 413 ...
Page 196: ...CHAPTER 6 VLAN Configuration Configuring MAC based VLANs 196 ES 4500G Series ...
Page 204: ...CHAPTER 7 Address Table Settings Clearing the Dynamic Address Table 204 ES 4500G Series ...
Page 228: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 228 ES 4500G Series ...
Page 230: ...CHAPTER 9 Rate Limit Configuration 230 ES 4500G Series Figure 106 Configuring Rate Limits ...
Page 260: ...CHAPTER 12 Quality of Service Attaching a Policy Map to a Port 260 ES 4500G Series ...
Page 478: ...CHAPTER 17 IP Configuration Setting the Switch s IP Address IP Version 6 478 ES 4500G Series ...
Page 528: ...CHAPTER 20 IP Services Forwarding UDP Service Requests 528 ES 4500G Series ...
Page 614: ...CHAPTER 22 Multicast Routing Configuring PIMv6 for IPv6 614 ES 4500G Series ...
Page 628: ...CHAPTER 23 Using the Command Line Interface CLI Command Groups 628 ES 4500G Series ...
Page 702: ...CHAPTER 26 SNMP Commands 702 ES 4500G Series ...
Page 710: ...CHAPTER 27 Remote Monitoring Commands 710 ES 4500G Series ...
Page 868: ...CHAPTER 34 Port Mirroring Commands Local Port Mirroring Commands 868 ES 4500G Series ...
Page 890: ...CHAPTER 37 Address Table Commands 890 ES 4500G Series ...
Page 1066: ...CHAPTER 43 LLDP Commands 1066 ES 4500G Series ...
Page 1076: ...CHAPTER 44 Domain Name Service Commands 1076 ES 4500G Series ...
Page 1286: ...CHAPTER 49 Multicast Routing Commands PIM Multicast Routing 1286 ES 4500G Series ...
Page 1288: ...SECTION I Appendices 1288 ES 4500G Series ...
Page 1294: ...APPENDIX A Software Specifications Management Information Bases 1294 ES 4500G Series ...
Page 1327: ...ES 4526G ES 4550G E042011 ST R01 150200000149A ...
Page 1328: ...APRIL 2011 ISSUE 1 0 ...