C
ONFIGURING
THE
S
WITCH
3-84
- DSA: The first field indicates that the encryption method used by
SSH is based on the Digital Signature Standard (DSS). The last string
is the encoded modulus.
•
User Name
– The user type used for the public key pair.
•
Public-Key Type
– The key type used to generate the user public key
pair (i.e., public and private keys). (Range: RSA, DSA, Both: Default:
RSA)
The SSH server uses RSA or DSA for key exchange when the client
first establishes a connection with the switch, and then negotiates with
the client to select either DES (56-bit) or 3DES (168-bit) for data
encryption.
•
TFTP Server IP Address
– The TFTP server IP address location for
the public key pair.
•
Source File Name
– The file name used for the public key pair.
•
Copy Public Key
– Save a copy of the public key pair.
•
Delete
– This button deletes the user public key process.
Summary of Contents for 6128L2
Page 2: ......
Page 21: ...CONTENTS xvii Glossary Index ...
Page 22: ...CONTENTS xviii ...
Page 26: ...TABLES xxii ...
Page 40: ...INTRODUCTION 1 10 ...
Page 54: ...INITIAL CONFIGURATION 2 14 ...
Page 193: ...PORT CONFIGURATION 3 139 Figure 3 61 Displaying Etherlike and RMON Statistics ...
Page 257: ...QUALITY OF SERVICE 3 203 Figure 3 90 Configuring Policy Maps ...
Page 313: ...COMMAND GROUPS 4 13 PE Privileged Exec VC VLAN Database Configuration ...
Page 592: ...TROUBLESHOOTING B 4 ...
Page 605: ......