C
OMMAND
L
INE
I
NTERFACE
4-48
9.
If a match is found, the switch uses the public key to encrypt a random
sequence of bytes, and sends this string to the client.
10.
The client uses its private key to decrypt the bytes, and sends the
decrypted bytes back to the switch.
11.
The switch compares the decrypted bytes to the original bytes it sent. If
the two sets match, this means that the client's private key corresponds
to an authorized public key, and the client is authenticated.
Note:
To use SSH with only password authentication, the host public key
must still be given to the client, either during initial connection or
manually entered into the known host file. However, you do not
need to configure the client’s keys.
ip ssh server
Use this command to enable the Secure Shell (SSH) server on this switch.
Use the
no
form to disable this service.
Syntax
ip ssh server
no ip ssh server
Default Setting
Disabled
Command Mode
Global Configuration
Command Usage
• The SSH server supports up to four client sessions. The maximum
number of client sessions includes both current Telnet sessions and
SSH sessions.
• The SSH server uses DSA or RSA for key exchange when the client
first establishes a connection with the switch, and then negotiates with
the client to select either DES (56-bit) or 3DES (168-bit) for data
encryption.
• You must generate the host key before enabling the SSH server.
Summary of Contents for 8648T - annexe 1
Page 2: ......
Page 34: ...INTRODUCTION 1 10 ...
Page 48: ...INITIAL CONFIGURATION 2 14 ...
Page 159: ...PORT CONFIGURATION 3 111 Figure 3 48 Displaying Etherlike and RMON Statistics ...
Page 411: ...DNS COMMANDS 4 167 ...
Page 536: ...COMMAND LINE INTERFACE 4 291 ...
Page 542: ...TROUBLESHOOTING B 2 ...
Page 555: ......