S
YSTEM
M
ANAGEMENT
C
OMMANDS
4-47
5.
Enable SSH Service – Use the
ip ssh server
command to enable the
SSH server on the switch.
6.
Configure Challenge-Response Authentication – When an SSH client
attempts to contact the switch, the SSH server uses the host key pair to
negotiate a session key and encryption method. Only clients that have a
private key corresponding to the public keys stored on the switch can
gain access. The following exchanges take place during this process:
a.
The client sends its public key to the switch.
b.
The switch compares the client's public key to those stored in
memory.
c.
If a match is found, the switch uses the public key to encrypt a
random sequence of bytes, and sends this string to the client.
d.
The client uses its private key to decrypt the bytes, and sends the
decrypted bytes back to the switch.
e.
The switch compares the decrypted bytes to the original bytes it sent.
If the two sets match, this means that the client's private key
corresponds to an authorized public key, and the client is
authenticated.
Note:
To use SSH with only password authentication, the host public key
must still be given to the client, either during initial connection or
manually entered into the known host file. However, you do not
need to configure the client’s keys.
ip ssh server
This command enables the Secure Shell (SSH) server on this switch. Use
the
no
form to disable this service.
Syntax
[
no
]
ip ssh server
Default Setting
Disabled
Summary of Contents for TigerSwitch 1000
Page 2: ......
Page 19: ...CONTENTS xv...
Page 23: ...TABLES xix...
Page 36: ...INTRODUCTION 1 10...
Page 155: ...PORT CONFIGURATION 3 107 Figure 3 50 Displaying Etherlike and RMON Statistics...
Page 222: ...CONFIGURING THE SWITCH 3 174...
Page 417: ...VLAN COMMANDS 4 195 This section describes commands used to configure private VLANs...
Page 466: ...TROUBLESHOOTING B 4...
Page 479: ......