SSH Terminal Services
201
■
The client authenticates information from the user at the server till the
authentication succeeds or the connection is turned off due to authentication
timeout.
SSH supports two authentication types: password authentication and RSA
authentication.
1
Password authentication works as follows:
■
The client sends its username and password to the server.
■
The server compares the username and password received with those configured
locally. The user is allowed to log on to the Switch if the usernames and passwords
match exactly.
2
RSA authentication works in this way:
■
Configure the RSA public key of the client user at the server.
■
The client sends the member modules of its RSA public key to the server.
■
The server checks the validity of the member module. If it is valid, the server
generates a random number, which is sent to the client after being encrypted with
RSA public key of the client.
■
Both ends calculate authentication data based on the random number and session
ID.
■
The client sends the authentication data calculated back to the server.
■
The server compares it with its authentication data obtained locally. If they match
exactly, the user is allowed to access the switch.
3
Session request stage. The client sends session request messages to the server which
processes the request messages.
4
Interactive session stage. Both ends exchange data till the session ends.
SSH Server
Configuration
Table 179 describes SSH server configuration tasks.
Table 179
Configure SSH 2.0 server
Serial
No Operation
Command
Description
1
Configure supported
protocols
protocol inbound
Refer to “Configuring
supported protocols”
2
Generate a local RSA key pair
rsa local-key-pair create
Refer to “Generating or
destroying RSA key pairs”
Destroy the local RSA key pair
rsa local-key-pair
destroy
3
Configure authentication
mode for SSH users
ssh user username
authentication-type
Refer to “Configuring
authentication type“
4
Set SSH authentication
timeout time
ssh server timeout
Refer to “Configuring
server SSH attributes“
Set SSH authentication retry
number
ssh server
authentication-retries
5
Allocate public keys for SSH
users
ssh user username assign
rsa-key keyname
Refer to “Configuring
client public keys“
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...