
C
HAPTER
14
| Security Measures
Configuring the Secure Shell
– 306 –
5.
Enable SSH Service
– On the SSH Settings page, enable the SSH server
on the switch.
6.
Authentication – One of the following authentication methods is
employed:
Password Authentication (for SSH v1.5 or V2 Clients)
a.
The client sends its password to the server.
b.
The switch compares the client's password to those stored in
memory.
c.
If a match is found, the connection is allowed.
N
OTE
:
To use SSH with only password authentication, the host public key
must still be given to the client, either during initial connection or manually
entered into the known host file. However, you do not need to configure
the client’s keys.
Public Key Authentication
– When an SSH client attempts to contact the
switch, the SSH server uses the host key pair to negotiate a session
key and encryption method. Only clients that have a private key
corresponding to the public keys stored on the switch can access it. The
following exchanges take place during this process:
Authenticating SSH v1.5 Clients
a.
The client sends its RSA public key to the switch.
b.
The switch compares the client's public key to those stored in
memory.
c.
If a match is found, the switch uses its secret key to generate a
random 256-bit string as a challenge, encrypts this string with
the user’s public key, and sends it to the client.
d.
The client uses its private key to decrypt the challenge string,
computes the MD5 checksum, and sends the checksum back to
the switch.
e.
The switch compares the checksum sent from the client against
that computed for the original string it sent. If the two
checksums match, this means that the client's private key
corresponds to an authorized public key, and the client is
authenticated.
Authenticating SSH v2 Clients
a.
The client first queries the switch to determine if DSA public key
authentication using a preferred algorithm is acceptable.
b.
If the specified algorithm is supported by the switch, it notifies
the client to proceed with the authentication process. Otherwise,
it rejects the request.
c.
The client sends a signature generated using the private key to
the switch.
d.
When the server receives this message, it checks whether the
supplied key is acceptable for authentication, and if so, it then
Содержание DG-FS4526E
Страница 4: ...ABOUT THIS GUIDE 4...
Страница 34: ...CONTENTS 34...
Страница 50: ...TABLES 50...
Страница 52: ...SECTION I Getting Started 52...
Страница 62: ...CHAPTER 1 Introduction System Defaults 62...
Страница 80: ...CHAPTER 2 Initial Switch Configuration Managing System Files 80...
Страница 82: ...SECTION II Web Configuration 82...
Страница 100: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 100...
Страница 128: ...CHAPTER 4 Basic Management Tasks Resetting the System 128...
Страница 166: ...CHAPTER 5 Interface Configuration VLAN Trunking 166...
Страница 198: ...CHAPTER 6 VLAN Configuration Configuring VLAN Mirroring 198...
Страница 516: ...CHAPTER 17 IP Services Displaying the DNS Cache 516...
Страница 562: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 562...
Страница 652: ...CHAPTER 22 SNMP Commands 652...
Страница 660: ...CHAPTER 23 Remote Monitoring Commands 660...
Страница 714: ...CHAPTER 24 Authentication Commands Management IP Filter 714...
Страница 802: ...CHAPTER 27 Interface Commands 802...
Страница 824: ...CHAPTER 29 Port Mirroring Commands RSPAN Mirroring Commands 824...
Страница 846: ...CHAPTER 32 Address Table Commands 846...
Страница 874: ...CHAPTER 33 Spanning Tree Commands 874...
Страница 886: ...CHAPTER 34 ERPS Commands 886...
Страница 928: ...CHAPTER 35 VLAN Commands Configuring Voice VLANs 928...
Страница 942: ...CHAPTER 36 Class of Service Commands Priority Commands Layer 3 and 4 942...
Страница 998: ...CHAPTER 38 Multicast Filtering Commands Multicast VLAN Registration 998...
Страница 1022: ...CHAPTER 39 LLDP Commands 1022...
Страница 1064: ...CHAPTER 40 CFM Commands 1064...
Страница 1084: ...CHAPTER 42 Domain Name Service Commands 1084...
Страница 1090: ...CHAPTER 43 DHCP Commands DHCP Client 1090...
Страница 1122: ...CHAPTER 44 IP Interface Commands IPv6 Interface 1122...
Страница 1124: ...SECTION IV Appendices 1124...
Страница 1129: ...APPENDIX A Software Specifications Management Information Bases 1129 Trap RFC 1215 UDP MIB RFC 2013...
Страница 1130: ...APPENDIX A Software Specifications Management Information Bases 1130...
Страница 1152: ...COMMAND LIST 1152...
Страница 1161: ......
Страница 1162: ...DG FS4526E 042012 HW R01...