
C
HAPTER
13
| Security Measures
Configuring the Secure Shell
– 350 –
Figure 181: Showing the SSH Host Key Pair
I
MPORTING
U
SER
P
UBLIC
K
EYS
Use the Security > SSH (Configure User Key - Copy) page to upload a
user’s public key to the switch. This public key must be stored on the
switch for the user to be able to log in using the public key authentication
mechanism. If the user’s public key does not exist on the switch, SSH will
revert to the interactive password authentication mechanism to complete
authentication.
CLI R
EFERENCES
◆
P
ARAMETERS
These parameters are displayed:
◆
User Name
– This drop-down box selects the user who’s public key
you wish to manage. Note that you must first create users on the User
Accounts page (see
"Configuring User Accounts" on page 326
◆
User Key Type
– The type of public key to upload.
■
RSA: The switch accepts a RSA version 1 encrypted public key.
■
DSA: The switch accepts a DSA version 2 encrypted public key.
The SSH server uses RSA or DSA for key exchange when the client first
establishes a connection with the switch, and then negotiates with the
client to select either DES (56-bit) or 3DES (168-bit) for data
encryption.
The switch uses only RSA Version 1 for SSHv1.5 clients and DSA
Version 2 for SSHv2 clients.
◆
TFTP Server IP Address
– The IP address of the TFTP server that
contains the public key file you wish to import.
◆
Source File Name
– The public key file to upload.
Содержание ECS4110-28T
Страница 1: ...Management Guide www edge core com ECS4110 28T 28P 52T 52P 28 52 Port Gigabit Ethernet Layer 2 Switch...
Страница 2: ......
Страница 4: ......
Страница 63: ...FIGURES 63 Figure 428 Configuring VLAN Translation 1177...
Страница 64: ...FIGURES 64...
Страница 72: ...TABLES 72...
Страница 74: ...SECTION I Getting Started 74...
Страница 102: ...SECTION II Web Configuration 102 General IP Routing on page 679...
Страница 154: ...CHAPTER 4 Basic Management Tasks Resetting the System 154...
Страница 198: ...CHAPTER 5 Interface Configuration VLAN Trunking 198 Figure 65 Configuring VLAN Trunking...
Страница 272: ...CHAPTER 9 Congestion Control Automatic Traffic Control 272...
Страница 286: ...CHAPTER 10 Class of Service Layer 3 4 Priority Settings 286...
Страница 420: ...CHAPTER 13 Security Measures DHCP Snooping 420...
Страница 566: ...CHAPTER 14 Basic Administration Protocols OAM Configuration 566...
Страница 638: ...CHAPTER 15 Multicast Filtering Multicast VLAN Registration for IPv6 638...
Страница 662: ...CHAPTER 16 IP Configuration Setting the Switch s IP Address IP Version 6 662...
Страница 678: ...CHAPTER 17 IP Services Configuring the PPPoE Intermediate Agent 678...
Страница 792: ...CHAPTER 21 System Management Commands Switch Clustering 792...
Страница 822: ...CHAPTER 23 Remote Monitoring Commands 822...
Страница 888: ...CHAPTER 24 Authentication Commands PPPoE Intermediate Agent 888...
Страница 968: ...CHAPTER 25 General Security Measures Port based Traffic Segmentation 968...
Страница 994: ...CHAPTER 26 Access Control Lists ACL Information 994...
Страница 1034: ...CHAPTER 28 Link Aggregation Commands Trunk Status Display Commands 1034...
Страница 1044: ...CHAPTER 29 Power over Ethernet Commands 1044...
Страница 1084: ...CHAPTER 33 UniDirectional Link Detection Commands 1084...
Страница 1090: ...CHAPTER 34 Address Table Commands 1090...
Страница 1194: ...CHAPTER 37 VLAN Commands Configuring Voice VLANs 1194...
Страница 1388: ...CHAPTER 42 CFM Commands Delay Measure Operations 1388...
Страница 1410: ...CHAPTER 44 Domain Name Service Commands 1410...
Страница 1420: ...CHAPTER 45 DHCP Commands DHCP Relay 1420...
Страница 1472: ...CHAPTER 46 IP Routing Commands IPv4 Commands 1472...
Страница 1474: ...SECTION IV Appendices 1474...
Страница 1502: ...COMMAND LIST 1502...
Страница 1513: ......
Страница 1514: ...ECS4110 28T ECS4110 28P ECS4110 52T ECS4110 52P E072014 ST R02 150200000929A...