
C
HAPTER
13
| Security Measures
Configuring the Secure Shell
– 277 –
6.
Authentication – One of the following authentication methods is
employed:
Password Authentication (for SSH v1.5 or V2 Clients)
a.
The client sends its password to the server.
b.
The switch compares the client's password to those stored in
memory.
c.
If a match is found, the connection is allowed.
N
OTE
:
To use SSH with only password authentication, the host public key
must still be given to the client, either during initial connection or manually
entered into the known host file. However, you do not need to configure
the client’s keys.
Public Key Authentication
– When an SSH client attempts to contact the
switch, the SSH server uses the host key pair to negotiate a session
key and encryption method. Only clients that have a private key
corresponding to the public keys stored on the switch can access it. The
following exchanges take place during this process:
Authenticating SSH v1.5 Clients
a.
The client sends its RSA public key to the switch.
b.
The switch compares the client's public key to those stored in
memory.
c.
If a match is found, the switch uses its secret key to generate a
random 256-bit string as a challenge, encrypts this string with
the user’s public key, and sends it to the client.
d.
The client uses its private key to decrypt the challenge string,
computes the MD5 checksum, and sends the checksum back to
the switch.
e.
The switch compares the checksum sent from the client against
that computed for the original string it sent. If the two
checksums match, this means that the client's private key
corresponds to an authorized public key, and the client is
authenticated.
Authenticating SSH v2 Clients
a.
The client first queries the switch to determine if DSA public key
authentication using a preferred algorithm is acceptable.
b.
If the specified algorithm is supported by the switch, it notifies
the client to proceed with the authentication process. Otherwise,
it rejects the request.
c.
The client sends a signature generated using the private key to
the switch.
d.
When the server receives this message, it checks whether the
supplied key is acceptable for authentication, and if so, it then
checks whether the signature is correct. If both checks succeed,
the client is authenticated.
Содержание ECS4610-24F
Страница 1: ...Management Guide www edge core com ECS4610 24F 24 Port Layer 3 Gigabit Ethernet Switch...
Страница 2: ......
Страница 4: ......
Страница 6: ...ABOUT THIS GUIDE 6...
Страница 36: ...CONTENTS 36...
Страница 48: ...FIGURES 48...
Страница 54: ...TABLES 54...
Страница 56: ...SECTION I Getting Started 56...
Страница 78: ...CHAPTER 2 Initial Switch Configuration Managing System Files 78...
Страница 80: ...SECTION II Web Configuration 80 Unicast Routing on page 483 Multicast Routing on page 541...
Страница 100: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 100...
Страница 123: ...CHAPTER 4 Basic Management Tasks Resetting the System 123 Figure 22 Restarting the Switch Regularly...
Страница 124: ...CHAPTER 4 Basic Management Tasks Resetting the System 124...
Страница 186: ...CHAPTER 6 VLAN Configuration Configuring MAC based VLANs 186...
Страница 194: ...CHAPTER 7 Address Table Settings Clearing the Dynamic Address Table 194...
Страница 218: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 218...
Страница 220: ...CHAPTER 9 Rate Limit Configuration 220 Figure 103 Configuring Rate Limits...
Страница 222: ...CHAPTER 10 Storm Control Configuration 222 Figure 104 Configuring Broadcast Storm Control...
Страница 238: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 238...
Страница 334: ...CHAPTER 13 Security Measures DHCP Snooping 334...
Страница 429: ...CHAPTER 15 Multicast Filtering Multicast VLAN Registration 429 Figure 257 Showing All MVR Groups Assigned to a Port...
Страница 430: ...CHAPTER 15 Multicast Filtering Multicast VLAN Registration 430...
Страница 540: ...CHAPTER 20 Unicast Routing Configuring the Open Shortest Path First Protocol Version 2 540...
Страница 564: ...CHAPTER 21 Multicast Routing Configuring PIM for IPv4 564 Figure 375 Showing RP Mapping...
Страница 578: ...CHAPTER 22 Using the Command Line Interface CLI Command Groups 578...
Страница 628: ...CHAPTER 24 System Management Commands Time Range 628...
Страница 648: ...CHAPTER 25 SNMP Commands 648...
Страница 656: ...CHAPTER 26 Remote Monitoring Commands 656...
Страница 786: ...CHAPTER 30 Interface Commands 786...
Страница 800: ...CHAPTER 32 Port Mirroring Commands Local Port Mirroring Commands 800...
Страница 902: ...CHAPTER 38 Quality of Service Commands 902...
Страница 950: ...CHAPTER 39 Multicast Filtering Commands IGMP Proxy Routing 950...
Страница 968: ...CHAPTER 40 LLDP Commands 968...
Страница 978: ...CHAPTER 41 Domain Name Service Commands 978...
Страница 1084: ...CHAPTER 45 IP Routing Commands Open Shortest Path First OSPFv2 1084...
Страница 1114: ...SECTION IV Appendices 1114...
Страница 1120: ...APPENDIX A Software Specifications Management Information Bases 1120...
Страница 1142: ...COMMAND LIST 1142...
Страница 1152: ...INDEX 1152...
Страница 1153: ......
Страница 1154: ...ECS4610 24F E052010 ST R01 149100000092A...