
C
HAPTER
27
| Authentication Commands
Secure Shell
– 685 –
To use the SSH server, complete these steps:
1.
Generate a Host Key Pair – Use the
ip ssh crypto host-key generate
command to create a host public/private key pair.
2.
Provide Host Public Key to Clients – Many SSH client programs
automatically import the host public key during the initial connection
setup with the switch. Otherwise, you need to manually create a known
hosts file on the management station and place the host public key in
it. An entry for a public key in the known hosts file would appear similar
to the following example:
10.1.0.54 1024 35
15684995401867669259333946775054617325313674890836547254
15020245593199868544358361651999923329781766065830956
10825913212890233765468017262725714134287629413011961955667825
95664104869574278881462065194174677298486546861571773939016477
93559423035774130980227370877945452408397175264635805817671670
9574804776117
3.
Import Client’s Public Key to the Switch – Use the
copy
tftp public-key
command
to copy a file containing the public key for all the SSH client’s
granted management access to the switch. (Note that these clients
must be configured locally on the switch with the
username
command.)
The clients are subsequently authenticated using these keys. The
current firmware only accepts public key files based on standard UNIX
format as shown in the following example for an RSA key:
1024 35
13410816856098939210409449201554253476316419218729589211431738
80055536161631051775940838686311092912322268285192543746031009
37187721199696317813662774141689851320491172048303392543241016
37997592371449011938006090253948408482717819437228840253311595
2134861022902978982721353267131629432532818915045306393916643
4.
Set the Optional Parameters – Set other optional parameters, including
the authentication timeout, the number of retries, and the server key
size.
5.
Enable SSH Service – Use the
ip ssh server
command to enable the
SSH server on the switch.
6.
Authentication
– One of the following authentication methods is
employed:
Password Authentication (for SSH v1.5 or V2 Clients)
a.
The client sends its password to the server.
b.
The switch compares the client's password to those stored in
memory.
c.
If a match is found, the connection is allowed.
Содержание ECS4610-24F
Страница 1: ...Management Guide www edge core com ECS4610 24F 24 Port Layer 3 Gigabit Ethernet Switch...
Страница 2: ......
Страница 4: ......
Страница 6: ...ABOUT THIS GUIDE 6...
Страница 36: ...CONTENTS 36...
Страница 48: ...FIGURES 48...
Страница 54: ...TABLES 54...
Страница 56: ...SECTION I Getting Started 56...
Страница 78: ...CHAPTER 2 Initial Switch Configuration Managing System Files 78...
Страница 80: ...SECTION II Web Configuration 80 Unicast Routing on page 483 Multicast Routing on page 541...
Страница 100: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 100...
Страница 123: ...CHAPTER 4 Basic Management Tasks Resetting the System 123 Figure 22 Restarting the Switch Regularly...
Страница 124: ...CHAPTER 4 Basic Management Tasks Resetting the System 124...
Страница 186: ...CHAPTER 6 VLAN Configuration Configuring MAC based VLANs 186...
Страница 194: ...CHAPTER 7 Address Table Settings Clearing the Dynamic Address Table 194...
Страница 218: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 218...
Страница 220: ...CHAPTER 9 Rate Limit Configuration 220 Figure 103 Configuring Rate Limits...
Страница 222: ...CHAPTER 10 Storm Control Configuration 222 Figure 104 Configuring Broadcast Storm Control...
Страница 238: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 238...
Страница 334: ...CHAPTER 13 Security Measures DHCP Snooping 334...
Страница 429: ...CHAPTER 15 Multicast Filtering Multicast VLAN Registration 429 Figure 257 Showing All MVR Groups Assigned to a Port...
Страница 430: ...CHAPTER 15 Multicast Filtering Multicast VLAN Registration 430...
Страница 540: ...CHAPTER 20 Unicast Routing Configuring the Open Shortest Path First Protocol Version 2 540...
Страница 564: ...CHAPTER 21 Multicast Routing Configuring PIM for IPv4 564 Figure 375 Showing RP Mapping...
Страница 578: ...CHAPTER 22 Using the Command Line Interface CLI Command Groups 578...
Страница 628: ...CHAPTER 24 System Management Commands Time Range 628...
Страница 648: ...CHAPTER 25 SNMP Commands 648...
Страница 656: ...CHAPTER 26 Remote Monitoring Commands 656...
Страница 786: ...CHAPTER 30 Interface Commands 786...
Страница 800: ...CHAPTER 32 Port Mirroring Commands Local Port Mirroring Commands 800...
Страница 902: ...CHAPTER 38 Quality of Service Commands 902...
Страница 950: ...CHAPTER 39 Multicast Filtering Commands IGMP Proxy Routing 950...
Страница 968: ...CHAPTER 40 LLDP Commands 968...
Страница 978: ...CHAPTER 41 Domain Name Service Commands 978...
Страница 1084: ...CHAPTER 45 IP Routing Commands Open Shortest Path First OSPFv2 1084...
Страница 1114: ...SECTION IV Appendices 1114...
Страница 1120: ...APPENDIX A Software Specifications Management Information Bases 1120...
Страница 1142: ...COMMAND LIST 1142...
Страница 1152: ...INDEX 1152...
Страница 1153: ......
Страница 1154: ...ECS4610 24F E052010 ST R01 149100000092A...