![Edge-Core ECS4810-12M Layer 2 Скачать руководство пользователя страница 314](http://html1.mh-extra.com/html/edge-core/ecs4810-12m-layer-2/ecs4810-12m-layer-2_management-manual_2359693314.webp)
C
HAPTER
14
| Security Measures
Configuring the Secure Shell
– 314 –
C
ONFIGURING
THE
S
ECURE
S
HELL
The Berkeley-standard includes remote access tools originally designed for
Unix systems. Some of these tools have also been implemented for
Microsoft Windows and other environments. These tools, including
commands such as
rlogin
(remote login),
rsh
(remote shell), and
rcp
(remote copy), are not secure from hostile attacks.
The Secure Shell (SSH) includes server/client applications intended as a
secure replacement for the older Berkeley remote access tools. SSH can
also provide remote management access to this switch as a secure
replacement for Telnet. When the client contacts the switch via the SSH
protocol, the switch generates a public-key that the client uses along with a
local user name and password for access authentication. SSH also encrypts
all data transfers passing between the switch and SSH-enabled
management station clients, and ensures that data traveling over the
network arrives unaltered.
N
OTE
:
You need to install an SSH client on the management station to
access the switch for management via the SSH protocol.
N
OTE
:
The switch supports both SSH Version 1.5 and 2.0 clients.
C
OMMAND
U
SAGE
The SSH server on this switch supports both password and public key
authentication. If password authentication is specified by the SSH client,
then the password can be authenticated either locally or via a RADIUS or
remote authentication server, as specified on the System
Authentication page (
page 281
). If public key authentication is specified by
the client, then you must configure authentication keys on both the client
and the switch as described in the following section. Note that regardless of
whether you use public key or password authentication, you still have to
generate authentication keys on the switch (SSH Host Key Settings) and
enable the SSH server (Authentication Settings).
To use the SSH server, complete these steps:
1.
Generate a Host Key Pair
– On the SSH Host Key Settings page, create
a host public/private key pair.
2.
Provide Host Public Key to Clients
– Many SSH client programs
automatically import the host public key during the initial connection
setup with the switch. Otherwise, you need to manually create a known
hosts file on the management station and place the host public key in
it. An entry for a public key in the known hosts file would appear similar
to the following example:
10.1.0.54 1024 35
15684995401867669259333946775054617325313674890836547254
15020245593199868544358361651999923329781766065830956
10825913212890233 76546801726272571413428762941301196195566782
59566410486957427888146206519417467729848654686157177393901647
Содержание ECS4810-12M Layer 2
Страница 1: ...Management Guide www edge core com ECS4810 12M Layer 2 Gigabit Ethernet Switch...
Страница 2: ......
Страница 4: ......
Страница 6: ...ABOUT THIS GUIDE 6...
Страница 54: ...SECTION I Getting Started 54...
Страница 64: ...CHAPTER 1 Introduction System Defaults 64...
Страница 82: ...CHAPTER 2 Initial Switch Configuration Managing System Files 82...
Страница 84: ...SECTION II Web Configuration 84...
Страница 102: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 102...
Страница 206: ...CHAPTER 6 VLAN Configuration Configuring VLAN Mirroring 206...
Страница 256: ...CHAPTER 11 Class of Service Layer 3 4 Priority Settings 256...
Страница 378: ...CHAPTER 14 Security Measures DHCP Snooping 378...
Страница 520: ...CHAPTER 16 IP Configuration Setting the Switch s IP Address IP Version 6 520...
Страница 528: ...CHAPTER 17 IP Services Displaying the DNS Cache 528...
Страница 586: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 586...
Страница 676: ...CHAPTER 22 SNMP Commands 676...
Страница 684: ...CHAPTER 23 Remote Monitoring Commands 684...
Страница 816: ...CHAPTER 27 Access Control Lists ACL Information 816...
Страница 866: ...CHAPTER 30 Port Mirroring Commands RSPAN Mirroring Commands 866...
Страница 883: ...CHAPTER 32 Automatic Traffic Control Commands 883 Trap Traffic Release Disabled Disabled Console...
Страница 884: ...CHAPTER 32 Automatic Traffic Control Commands 884...
Страница 890: ...CHAPTER 33 Address Table Commands 890...
Страница 986: ...CHAPTER 37 Class of Service Commands Priority Commands Layer 3 and 4 986...
Страница 1006: ...CHAPTER 38 Quality of Service Commands 1006...
Страница 1068: ...CHAPTER 39 Multicast Filtering Commands Multicast VLAN Registration 1068...
Страница 1092: ...CHAPTER 40 LLDP Commands 1092...
Страница 1134: ...CHAPTER 41 CFM Commands 1134...
Страница 1154: ...CHAPTER 43 Domain Name Service Commands 1154...
Страница 1160: ...CHAPTER 44 DHCP Commands DHCP Client 1160...
Страница 1194: ...CHAPTER 45 IP Interface Commands IPv6 Interface 1194...
Страница 1196: ...SECTION IV Appendices 1196...
Страница 1201: ...APPENDIX A Software Specifications Management Information Bases 1201 Trap RFC 1215 UDP MIB RFC 2013...
Страница 1202: ...APPENDIX A Software Specifications Management Information Bases 1202...
Страница 1224: ...COMMAND LIST 1224...
Страница 1234: ...INDEX 1234...
Страница 1235: ......
Страница 1236: ...ECS4810 12M E072011 ST R01 149100000142A...