Secure Shell Commands
25-17
25
stored on the switch can access it. The following exchanges take place during
this process:
Authenticating SSH v1.5 Clients
a. The client sends its RSA public key to the switch.
b. The switch compares the client's public key to those stored in memory.
c. If a match is found, the switch uses its secret key to generate a random
256-bit string as a challenge, encrypts this string with the user’s public key,
and sends it to the client.
d. The client uses its private key to decrypt the challenge string, computes the
MD5 checksum, and sends the checksum back to the switch.
e. The switch compares the checksum sent from the client against that
computed for the original string it sent. If the two checksums match, this
means that the client's private key corresponds to an authorized public key,
and the client is authenticated.
Authenticating SSH v2 Clients
a. The client first queries the switch to determine if DSA public key
authentication using a preferred algorithm is acceptable.
b. If the specified algorithm is supported by the switch, it notifies the client to
proceed with the authentication process. Otherwise, it rejects the request.
c. The client sends a signature generated using the private key to the switch.
d. When the server receives this message, it checks whether the supplied key
is acceptable for authentication, and if so, it then checks whether the
signature is correct. If both checks succeed, the client is authenticated.
Note:
The SSH server supports up to four client sessions. The maximum number of
client sessions includes both current Telnet sessions and SSH sessions.
ip ssh server
This command enables the Secure Shell (SSH) server on this switch. Use the
no
form to disable this service.
Syntax
[
no
]
ip ssh server
Default Setting
Disabled
Command Mode
Global Configuration
Command Usage
• The SSH server supports up to four client sessions. The maximum number of
client sessions includes both current Telnet sessions and SSH sessions.
• The SSH server uses DSA or RSA for key exchange when the client first
establishes a connection with the switch, and then negotiates with the client
to select either DES (56-bit) or 3DES (168-bit) for data encryption.
• You must generate DSA and RSA host keys before enabling the SSH server.
Содержание ES4626F
Страница 2: ......
Страница 4: ...ES4626F ES4650F F1 1 0 2 E062009 R01 ST 149100000013A...
Страница 6: ...ii...
Страница 34: ...Getting Started...
Страница 44: ...Introduction 1 10 1...
Страница 62: ...Initial Configuration 2 18 2...
Страница 64: ...Switch Management...
Страница 76: ...Configuring the Switch 3 12 3...
Страница 118: ...Basic Management Tasks 4 42 4...
Страница 164: ...User Authentication 6 28 6...
Страница 176: ...Access Control Lists 7 12 7...
Страница 284: ...Quality of Service 14 8 14...
Страница 294: ...Multicast Filtering 15 10 15...
Страница 300: ...Domain Name Service 16 6 16...
Страница 310: ...Dynamic Host Configuration Protocol 17 10 17...
Страница 320: ...Configuring Router Redundancy 18 10 18...
Страница 344: ...IP Routing 19 24 19...
Страница 356: ...Unicast Routing 20 12 20 Web Click Routing Protocol RIP Statistics Figure 20 5 RIP Statistics...
Страница 386: ...Unicast Routing 20 42 20...
Страница 388: ...Command Line Interface...
Страница 400: ...Overview of the Command Line Interface 21 12 21...
Страница 466: ...SNMP Commands 24 16 24...
Страница 520: ...Access Control List Commands 26 18 26...
Страница 546: ...Rate Limit Commands 30 2 30...
Страница 612: ...VLAN Commands 34 24 34...
Страница 626: ...Class of Service Commands 35 14 35...
Страница 670: ...DHCP Commands 39 16 39...
Страница 716: ...IP Interface Commands 41 36 41...
Страница 768: ...IP Routing Commands 42 52 42...
Страница 770: ...Appendices...
Страница 791: ......
Страница 792: ...ES4626F ES4650F E062009 R01 ST 149100000013A...