![Juniper JUNOSE 11.3 Скачать руководство пользователя страница 453](http://html1.mh-extra.com/html/juniper/junose-11-3/junose-11-3_configuration-manual_2032852453.webp)
the new key the next time the client and server connect. The client then typically instructs
the end user to delete the locally cached host key and to try to connect again.
CAUTION:
Use caution issuing the
crypto key generate dss
command from
an SSH client. Issuing this command will terminate that SSH session; it will
be the last command you send from that session.
The public half of the host key is sent from the server to the client as part of the transport
layer negotiation. The client attempts to find a match for this key with one stored locally
and assigned to the server. If the client does not find a match, it can accept or reject the
key sent from the server. Refer to your client documentation for detailed information.
You typically configure the client to do one of the following:
•
Never accept an unknown key.
•
Always accept an unknown key.
•
Query the administrator before accepting an unknown key.
If you do not want the client ever to trust the server when it sends an unknown key, you
must manually copy—using the
copy
command—the host key from each server to each
intended client. This is the only way to be certain that each client has a local copy of the
necessary keys for matching during negotiation.
If you configure the client to accept unknown keys—either automatically or with
administrator approval—this acceptance policy applies only to the first time the client
receives a key from a particular server. When the SSH client accepts a host key, it stores
the key locally and uses it for all future comparisons with keys received from that host.
If the client subsequently receives a different key—a new unknown—from that server, it
is rejected.
You cannot configure an SSH client to accept a new key after it has accepted a key from
an SSH server. You must delete the old key before a new key can be accepted.
Performance
Generating a host key is computationally intensive and can take up to several minutes
depending on the load of the system. The system cannot accept any CLI inputs from that
session while it is generating the key.
Encryption, data integrity validation, and compression are all computationally intensive.
These features can affect router performance in the following ways:
•
Reduce the effective baud rate compared with Telnet or the local CLI. Users are unlikely
to notice this performance degradation because user interaction is inherently slow
compared with other system operations.
•
Increase the general load on the system CPU.
423
Copyright © 2010, Juniper Networks, Inc.
Chapter 7: Passwords and Security
Содержание JUNOSE 11.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 3 x System Basics Configuration Guide...
Страница 24: ...Copyright 2010 Juniper Networks Inc xxiv JunosE 11 3 x System Basics Configuration Guide...
Страница 32: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 3 x System Basics Configuration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 116 JunosE 11 3 x System Basics Configuration Guide...
Страница 166: ...Copyright 2010 Juniper Networks Inc 136 JunosE 11 3 x System Basics Configuration Guide...
Страница 432: ...Copyright 2010 Juniper Networks Inc 402 JunosE 11 3 x System Basics Configuration Guide...
Страница 488: ...Copyright 2010 Juniper Networks Inc 458 JunosE 11 3 x System Basics Configuration Guide...
Страница 524: ...Copyright 2010 Juniper Networks Inc 494 JunosE 11 3 x System Basics Configuration Guide...
Страница 554: ...Copyright 2010 Juniper Networks Inc 524 JunosE 11 3 x System Basics Configuration Guide...
Страница 566: ...Copyright 2010 Juniper Networks Inc 536 JunosE 11 3 x System Basics Configuration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 558 JunosE 11 3 x System Basics Configuration Guide...
Страница 613: ...PART 3 Index Index on page 585 583 Copyright 2010 Juniper Networks Inc...
Страница 614: ...Copyright 2010 Juniper Networks Inc 584 JunosE 11 3 x System Basics Configuration Guide...
Страница 632: ...Copyright 2010 Juniper Networks Inc 602 JunosE 11 3 x System Basics Configuration Guide...