
-158-
Secure Shell (SSH)
SSH is the abbreviation of Secure Shell, which is a program allowing secure remote login and secure
network services over an insecure network. It allows you to securely login to remote host computers,
to execute commands safely in a remote computer and so forth, and to provide secure encrypted and
authenticated communications between two non-trusted hosts. SSH with its array of unmatched secu-
rity features is an essential tool in today
’
s network environment. It is a powerful guardian against the
numerous security hazards that nowadays threaten network communications.
The steps required to use the SSH protocol for secure communication between a remote PC (the SSH
Client) and the Switch (the SSH Server), are as follows:
1. Create a user account with admin-level access using the User Accounts window in the Manage-
ment folder. This is identical to creating any other admin-lever User account on the Switch,
including specifying a password. This password is used to login to the Switch, once secure
communication has been established using the SSH protocol.
2. Configure the user account to use a specified authorization method to identify users that are
allowed to establish SSH connections with the Switch using the SSH User Authentication win-
dow. There are three choices as to the method SSH will use to authorize the user, and they are
Host Based, Password, Public Key, and None.
3. Configure the encryption algorithm that SSH will use to encrypt and decrypt messages sent
between the SSH Client and the SSH Server, using the SSH Algorithm window.
4. Finally, enable SSH on the Switch using the SSH User Authentication window.
After following the above steps, you can configure an SSH Client on the remote PC and manage the
Switch using secure, in-band communication.
Содержание KGS-3120
Страница 1: ...1 DOC 041230 KGS 3120 Operation Manual...
Страница 101: ...101 Access Rule Configuration IP window Configure the Access Rule Configuration settings on the window above...
Страница 188: ...188 Rx Packets Analysis line graph for Bytes Packets window Rx Packets Analysis table for Bytes Packets window...
Страница 195: ...195 Transmitted Errors Tx Error Analysis line graph window Tx Error Analysis table window...