C
ONFIGURING
THE
S
WITCH
3-84
- DSA: The first field indicates that the encryption method used by
SSH is based on the Digital Signature Standard (DSS). The last string
is the encoded modulus.
•
User Name
– The user type used for the public key pair.
•
Public-Key Type
– The key type used to generate the user public key
pair (i.e., public and private keys). (Range: RSA, DSA, Both: Default:
RSA)
The SSH server uses RSA or DSA for key exchange when the client
first establishes a connection with the switch, and then negotiates with
the client to select either DES (56-bit) or 3DES (168-bit) for data
encryption.
•
TFTP Server IP Address
– The TFTP server IP address location for
the public key pair.
•
Source File Name
– The file name used for the public key pair.
•
Copy Public Key
– Save a copy of the public key pair.
•
Delete
– This button deletes the user public key process.
Содержание 6152L2
Страница 2: ......
Страница 18: ...TABLES xiv ...
Страница 32: ...INTRODUCTION 1 10 ...
Страница 46: ...INITIAL CONFIGURATION 2 14 ...
Страница 185: ...PORT CONFIGURATION 3 139 Figure 3 61 Displaying Etherlike and RMON Statistics ...
Страница 249: ...QUALITY OF SERVICE 3 203 Figure 3 90 Configuring Policy Maps ...
Страница 290: ...CONFIGURING THE SWITCH 3 244 ...
Страница 303: ...COMMAND GROUPS 4 13 VC VLAN Database Configuration ...
Страница 434: ...COMMAND LINE INTERFACE 4 144 ...
Страница 568: ...TROUBLESHOOTING B 4 ...
Страница 581: ......