U
SER
A
UTHENTICATION
6-10
Configuring the Secure Shell
The Berkley-standard includes remote access tools originally designed for
Unix systems. Some of these tools have also been implemented for
Microsoft Windows and other environments. These tools, including
commands such as
rlogin
(remote login),
rsh
(remote shell), and
rcp
(remote
copy), are not secure from hostile attacks.
The Secure Shell (SSH) includes server/client applications intended as a
secure replacement for the older Berkley remote access tools. SSH can also
provide remote management access to this switch as a secure replacement
for Telnet. When the client contacts the switch via the SSH protocol, the
switch generates a public-key that the client uses along with a local user
name and password for access authentication. SSH also encrypts all data
transfers passing between the switch and SSH-enabled management
station clients, and ensures that data traveling over the network arrives
unaltered.
Note that you need to install an SSH client on the management station to
access the switch for management via the SSH protocol.
Note:
The switch supports both SSH Version 1.5 and 2.0 clients.
Command Usage
The SSH server on this switch supports both password and public key
authentication. If password authentication is specified by the SSH client,
then the password can be authenticated either locally or via a RADIUS or
remote authentication server, as specified on the
Authentication Settings
page (page 6-3). If public key authentication is
specified by the client, then you must configure authentication keys on
both the client and the switch as described in the following section. Note
that regardless of whether you use public key or password authentication,
you still have to generate authentication keys on the switch (SSH Host Key
Settings) and enable the SSH server (Authentication Settings).
Содержание 7824M/FSW - annexe 1
Страница 2: ......
Страница 24: ...TABLE OF CONTENTS xxiv ...
Страница 28: ...TABLES xxviii ...
Страница 32: ...FIGURES xxxii Figure 16 3 DNS Cache 16 7 ...
Страница 34: ...GETTING STARTED ...
Страница 46: ...SYSTEM DEFAULTS 1 12 ...
Страница 62: ...SWITCH MANAGEMENT ...
Страница 74: ...CONFIGURING THE SWITCH 3 12 ...
Страница 112: ...BASIC MANAGEMENT TASKS 4 38 ...
Страница 168: ...USER AUTHENTICATION 6 30 ...
Страница 223: ...SHOWING PORT STATISTICS 9 33 Figure 9 12 Port Statistics ...
Страница 230: ...ADDRESS TABLE SETTINGS 10 6 ...
Страница 304: ...CLASS OF SERVICE 13 16 ...
Страница 316: ...QUALITY OF SERVICE 14 12 ...
Страница 338: ...MULTICAST FILTERING 15 22 ...
Страница 346: ...DOMAIN NAME SERVICE 16 8 ...
Страница 348: ...COMMAND LINE INTERFACE IP Interface Commands 35 1 ...
Страница 362: ...OVERVIEW OF COMMAND LINE INTERFACE 17 14 ...
Страница 426: ...SYSTEM MANAGEMENT COMMANDS 19 56 Example Console show calendar 15 12 34 February 1 2002 Console ...
Страница 494: ...USER AUTHENTICATION COMMANDS 21 48 ...
Страница 514: ...CLIENT SECURITY COMMANDS 22 20 ...
Страница 540: ...ACCESS CONTROL LIST COMMANDS 23 26 ...
Страница 558: ...INTERFACE COMMANDS 24 18 ...
Страница 576: ...MIRROR PORT COMMANDS 26 4 ...
Страница 582: ...RATE LIMIT COMMANDS 27 6 ...
Страница 616: ...SPANNING TREE COMMANDS 29 28 ...
Страница 644: ...VLAN COMMANDS 30 28 ...
Страница 664: ...CLASS OF SERVICE COMMANDS 31 20 ...
Страница 678: ...QUALITY OF SERVICE COMMANDS 32 14 ...
Страница 720: ...APPENDICES ...
Страница 726: ...SOFTWARE SPECIFICATIONS A 6 ...
Страница 730: ...TROUBLESHOOTING B 4 ...
Страница 746: ...INDEX Index 6 ...
Страница 747: ......