C
ONFIGURING
THE
S
ECURE
S
HELL
6-13
Authenticating SSH v2 Clients
a. The client first queries the switch to determine if DSA public key
authentication using a preferred algorithm is acceptable.
b. If the specified algorithm is supported by the switch, it notifies the
client to proceed with the authentication process. Otherwise, it
rejects the request.
c. The client sends a signature generated using the private key to the
switch.
d. When the server receives this message, it checks whether the
supplied key is acceptable for authentication, and if so, it then
checks whether the signature is correct. If both checks succeed, the
client is authenticated.
Note:
The SSH server supports up to four client sessions. The maximum
number of client sessions includes both current Telnet sessions
and SSH sessions.
Generating the Host Key Pair
A host public/private key pair is used to provide secure communications
between an SSH client and the switch. After generating this key pair, you
must provide the host public key to SSH clients and import the client’s
public key to the switch as described in the preceding section (Command
Usage).
Field Attributes
•
Public-Key of Host-Key
– The public key for the host.
- RSA: The first field indicates the size of the host key (e.g., 1024), the
second field is the encoded public exponent (e.g., 65537), and the last
string is the encoded modulus.
- DSA: The first field indicates that the encryption method used by SSH
is based on the Digital Signature Standard (DSS). The last string is the
encoded modulus.
Содержание 7824M/FSW - annexe 1
Страница 2: ......
Страница 24: ...TABLE OF CONTENTS xxiv ...
Страница 28: ...TABLES xxviii ...
Страница 32: ...FIGURES xxxii Figure 16 3 DNS Cache 16 7 ...
Страница 34: ...GETTING STARTED ...
Страница 46: ...SYSTEM DEFAULTS 1 12 ...
Страница 62: ...SWITCH MANAGEMENT ...
Страница 74: ...CONFIGURING THE SWITCH 3 12 ...
Страница 112: ...BASIC MANAGEMENT TASKS 4 38 ...
Страница 168: ...USER AUTHENTICATION 6 30 ...
Страница 223: ...SHOWING PORT STATISTICS 9 33 Figure 9 12 Port Statistics ...
Страница 230: ...ADDRESS TABLE SETTINGS 10 6 ...
Страница 304: ...CLASS OF SERVICE 13 16 ...
Страница 316: ...QUALITY OF SERVICE 14 12 ...
Страница 338: ...MULTICAST FILTERING 15 22 ...
Страница 346: ...DOMAIN NAME SERVICE 16 8 ...
Страница 348: ...COMMAND LINE INTERFACE IP Interface Commands 35 1 ...
Страница 362: ...OVERVIEW OF COMMAND LINE INTERFACE 17 14 ...
Страница 426: ...SYSTEM MANAGEMENT COMMANDS 19 56 Example Console show calendar 15 12 34 February 1 2002 Console ...
Страница 494: ...USER AUTHENTICATION COMMANDS 21 48 ...
Страница 514: ...CLIENT SECURITY COMMANDS 22 20 ...
Страница 540: ...ACCESS CONTROL LIST COMMANDS 23 26 ...
Страница 558: ...INTERFACE COMMANDS 24 18 ...
Страница 576: ...MIRROR PORT COMMANDS 26 4 ...
Страница 582: ...RATE LIMIT COMMANDS 27 6 ...
Страница 616: ...SPANNING TREE COMMANDS 29 28 ...
Страница 644: ...VLAN COMMANDS 30 28 ...
Страница 664: ...CLASS OF SERVICE COMMANDS 31 20 ...
Страница 678: ...QUALITY OF SERVICE COMMANDS 32 14 ...
Страница 720: ...APPENDICES ...
Страница 726: ...SOFTWARE SPECIFICATIONS A 6 ...
Страница 730: ...TROUBLESHOOTING B 4 ...
Страница 746: ...INDEX Index 6 ...
Страница 747: ......