Chapter 16 Access Control
ES-315/ES-315-F User’s Guide
106
Figure 56
How SSH Works
1
Host Identification
The SSH client sends a connection request to the SSH server. The server identifies itself
with a host key. The client encrypts a randomly generated session key with the host key
and server key and sends the result back to the server.
The client automatically saves any new server public keys. In subsequent connections,
the server public key is checked against the saved version on the client computer.
2
Encryption Method
Once the identification is verified, both the client and server must agree on the type of
encryption method to use.
3
Authentication and Data Transmission
After the identification is verified and data encryption activated, a secure tunnel is
established between the client and the server. The client then sends its authentication
information (user name and password) to the server to log in to the server.
16.6 SSH Implementation on the Switch
Your Switch supports SSH version 2 using RSA authentication and three encryption methods
(DES, 3DES and Blowfish). The SSH server is implemented on the Switch for remote
management and file transfer on port 22. Only one SSH connection is allowed at a time.
16.6.1 Requirements for Using SSH
You must install an SSH client program on a client computer (Windows or Linux operating
system) that is used to connect to the Switch over SSH.
Содержание ES-315
Страница 2: ......
Страница 7: ...Safety Warnings ES 315 ES 315 F User s Guide 7 ...
Страница 8: ...Safety Warnings ES 315 ES 315 F User s Guide 8 ...
Страница 10: ...Contents Overview ES 315 ES 315 F User s Guide 10 ...
Страница 21: ...21 PART I Introduction and Hardware Getting to Know Your Switch 23 Hardware Overview 27 ...
Страница 22: ...22 ...
Страница 26: ...Chapter 1 Getting to Know Your Switch ES 315 ES 315 F User s Guide 26 ...
Страница 29: ...Chapter 2 Hardware Overview ES 315 ES 315 F User s Guide 29 Figure 7 Base Panel ES 315 F POWER ...
Страница 30: ...Chapter 2 Hardware Overview ES 315 ES 315 F User s Guide 30 ...
Страница 32: ...32 ...
Страница 56: ...56 ...
Страница 84: ...Chapter 13 Multicast ES 315 ES 315 F User s Guide 84 Figure 41 MVR Group Configuration Example ...
Страница 85: ...85 PART IV IP Application Static Route 87 ...
Страница 86: ...86 ...
Страница 90: ...Chapter 14 Static Route ES 315 ES 315 F User s Guide 90 ...
Страница 91: ...91 PART V Management Maintenance 93 Access Control 99 Diagnostic 113 Syslog 115 MAC Table 119 ARP Table 121 ...
Страница 92: ...92 ...
Страница 112: ...Chapter 16 Access Control ES 315 ES 315 F User s Guide 112 ...
Страница 114: ...Chapter 17 Diagnostic ES 315 ES 315 F User s Guide 114 ...
Страница 118: ...Chapter 18 Syslog ES 315 ES 315 F User s Guide 118 ...
Страница 123: ...Chapter 20 ARP Table ES 315 ES 315 F User s Guide 123 ...
Страница 124: ...Chapter 20 ARP Table ES 315 ES 315 F User s Guide 124 ...
Страница 125: ...125 PART VI Troubleshooting and Product Specifications Troubleshooting 127 Product Specifications 131 ...
Страница 126: ...126 ...
Страница 130: ...Chapter 21 Troubleshooting ES 315 ES 315 F User s Guide 130 ...
Страница 136: ...Chapter 22 Product Specifications ES 315 ES 315 F User s Guide 136 ...
Страница 138: ...138 ...
Страница 152: ...Appendix B Common Services ES 315 ES 315 F User s Guide 152 ...
Страница 156: ...Appendix C Legal Information ES 315 ES 315 F User s Guide 156 ...
Страница 162: ...Appendix D Customer Support ES 315 ES 315 F User s Guide 162 ...