30.06.2015 Views

8.28 MB - Edge-Core

8.28 MB - Edge-Core

8.28 MB - Edge-Core

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3<br />

Configuring the Switch<br />

Configuring the Secure Shell<br />

The Berkley-standard includes remote access tools originally designed for Unix<br />

systems. Some of these tools have also been implemented for Microsoft Windows<br />

and other environments. These tools, including commands such as rlogin (remote<br />

login), rsh (remote shell), and rcp (remote copy), are not secure from hostile attacks.<br />

The Secure Shell (SSH) includes server/client applications intended as a secure<br />

replacement for the older Berkley remote access tools. SSH can also provide<br />

remote management access to this switch as a secure replacement for Telnet.<br />

When the client contacts the switch via the SSH protocol, the switch generates a<br />

public-key that the client uses along with a local user name and password for access<br />

authentication. SSH also encrypts all data transfers passing between the switch and<br />

SSH-enabled management station clients, and ensures that data traveling over the<br />

network arrives unaltered.<br />

Note that you need to install an SSH client on the management station to access the<br />

switch for management via the SSH protocol.<br />

Note: The switch supports both SSH Version 1.5 and 2.0 clients.<br />

Command Usage<br />

The SSH server on this switch supports both password and public key<br />

authentication. If password authentication is specified by the SSH client, then the<br />

password can be authenticated either locally or via a RADIUS or TACACS+ remote<br />

authentication server, as specified on the Authentication Settings page<br />

(page 3-35). If public key authentication is specified by the client, then you must<br />

configure authentication keys on both the client and the switch as described in the<br />

following section. Note that regardless of whether you use public key or password<br />

authentication, you still have to generate authentication keys on the switch (SSH<br />

Host Key Settings) and enable the SSH server (Authentication Settings).<br />

To use the SSH server, complete these steps:<br />

1. Generate a Host Key Pair – On the SSH Host Key Settings page, create a host<br />

public/private key pair.<br />

2. Provide Host Public Key to Clients – Many SSH client programs automatically<br />

import the host public key during the initial connection setup with the switch.<br />

Otherwise, you need to manually create a known hosts file on the management<br />

station and place the host public key in it. An entry for a public key in the known<br />

hosts file would appear similar to the following example:<br />

10.1.0.54 1024 35 15684995401867669259333946775054617325313674890836547254<br />

15020245593199868544358361651999923329781766065830956 10825913212890233<br />

76546801726272571413428762941301196195566782 59566410486957427888146206<br />

51941746772984865468615717739390164779355942303577413098022737087794545<br />

24083971752646358058176716709574804776117<br />

3-40

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!