i 
Table of Contents 
1 SSH Configuration·····································································································································1-1 
SSH Overview·········································································································································1-1 
Introduction to SSH ·························································································································1-1 
Algorithm and Key ···························································································································1-1 
Asymmetric Key Algorithm ··············································································································1-2 
SSH Operating Process ··················································································································1-2 
SSH Server and Client Configuration Task List······················································································1-4 
Configuring the SSH Server····················································································································1-4 
Configuring the User Interfaces for SSH Clients·············································································1-5 
Configuring the SSH Management Functions·················································································1-6 
Configuring the SSH Server to Be Compatible with SSH1 Clients ·················································1-7 
Generating/Destroying Key Pairs····································································································1-7 
Creating an SSH User and Specifying an Authentication Type······················································1-8 
Specifying a Service Type for an SSH User····················································································1-9 
Configuring the Public Key of a Client on the Server······································································1-9 
Assigning a Public Key to an SSH User························································································1-10 
Exporting the RSA or DSA Public Key ··························································································1-11 
Configuring the SSH Client···················································································································1-12 
SSH Client Configuration Task List·······························································································1-12 
Configuring an SSH Client that Runs SSH Client Software··························································1-12 
Configuring an SSH Client Assumed by an SSH2-Capable Switch··············································1-18 
Displaying and Maintaining SSH Configuration····················································································1-20 
Comparison of SSH Commands with the Same Functions ··································································1-20 
SSH Configuration Examples ···············································································································1-21 
When Switch Acts as Server for Local Password Authentication ·················································1-21 
When Switch Acts as Server for Password and RADIUS Authentication·····································1-24 
When Switch Acts as Server for Password and HWTACACS Authentication ······························1-29 
When Switch Acts as Server for Publickey Authentication ···························································1-31 
When Switch Acts as Client for Password Authentication ····························································1-37 
When Switch Acts as Client for Publickey Authentication·····························································1-38 
When Switch Acts as Client and First-Time Authentication is not Supported····································1-41