EasyManuals Logo

Cisco Small Business 200 Series Administration Guide

Cisco Small Business 200 Series
337 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #284 background imageLoading...
Page #284 background image
Security: SSH Client
SSH Client Authentication
Cisco Small Business 200 Series Smart Switch Administration Guide 283
21
Server public key fingerprint
When SSH server authentication is enabled, the SSH client running on the device authenticates the SSH
server using the following authentication process:
The device calculates the fingerprint of the received SSH server’s public key.
The device searches the SSH Trusted Servers table for the SSH server’s IP address/host name. One
of the following can occur:
- If a match is found, both for the server’s IP address/host name and its fingerprint, the server is
authenticated.
- If a matching IP address/host name is found, but there is no matching fingerprint, the search
continues. If no matching fingerprint is found, the search is completed and authentication fails.
- If no matching IP address/host name is found, the search is completed and authentication fails.
If the entry for the SSH server is not found in the list of trusted servers, the process fails.
SSH Client Authentication
SSH client authentication by password is enabled by default, with the username/password being
anonymous”.
The user must configure the following information for authentication:
The authentication method to be used.
The username/password or public/private key pair.
In order to support auto configuration of an out-of-box device (device with factory default configuration),
SSH server authentication is disabled by default.
Supported Algorithms
When the connection between a device (as an SSH client) and an SSH server is established, the client and
SSH server exchange data in order to determine the algorithms to use in the SSH transport layer.
The following algorithms are supported on the client side:
Key Exchange Algorithm-diffie-hellman
Encryption Algorithms
- aes128-cbc

Table of Contents

Other manuals for Cisco Small Business 200 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Small Business 200 Series and is the answer not in the manual?

Cisco Small Business 200 Series Specifications

General IconGeneral
BrandCisco
ModelSmall Business 200 Series
CategorySwitch
LanguageEnglish

Related product manuals