EasyManuals Logo

Edge-Core ECS4620-28T User Manual

Edge-Core ECS4620-28T
2143 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #320 background imageLoading...
Page #320 background image
Chapter 12
| Security Measures
Configuring the Secure Shell
– 314
Public Key Authentication – When an SSH client attempts to contact the switch,
the SSH server uses the host key pair to negotiate a session key and encryption
method. Only clients that have a private key corresponding to the public keys
stored on the switch can access it. The following exchanges take place during
this process:
Authenticating SSH v1.5 Clients
a. The client sends its RSA public key to the switch.
b. The switch compares the client's public key to those stored in memory.
c. If a match is found, the switch uses its secret key to generate a random
256-bit string as a challenge, encrypts this string with the users public
key, and sends it to the client.
d. The client uses its private key to decrypt the challenge string, computes
the MD5 checksum, and sends the checksum back to the switch.
e. The switch compares the checksum sent from the client against that
computed for the original string it sent. If the two checksums match,
this means that the client's private key corresponds to an authorized
public key, and the client is authenticated.
Authenticating SSH v2 Clients
a. The client first queries the switch to determine if DSA public key
authentication using a preferred algorithm is acceptable.
b. If the specified algorithm is supported by the switch, it notifies the
client to proceed with the authentication process. Otherwise, it rejects
the request.
c. The client sends a signature generated using the private key to the
switch.
d. When the server receives this message, it checks whether the supplied
key is acceptable for authentication, and if so, it then checks whether
the signature is correct. If both checks succeed, the client is
authenticated.
Note:
The SSH server supports up to eight client sessions. The maximum number
of client sessions includes both current Telnet sessions and SSH sessions.
Note:
The SSH server can be accessed using any configured IPv4 or IPv6 interface
address on the switch.
Configuring the
SSH Server
Use the Security > SSH (Configure Global) page to enable the SSH server and
configure basic settings for authentication.
Note:
A host key pair must be configured on the switch before you can enable the
SSH server. See “Generating the Host Key Pair” on page 316.

Table of Contents

Other manuals for Edge-Core ECS4620-28T

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Edge-Core ECS4620-28T and is the answer not in the manual?

Edge-Core ECS4620-28T Specifications

General IconGeneral
BrandEdge-Core
ModelECS4620-28T
CategorySwitch
LanguageEnglish

Related product manuals