DES-3226L Layer 2 Fast Ethernet Switch User's Guide
SSH C
The steps required to use the SSH protocol for secure
communication between a remote PC (the SSH Client) and the
Switch (the SSH Server), are as follows:
Create a user account with admin-level access using
•
the create account admin <username> <password>
command. In the example presented below, the
username SSHtest is used. This is identical to creating
any other admin-lever User account on the Switch,
including specifying a password. This password is used
to login to the Switch, once secure communication has
beenestablished using the SSH protocol.
Configure
the
•
authorization method to identify users that are allowed
to establish SSH connections with the Switch using the
config ssh user authmode command. There are three
choices as to the method SSH will use to authorize the
user, and they are password, publickey and hostbased.
Configure the encryption algrothim that SSH will use to
•
encrypt and decrypt messages sent between the SSH
Client and the SSH Server. Again, there are some
choices to make, but Blowfish is used in the example
presented below.
Finally, enable SSH on the Switch using the enable ssh
•
command.
OMMANDS
user
account
to
use
209
22
a
specified