Configuring The Secure Shell - Edge-Core ECS3510-26P Management Manual

26-port fast ethernet layer 2 switch
Hide thumbs Also See for ECS3510-26P:
Table of Contents

Advertisement

C
S
ONFIGURING THE
Private Key Source File Name – Name of private key file stored on
the TFTP server.
Private Password – Password stored in the private key file. This
password is used to verify authorization for certificate use, and is
verified when downloading the certificate to the switch.
Confirm Password – Re-type the string entered in the previous field
to ensure no errors were made. The switch will not download the
certificate if these two fields do not match.
W
I
EB
NTERFACE
To replace the default secure-site certificate:
Click Security, HTTPS.
1.
Select Copy Certificate from the Step list.
2.
Fill in the TFTP server, certificate and private key file name, and private
3.
password.
Click Apply.
4.
Figure 165: Downloading the Secure-Site Certificate
S
ECURE
HELL
The Berkeley-standard includes remote access tools originally designed for
Unix systems. Some of these tools have also been implemented for
Microsoft Windows and other environments. These tools, including
commands such as rlogin (remote login), rsh (remote shell), and rcp
(remote copy), are not secure from hostile attacks.
Secure Shell (SSH) includes server/client applications intended as a secure
replacement for the older Berkeley remote access tools. SSH can also
provide remote management access to this switch as a secure replacement
for Telnet. When the client contacts the switch via the SSH protocol, the
switch generates a public-key that the client uses along with a local user
name and password for access authentication. SSH also encrypts all data
transfers passing between the switch and SSH-enabled management
– 309 –
| Security Measures
C
13
HAPTER

Configuring the Secure Shell

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents