Restrictions For X.509V3 Certificates For Ssh Authentication - Cisco Catalyst 4500 Series Software Configuration Manual

Cisco ios xe release 3.9.xe and cisco ios release 15.2(5)ex
Hide thumbs Also See for Catalyst 4500 Series:
Table of Contents

Advertisement

Restrictions for X.509v3 Certificates for SSH Authentication

Restrictions for X.509v3 Certificates for SSH Authentication
Information About X.509v3 Certificates for SSH Authentication
X.509v3 Certificates for SSH Authentication Overview
The Secure Shell (SSH) protocol provides a secure remote access connection to network devices. The
communication between the client and server is encrypted.
There are two SSH protocols that use public key cryptography for authentication. The Transport Layer
Protocol, uses a digital signature algorithm (called the public key algorithm) to authenticate the server
to the client. And the User Authentication Protocol uses a digital signature to authenticate (public key
authentication) the client to the server.
The validity of the authentication depends upon the strength of the linkage between the public signing
key and the identity of the signer. Digital certificates, such as those in X.509 Version 3 (X.509v3), are
used to provide identity management. X.509v3 uses a chain of signatures by a trusted root certification
authority and intermediate certificate authorities to bind a public signing key to a specific digital
identity. This implementation allows the use of a public key algorithm for server and user authentication,
and allows SSH to verify the identity of the owner of a key pair via digital certificates, signed and issued
by a Certificate Authority (CA).
Server and User Authentication Using X.509v3
For server authentication, the Secure shell (SSH) server sends its own certificate to the SSH client for
verification. This server certificate is associated with the trustpoint configured in the server certificate
profile (ssh-server-cert-profile-server configuration mode).
For user authentication, the SSH client sends the user's certificate to the IOS SSH server for verification.
The SSH server validates the incoming user certificate using public key infrastructure (PKI) trustpoints
configured in the server certificate profile (ssh-server-cert-profile-user configuration mode).
By default, certificate-based authentication is enabled for server and user at the IOS SSH server end.
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
50-2
The X.509v3 Certificates for SSH Authentication feature implementation is applicable only on the
Cisco IOS Secure Shell (SSH) server side.
The Cisco IOS SSH server supports only the x509v3-ssh-rsa algorithm-based certificate for server
and user authentication.
The Rivest, Shamir, and Adelman (RSA) 2-factor authentication on Catalyst 4506 SUP7L-E
switches and Cisco Identity Services Engine (ISE) does not work correctly, when a user enters the
incorrect password. Normal authentication and interworking with Cisco Adaptive Security
Appliance (ASA) works fine. Configure the ip ssh server algorithm authentication keyboard
command for the authentication to work.
X.509v3 Certificates for SSH Authentication Overview, page 50-2
Server and User Authentication Using X.509v3, page 50-2
OCSP Response Stapling, page 50-3
Chapter 50
X.509v3 Certificates for SSH Authentication

Advertisement

Table of Contents
loading

Table of Contents