Chapter 24: Security: Ssh Server; Overview - Cisco 350 Series Administration Manual

Managed switches
Hide thumbs Also See for 350 Series:
Table of Contents

Advertisement

Security: SSH Server

Overview

Cisco 350, 350X and 550X Series Managed Switches, Firmware Release 2.4, ver 0.4
This section describes how to establish an SSH session on the device.
It covers the following topics:
Overview
Common Tasks
SSH User Authentication
SSH Server Authentication
The SSH Server feature enables a remote users to establish SSH sessions to the device. This
is similar to establishing a telnet session, except the session is secured.
The device, as a SSH server, supports SSH User Authentication which authenticates a remote
user either by password, or by public key. At the same time, the remote user as a SSH client
can perform SSH Server Authentication to authenticate the device using the device public key
(fingerprint).
SSH Server can operate in the following modes:
By Internally-generated RSA/DSA Keys (Default Setting)—An RSA and a DSA
key are generated. Users log on the SSH Server application and are automatically
authenticated to open a session on the device when they supply the IP address of the
device.
Public Key Mode—Users are defined on the device. Their RSA/DSA keys are
generated in an external SSH server application, such as PuTTY. The public keys are
entered in the device. The users can then open an SSH session on the device through
the external SSH server application.
20
380

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents