Cisco 350 Series Administration Manual page 572

Managed switches
Hide thumbs Also See for 350 Series:
Table of Contents

Advertisement

21
386
Authentication information must be entered by the user, both on the device and on the SSH
server, although this guide does not describe server operations.
The following illustrates a typical network configuration in which the SCP feature might be
used.
Typical Network Configuration
SSH Server Authentication
A device, as an SSH client, only communicates with a trusted SSH server. When SSH server
authentication is disabled (the default setting), any SSH server is considered trusted. When
SSH server authentication is enabled, the user must add an entry for the trusted servers to the
Trusted SSH Servers Table. This table stores the following information per each SSH Trusted
server for a maximum of 16 servers, and contains the following information:
Server IP address/host name
Server public key fingerprint
When SSH server authentication is enabled, the SSH client running on the device
authenticates the SSH server using the following authentication process:
The device calculates the fingerprint of the received SSH server's public key.
The device searches the SSH Trusted Servers table for the SSH server's IP address/
host name. One of the following can occur:
-
If a match is found, both for the server's IP address/host name and its fingerprint,
the server is authenticated.
Cisco 350, 350X and 550X Series Managed Switches, Firmware Release 2.4, ver 0.4
Security: SSH Client
Overview

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents