Configuring The Secure Shell - Edge-Core ECS4610-24F Management Manual

24-port layer 3 gigabit ethernet switch
Hide thumbs Also See for ECS4610-24F:
Table of Contents

Advertisement

C
S
ONFIGURING THE
W
I
EB
NTERFACE
To replace the default secure-site certificate:
Click Security, HTTPS.
1.
Select Copy Certificate from the Step list.
2.
Fill in the TFTP server, certificate and private key file name, and private
3.
password.
Click Apply.
4.
Figure 144: Downloading the Secure-Site Certificate
S
ECURE
HELL
The Berkeley-standard includes remote access tools originally designed for
Unix systems. Some of these tools have also been implemented for
Microsoft Windows and other environments. These tools, including
commands such as rlogin (remote login), rsh (remote shell), and rcp
(remote copy), are not secure from hostile attacks.
The Secure Shell (SSH) includes server/client applications intended as a
secure replacement for the older Berkeley remote access tools. SSH can
also provide remote management access to this switch as a secure
replacement for Telnet. When the client contacts the switch via the SSH
protocol, the switch generates a public-key that the client uses along with a
local user name and password for access authentication. SSH also encrypts
all data transfers passing between the switch and SSH-enabled
management station clients, and ensures that data traveling over the
network arrives unaltered.
You need to install an SSH client on the management station to
N
:
OTE
access the switch for management via the SSH protocol.
The switch supports both SSH Version 1.5 and 2.0 clients.
N
:
OTE
– 275 –
| Security Measures
C
13
HAPTER

Configuring the Secure Shell

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents