ECS3510-26P_Management Guide R02

Table Of Contents
C
HAPTER
13
| Security Measures
Configuring the Secure Shell
– 312 –
b. If the specified algorithm is supported by the switch, it notifies
the client to proceed with the authentication process. Otherwise,
it rejects the request.
c. The client sends a signature generated using the private key to
the switch.
d. When the server receives this message, it checks whether the
supplied key is acceptable for authentication, and if so, it then
checks whether the signature is correct. If both checks succeed,
the client is authenticated.
N
OTE
:
The SSH server supports up to four client sessions. The maximum
number of client sessions includes both current Telnet sessions and SSH
sessions.
N
OTE
:
The SSH server can be accessed using any configured IPv4 or IPv6
interface address on the switch.
CONFIGURING THE
SSH SERVER
Use the Security > SSH (Configure Global) page to enable the SSH server
and configure basic settings for authentication.
N
OTE
:
A host key pair must be configured on the switch before you can
enable the SSH server. See "Generating the Host Key Pair" on page 313.
CLI REFERENCES
"Secure Shell" on page 635
PARAMETERS
These parameters are displayed:
SSH Server Status – Allows you to enable/disable the SSH server on
the switch.
(Default: Disabled)
Version – The Secure Shell version number. Version 2.0 is displayed,
but the switch supports management access via either SSH Version 1.5
or 2.0 clients.
Authentication Timeout – Specifies the time interval in seconds that
the SSH server waits for a response from a client during an
authentication attempt. (Range: 1-120 seconds; Default: 120 seconds)
Authentication Retries – Specifies the number of authentication
attempts that a client is allowed before authentication fails and the
client has to restart the authentication process. (Range: 1-5 times;
Default: 3)
Server-Key Size Specifies the SSH server key size.
(Range: 512-896 bits; Default:768)