Product guide
x
Public Key Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5
Steps for Configuring and Using SSH
for Switch and Client Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-6
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-8
Configuring the Switch for SSH Operation . . . . . . . . . . . . . . . . . . . . . . 8-9
1. Assigning a Local Login (Operator) and
Enable (Manager) Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-9
2. Generating the Switch’s Public and Private Key Pair . . . . . . . . . . 8-10
3. Providing the Switch’s Public Key to Clients . . . . . . . . . . . . . . . . . . 8-12
4. Enabling SSH on the Switch and Anticipating SSH
Client Contact Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-15
5. Configuring the Switch for SSH Authentication . . . . . . . . . . . . . . . 8-18
6. Use an SSH Client To Access the Switch . . . . . . . . . . . . . . . . . . . . . 8-21
Further Information on SSH Client Public-Key Authentication . 8-22
Messages Related to SSH Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-27
9 Configuring Secure Socket Layer (SSL)
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-3
Prerequisite for Using SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5
Steps for Configuring and Using SSL for Switch and Client
Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6
Configuring the Switch for SSL Operation . . . . . . . . . . . . . . . . . . . . . . 9-7
1. Assigning a Local Login (Operator) and
Enable (Manager)Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7
2. Generating the Switch’s Server Host Certificate . . . . . . . . . . . . . . . . 9-9
To Generate or Erase the Switch’s Server Certificate
with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-10
Comments on certificate fields. . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-11
Generate a Self-Signed Host Certificate with the Web browser
interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-13