Installation manual

4-126
SIGNAMAX LLC • www.signamax.eu
To use the SSH server, complete these steps:
1. Generate a Host Key Pair – Use the ip ssh crypto host-key generate command to
create a host public/private key pair.
2. Provide Host Public Key to Clients – Many SSH client programs automatically import
the host public key during the initial connection setup with the switch. Otherwise, you
need to manually create a known hosts file on the management station and place the
host public key in it. An entry for a public key in the known hosts file would appear
similar to the following example:
10.1.0.54 1024 35 15684995401867669259333946775054617325313674890836547254
15020245593199868544358361651999923329781766065830956 10825913212890233
76546801726272571413428762941301196195566782 59566410486957427888146206
519417467729848654686157177393901647793559423035774130980227370877945452408
3971752646358058176716709574804776117
3. Import Client’s Public Key to the Switch – Use the copy tftp public-key command to
copy a file containing the public key for all the SSH client’s granted management
access to the switch. (Note that these clients must be configured locally on the
switch via the User Accounts page as described on page 3-56.) The clients are
subsequently authenticated using these keys. The current firmware only accepts
public key files based on standard UNIX format as shown in the following example
for an RSA Version 1 key:
1024 35 1341081685609893921040944920155425347631641921872958921143173880
0555361616310517759408386863110929123222682851925437460310093718772119969631
7813662774141689851320491172048303392543241016379975923714490119380060902539
484084827178194372288402533115952134861022902978982721353267131629432532818
915045306393916643 steve@192.168.1.19
4. Set the Optional Parameters – Set other optional parameters, including the
authentication timeout, the number of retries, and the server key size.
5. Enable SSH Service – Use the ip ssh server command to enable the SSH server on
the switch.
6. Authentication – One of the following authentication methods is employed:
Password Authentication (for SSH v1.5 or V2 Clients)
a. The client sends its password to the server.
b. The switch compares the client's password to those stored in memory.
c. If a match is found, the connection is allowed.
Note:
To use SSH with only password authentication, the host public key must still be given
to the client, either during initial connection or manually entered into the known host
file. However, you do not need to configure the client’s keys.