User manual

C
HAPTER
4
| Configuring the Switch
Configuring Security
– 64 –
CONFIGURING SSH Use the SSH Configuration page to configure access to the Secure Shell
(SSH) management interface. SSH provides remote management access to
this switch as a secure replacement for Telnet. When the client contacts the
switch via the SSH protocol, the switch generates a public-key that the
client uses along with a local user name and password for access
authentication. SSH also encrypts all data transfers passing between the
switch and SSH-enabled management station clients, and ensures that
data traveling over the network arrives unaltered.
PATH
Advanced Configuration, Security, Switch, SSH
USAGE GUIDELINES
You need to install an SSH client on the management station to access
the switch for management via the SSH protocol. The switch supports
both SSH Version 1.5 and 2.0 clients.
SSH service on this switch only supports password authentication. The
password can be authenticated either locally or via a RADIUS or
TACACS+ remote authentication server, as specified on the Auth
Method menu (page 61).
To use SSH with password authentication, the host public key must still
be given to the client, either during initial connection or manually
entered into the known host file. However, you do not need to configure
the client's keys.
The SSH service on the switch supports up to four client sessions. The
maximum number of client sessions includes both current Telnet
sessions and SSH sessions.
PARAMETERS
These parameters are displayed:
Mode - Allows you to enable/disable SSH service on the switch.
(Default: Enabled)
WEB INTERFACE
To configure SSH:
1. Click Advanced Configuration, Security, Switch, SSH.
2. Enable SSH if required.
3. Click Save.
Figure 16: SSH Configuration