Using Secure Shell

Logging Into the Switch

 

 

 

 

Secure Shell Authentication

Secure Shell authentication is accomplished in several phases using industry standard algorithms and exchange mechanisms. The authentication phase is identical for Secure Shell and Secure Shell SFTP. The following sections describe the process in detail.

Protocol Identification

When the Secure Shell client in the OmniSwitch connects to a Secure Shell server, the server accepts the connection and responds by sending back an identification string. The client will parse the server’s identi- fication string and send an identification string of its own. The purpose of the identification strings is to validate that the attempted connection was made to the correct port number. The strings also declare the protocol and software version numbers. This information is needed on both the client and server sides for debugging purposes.

At this point, the protocol identification strings are in human-readable form. Later in the authentication process, the client and the server switch to a packet-based binary protocol, which is machine readable only.

Algorithm and Key Exchange

The OmniSwitch Secure Shell server is identified by one or several host-specific DSA keys. Both the client and server process the key exchange to choose a common algorithm for encryption, signature, and compression. This key exchange is included in the Secure Shell transport layer protocol. It uses a key agreement to produce a shared secret that cannot be determined by either the client or the server alone. The key exchange is combined with a signature and the host key to provide host authentication. Once the exchange is completed, the client and the server turn encryption on using the selected algorithm and key. The following elements are supported:

Host Key Type

DSA

 

 

Cipher Algorithms

AES, Blowfish, Cast, 3DES, Arcfour, Rijndael

 

 

Signature Algorithms

MD5, SHA1

 

 

Compression Algorithms

None Supported

 

 

Key Exchange Algorithms

diffie-hellman-group-exchange-sha1

 

diffie-hellman-group1-sha1

 

 

Note. The OmniSwitch generates a 512 bit DSA host key at initial startup. The DSA key on the switch is made up of two files contained in the /flash/network directory; the public key is called ssh_host_dsa_key.pub, and the private key is called ssh_host_dsa_key. To generate a different DSA key, use the Secure Shell tools available on your Unix or Windows system and copy the files to the /flash/ network directory on your switch. The new DSA key will take effect after the OmniSwitch is rebooted.

Authentication Phase

When the client tries to authenticate, the server determines the process used by telling the client which authentication methods can be used. The client has the freedom to attempt several methods listed by the server. The server will disconnect itself from the client if a certain number of failed authentications are attempted or if a timeout period expires. Authentication is performed independent of whether the Secure Shell interface or the SFTP file transfer protocol will be implemented.

page 1-10

OmniSwitch 6600 Family Switch Management Guide March 2005

Page 26
Image 26
Alcatel Carrier Internetworking Solutions omniswitch manual Secure Shell Authentication, Protocol Identification

omniswitch specifications

Alcatel Carrier Internetworking Solutions offers the OmniSwitch series, renowned for its robust capabilities in delivering high-performance networking solutions tailored for a variety of enterprise and service provider environments. The OmniSwitch series is particularly recognized for its scalability, flexibility, and the depth of its feature set, making it a popular choice for organizations that demand reliable and efficient networking solutions.

One of the standout features of the OmniSwitch series is its advanced Layer 2 and Layer 3 switching capabilities, providing organizations with essential support for IP routing and robust Ethernet networking. This versatility ensures that the switch can seamlessly integrate into existing network architectures, facilitating smooth upgrade paths in response to evolving business needs. The OmniSwitch includes support for multiple protocols like RIP, OSPF, and BGP, making it suitable for complex networking topologies.

In terms of performance, OmniSwitch devices are engineered to handle high bandwidth demands. With features such as hardware-based forwarding, they ensure low latency and minimal packet loss, which are critical for applications sensitive to delays such as VoIP and video conferencing. Furthermore, they support Power over Ethernet (PoE), allowing users to power devices like IP phones and security cameras directly through the network.

Security is another key characteristic of the OmniSwitch series. It includes advanced security features such as robust access control lists (ACLs), port security, and built-in support for IEEE 802.1X authentication. These features collectively enhance the security posture of the network, protecting sensitive data and ensuring that only authorized devices can access the network resources.

The OmniSwitch is also designed with redundancy and reliability in mind. Features like Rapid Spanning Tree Protocol (RSTP) and Virtual Router Redundancy Protocol (VRRP) ensure that network uptime is maximized and that failover is swift in the event of a hardware failure. This makes it a viable option for organizations that cannot afford downtime.

In addition to these features, Alcatel's OmniSwitch series comes equipped with a user-friendly management interface. This interface simplifies the setup, configuration, and monitoring of the network, making it accessible even to those with limited networking expertise. Through intuitive dashboards and support for SNMP, administrators can manage their networks effectively.

In conclusion, Alcatel Carrier Internetworking Solutions' OmniSwitch series offers a comprehensive suite of features tailored to meet the needs of modern networks. With its blend of performance, scalability, security, and ease of management, the OmniSwitch stands out as a preferred choice for businesses seeking to enhance their networking infrastructure.