1. Assigning a Local Login (Operator) and

Enable (Manager) Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9

2. Generating the Switch’s Public and Private Key Pair . . . . . . . . . .

4-10

3. Providing the Switch’s Public Key to Clients . . . . . . . . . . . . . . . . . . 4-12

4. Enabling SSH on the Switch and Anticipating SSH

Client Contact Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15

5. Configuring the Switch for SSH Authentication . . . . . . . . . . . . . . . 4-18

6. Use an SSH Client To Access the Switch . . . . . . . . . . . . . . . . . . . . . 4-21

Further Information on SSH Client Public-Key Authentication . 4-22

Messages Related to SSH Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27

5 Configuring Secure Socket Layer (SSL)

Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3 Prerequisite for Using SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4

Steps for Configuring and Using SSL for Switch and Client Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4

General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6 Configuring the Switch for SSL Operation . . . . . . . . . . . . . . . . . . . . . . 5-7

1. Assigning a Local Login (Operator) and

 

Enable (Manager)Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. 5-7

2. Generating the Switch’s Server Host Certificate . . . . . . . . . . . . . .

. 5-9

To Generate or Erase the Switch’s Server Certificate with

 

the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

5-10

Comments on certificate fields. . . . . . . . . . . . . . . . . . . . . . . . . . . .

5-11

Generate a Self-Signed Host Certificate with

 

the Web browser interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

5-13

Generate a CA-Signed server host certificate with

 

the Web browser interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

5-15

3. Enabling SSL on the Switch and

Anticipating SSL Browser Contact Behavior . . . . . . . . . . . . . . . 5-17 Using the CLI interface to enable SSL . . . . . . . . . . . . . . . . . . . . . . 5-19 Using the web browser interface to enable SSL . . . . . . . . . . . . . 5-19

Common Errors in SSL setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-21

vi