4

Configuring Secure Shell (SSH)

Contents

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3 Prerequisite for Using SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4 Public Key Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5

Steps for Configuring and Using SSH for Switch and Client ­ Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5

General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8

Configuring the Switch for SSH Operation

1. Assigning a Local Login (Operator) and Enable (Manager)

Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9

2. Generating the Switch’s Public and Private Key Pair . . . . . . . . . . 4-10

3. Providing the Switch’s Public Key to Clients . . . . . . . . . . . . . . . . . . 4-12

4. Enabling SSH on the Switch and Anticipating SSH

Client Contact Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15

5. Configuring the Switch for SSH Authentication . . . . . . . . . . . . . . . 4-18

6. Use an SSH Client To Access the Switch . . . . . . . . . . . . . . . . . . . . . 4-21

Further Information on SSH Client Public-Key Authentication . 4-22

Messages Related to SSH Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27

4-1