Configuring Secure Shell (SSH)
Further Information on SSH Client
The section titled “5. Configure the Switch for SSH Authentication” on page
When configured for SSH operation, the switch automatically attempts to use its own host
SSH clients that support client
(Note that even without using client
If you enable client
1.The client sends its public key to the switch with a request for authenti- cation.
2.The switch compares the client’s public key to those stored in the switch’s