3 Configuring the Switch

Configuring the Secure Shell

The Berkley-standard includes remote access tools originally designed for Unix systems. Some of these tools have also been implemented for Microsoft Windows and other environments. These tools, including commands such as rlogin (remote login), rsh (remote shell), and rcp (remote copy), are not secure from hostile attacks.

The Secure Shell (SSH) includes server/client applications intended as a secure replacement for the older Berkley remote access tools. SSH can also provide remote management access to this switch as a secure replacement for Telnet. When the client contacts the switch via the SSH protocol, the switch generates a public-key that the client uses along with a local user name and password for access authentication. SSH also encrypts all data transfers passing between the switch and SSH-enabled management station clients, and ensures that data traveling over the network arrives unaltered.

Note that you need to install an SSH client on the management station to access the switch for management via the SSH protocol.

Note: The switch supports both SSH Version 1.5 and 2.0.

Command Usage

The SSH server on this switch supports both password and public key authentication. If password authentication is specified by the SSH client, then the password can be authenticated either locally or via a RADIUS or TACACS+ remote authentication server, as specified on the Authentication Settings page

(page 3-37). If public key authentication is specified by the client, then you must configure authentication keys on both the client and the switch as described in the following section. Note that regardless of whether you use public key or password authentication, you still have to generate authentication keys on the switch (SSH Host Key Settings) and enable the SSH server (Authentication Settings).

To use the SSH server, complete these steps:

1.Generate a Host Key Pair – On the SSH Host Key Settings page, create a host public/private key pair.

2.Provide Host Public Key to Clients – Many SSH client programs automatically import the host public key during the initial connection setup with the switch. Otherwise, you need to manually create a known hosts file on the management station and place the host public key in it. An entry for a public key in the known hosts file would appear similar to the following example:

10.1.0.54 1024 35 15684995401867669259333946775054617325313674890836547254 15020245593199868544358361651999923329781766065830956 10825913212890233 76546801726272571413428762941301196195566782 59566410486957427888146206 51941746772984865468615717739390164779355942303577413098022737087794545 24083971752646358058176716709574804776117

3-42

Page 78
Image 78
LevelOne GSW-2692 manual Configuring the Secure Shell

GSW-2692 specifications

The LevelOne GSW-2692 is an advanced Layer 2 Gigabit Ethernet switch that is designed to cater to the networking needs of both small and medium-sized enterprises. Highly regarded for its reliability and performance, the GSW-2692 offers 24 Gigabit Ethernet ports, enabling seamless and high-speed data transfers across connected devices. With its robust design and versatile capabilities, this switch has earned its place as an essential component in modern IT infrastructure.

One of the standout features of the GSW-2692 is its extensive support for advanced networking technologies. The switch includes support for IEEE 802.1Q VLAN tagging, which allows users to create separate virtual networks for improved traffic management and enhanced security. By segregating network traffic, businesses can optimize bandwidth usage and reduce congestion, contributing to overall increased network performance.

Additionally, the GSW-2692 supports Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP), ensuring loop-free network topology. This capability is crucial in larger networking environments where multiple switches are interconnected, as it prevents broadcast storms and enhances network resilience. The switch also includes features such as port mirroring, which provides administrators with the capability to monitor network traffic in real-time for troubleshooting and analysis.

Power over Ethernet (PoE) support is another significant advantage of the GSW-2692. With PoE functionality, it enables the switch to deliver electrical power along with data to connected devices such as IP cameras, VoIP phones, and wireless access points, eliminating the need for additional power sources and simplifying installations.

In terms of physical characteristics, the LevelOne GSW-2692 is designed for efficient heat dissipation and features a fanless design, which ensures silent operation. Its desktop or rack-mountable options make it flexible for various installation environments. The switch also features a web-based management interface, which simplifies the configuration and monitoring processes, allowing for intuitive management of network settings.

Overall, the LevelOne GSW-2692 stands out as a feature-rich, reliable, and high-performance networking solution that meets the demands of modern enterprises. Its combination of advanced technologies, scalability, and ease of use makes it an excellent choice for businesses looking to enhance their network infrastructure.