The supported SSH encryption and authentication methods are listed below.

Server Host Authentication—Client RSA authenticates the switch in the beginning of every connection

Key Exchange—RSA

Encryption:

AES256-CBC

AES192-CBC

AES128-CBC

3DES-CBC

3DES

ARCFOUR

User Authentication—Local password authentication; Remote Authentication Dial-in User Service (RADIUS) The following SSH clients are supported:

SSH 3.0.1 for Linux (freeware)

SecureCRT® 4.1.8 (VanDyke Technologies, Inc.)

OpenSSH_3.9 for Linux (FC 3)

FedoraCore 3 for SCP commands

PuTTY Release 0.58 (Simon Tatham) for Windows

NOTE: This switch implementation of SSH is based on versions 1.5 and 2.0, and supports SSH clients from version 1.0 through version 2.0. SSH clients of other versions are not supported. You may configure the client software to use protocol SSH version 1 or version 2.

By default, SSH service is not enabled on the switch. Once the IP parameters are configured, you can access the ISCLI to enable SSH.

To establish an SSH connection with the switch, run the SSH program on the workstation by issuing the ssh command, followed by the user account name and the switch IP address:

>># ssh <user>@<1Gb Intelligent L2 Switch IP address>

You will then be prompted to enter your password.

NOTE: The first time you run SSH from the workstation, a warning message might appear. At the prompt, enter yes to continue.

Accessing the switch

To enable better switch management and user accountability, this switch provides different levels or classes of user access. Levels of access to the CLI and Web management functions and screens increase as needed to perform various switch management tasks. The three levels of access are:

User— Interaction with the switch is completely passive—nothing can be changed on this switch. Users may display information that has no security or privacy implications, such as switch statistics and current operational state information.

Operator— Interaction with the switch is completely passive—nothing can be changed on this switch. Users may display information that has no security or privacy implications, such as switch statistics and current operational state information.

Administrator— Administrators are the only ones that may make permanent changes to the switch configuration—changes that are persistent across a reload/reset of the switch. Administrators can access switch functions to configure and troubleshoot problems on this switch. Because administrators can also make temporary (operator-level) changes as well, they must be aware of the interactions between temporary and permanent changes.

Access to switch functions is controlled through the use of unique usernames and passwords. Once you are connected to the switch via the local console, Telnet, or SSH, you are prompted to enter a password. The password entered determines the access level. The default user names/password for each access level is listed in the following table.

NOTE: It is recommended that you change default switch passwords after initial configuration and as regularly as required under your network security policies. For more information, see the “Setting passwords” section in the “First-time configuration” chapter.

ISCLI Reference 8

Page 8
Image 8
NEC N8406-022 manual Accessing the switch, # ssh user@1Gb Intelligent L2 Switch IP address

N8406-022 specifications

The NEC N8406-022 is a robust and versatile networking device designed primarily for organizations requiring high-performance connectivity solutions. As part of NEC's extensive portfolio of networking equipment, the N8406-022 is engineered to address the demands of modern enterprise environments, ensuring seamless communication and data processing capabilities.

One of the key features of the N8406-022 is its multi-layer switching functionality. This device supports Layer 2 and Layer 3 switching, allowing for efficient data routing and reducing latency within local area networks (LANs). This capability is particularly beneficial for businesses that rely on real-time data access and transfer, such as those in financial services, media, and telecommunications.

The N8406-022 is equipped with advanced Quality of Service (QoS) features that help prioritize critical network traffic. This means that voice and video data packets can be given precedence over less time-sensitive information, ensuring that essential communication remains clear and uninterrupted. This is crucial for organizations leveraging VoIP and video conferencing solutions.

In terms of connectivity, the NEC N8406-022 offers a variety of ports, including multiple Gigabit Ethernet ports, which facilitate high-speed data transfer and enable seamless integration into existing network infrastructures. The device may also include 10 Gigabit SFP+ ports, providing the flexibility for high-capacity uplinks to support bandwidth-intensive applications and storage solutions.

Security is another focal point of the NEC N8406-022, with integrated features such as VLAN support, access control lists (ACLs), and port security measures. These capabilities protect sensitive data from unauthorized access and ensure that only legitimate users and devices can connect to the network.

Moreover, the N8406-022 often incorporates advanced energy-efficient technologies that minimize power consumption without compromising performance. This not only contributes to operational cost savings but also supports organizations in their sustainability efforts.

With its combination of performance, security, and energy efficiency, the NEC N8406-022 stands out as a reliable networking solution suitable for a wide range of enterprises looking to enhance their connectivity and operational efficiency. Whether deployed in data centers or as part of a corporate network, this device is built to meet the evolving demands of today’s digital landscape.