Configuring and managing IP interfaces and services 161
Nortel WLAN—Security Switch 2300 Series Configuration Guide

Managing SSH

WSS Software supports Secure Shell (SSH) Version 2. SSH provides secure management access to the CLI
over the network. SSH requires a valid username and password for access to the switch. When a user enters a
valid username and password, SSH establishes a management session and encrypts the session data.

Login timeouts

When you access the SSH server on a WSS, WSS Software allows you 10 seconds to press Enter for the
username prompt. After the username prompt is displayed, WSS Software allows 30 seconds to enter a valid
username and password to complete the login. If you do not press Enter or complete the login before the timer
expires, WSS Software ends the session. These timers are not configurable.

Enabling SSH

SSH is enabled by default. To disable or reenable it, use the following command:
set ip ssh server {enable | disable}
SSH requires an SSH authentication key. You can generate one or allow WSS Software to generate one. The
first time an SSH client attempts to access the SSH server on a WSS, the switch automatically generates a
1024-byte SSH key. If you want to use a 2048-byte key instead, use the following command to generate one:
WSS# crypto generate key ssh 2048
key pair generated
If a key has already been generated, the command replaces the old key with a new one. The new key takes
affect for all new SSH sessions.
You can verify the key using the following command:
show crypto key ssh
For example:
WSS# show crypto key ssh
ec:6f:56:7f:d1:fd:c0:28:93:ae:a4:f9:7c:f5:13:04
This command displays the checksum (also called a fingerprint) of the public key. When you initially connect
to the WSS with an SSH client, you can compare the SSH key checksum displayed by the WSS with the one
displayed by the client to verify that you really are connected to the WSS and not another device. Generally,
SSH clients remember the encryption key after the first connection, so you need to check the key only once.
The WSS stores the key in nonvolatile storage where the key remains even after software reboots.
Note. To ensure that all CLI management sessions are encrypted, after you configure
SSH, disable Telnet.