Ssh Client Configuration - Cisco 500 series Administration Manual

Stackable managed switch
Hide thumbs Also See for 500 series:
Table of Contents

Advertisement

Using the SSH Client Feature
SSH Client Configuration Through the GUI
STEP 1
STEP 2
STEP 3
STEP 4
STEP 5
STEP 1
STEP 2
STEP 3
STEP 1
STEP 2
STEP 3
SSH Client Configuration Through the GUI
Cisco 500 Series Stackable Managed Switch Administration Guide
Workflow2:
To import the public/private keys from one switch to another:
Generate a public/private key in the SSH User Authentication page.
Set the SSD properties and create a new local passphrase in the
Data Management > Properties
Click Details to view the generated, encrypted keys, and copy them (including the
Begin and End footers) from the Details page to an external device. Copy the
public and private keys separately.
Log on to another switch and open the SSH User Authentication page. Select the
type of key required and click Edit. Paste in the public/private keys.
Click Apply to copy the public/private keys onto the second switch.
Workflow3:
To define a trusted server:
Enable SSH server authentication in the SSH Server Authentication page.
Click Add to add a new server and enter its identifying information.
Click Apply to add the server to the Trusted SSH Servers table.
Workflow4:
To change your password on an SSH server:
Identify the server in the Change User Password on SSH Server page.
Enter the fields.
Click Apply to change the password on the SSH server.
This section describes the pages used to configure the SSH Client feature.
SSH User Authentication
Use this page to select an SSH user authentication method, set a username and
password on the switch, if the password method is selected or generate an RSA
or DSA key, if the public/private key method is selected.
To select an authentication method, and set the username/password/keys.
page.
19
Secure Sensitive
353

Advertisement

Table of Contents
loading

Table of Contents