Configuring Ssh; About Ssh - Cisco 4215 - Intrusion Detection Sys Sensor Configuration Manual

Configuration guide
Hide thumbs Also See for 4215 - Intrusion Detection Sys Sensor:
Table of Contents

Advertisement

Configuring SSH

-----------------------------------------------
sensor(config-hos-ena)#
Exit NTP configuration mode:
Step 8
sensor(config-hos-ena)# exit
sensor(config-hos)# exit
Apply Changes:?[yes]
Press Enter to apply the changes or type
Step 9
Configuring SSH
This section describes how to configure SSH on the sensor, and contains the following topics:

About SSH

SSH provides strong authentication and secure communications over channels that are not secure.
SSH encrypts your connection to the sensor and provides a key so you can validate that you are
connecting to the correct sensor. SSH also provides authenticated and encrypted access to other devices
that the sensor connects to for blocking.
SSH authenticates the hosts or networks using one or more of the following:
SSH protects against the following:
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 5.0
4-30
-----------------------------------------------
-----------------------------------------------
ntp-servers (min: 1, max: 1, current: 1)
-----------------------------------------------
ip-address: 10.16.0.0
key-id: 100
-----------------------------------------------
About SSH, page 4-30
Adding Hosts to the Known Hosts List, page 4-31
Adding SSH Authorized Public Keys, page 4-32
Generating a New SSH Server Key, page 4-34
Password
User RSA public key
IP spoofing—A remote host sends out packets pretending to come from another trusted host.
SSH even protects against a spoofer on the local network who can pretend he is your router to the
outside.
IP source routing—A host pretends an IP packet comes from another trusted host.
DNS spoofing—An attacker forges name server records.
Interception of clear text passwords and other data by intermediate hosts.
to discard them.
no
Chapter 4
Initial Configuration Tasks
78-16527-01

Advertisement

Table of Contents
loading

Table of Contents