PDF(103.7 KB) View with Adobe Reader on a variety of devices
ePub(159.5 KB) View in various apps on iPhone, iPad, Android, Sony Reader, or Windows Phone
Mobi (Kindle)(289.4 KB) View on Kindle device or Kindle app on multiple devices
Updated:December 13, 2018
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Secure Shell (SSH) Server Authentication Configuration for SSH Clients on Sx500 Series Stackable Switches
The Secure Shell (SSH) server feature allows the user to establish a SSH session with the Sx500 Series Stackable Switches. An SSH session is just like a telnet session, but an SSH session is more secure. The security is obtained by the device when it generates the public and private keys automatically. These keys can also be changed by the user. An SSH session can be opened with the use of the PuTTY application.
This article provides information on how to enable SSH server authentication for SSH clients and define the trusted servers on Sx500 Series Stackable Switches.
• Sx500 Series Stackable Switches
SSH Server Authentication Configuration
Step 1. Log in to the web configuration utility and choose Security > SSH Client > SSH Server Authentication. The SSH Server Authentication page opens:
Step 2. Check Enable to enable the SSH server authentication.
Step 3. Click Apply to save the configuration.
Add Trusted SSH Server
Step 1. In the Trusted SSH Servers Table the IP address and the finger print of the SSH server can be found. Click Add to add the trusted ssh server. The Add Trusted SSH Server window appears.
Step 2. Click the By IP Address radio button to enter an IP address in the Server IP Address/Name field. Click the By name radio button to enter the name of the server in the Server IP Address/Name field.
Step 3. Click the Version 4 or Version 6 radio button to enter an IPv4 or IPv6 IP address, respectively, in the Server IP Address/Name field. IP Version 6 can only be selected if an IPv6 address has been configured on the device.
Step 4. Enter an IPv4 or IPv6 IP address of the trusted SSH user in the Server IP Address/Name field.
Step 5. Enter 16 pairs of hexadecimal values for the fingerprint of the SSH server in the Fingerprint field. To obtain the fingerprint value of the SSH server, navigate to Security > SSH Server > SSH Server Authentication. This is a feature of SSH to protect against an attack where a malicious user guides the client to a different server or computer to learn the username and password of the trusted SSH server. The client is advised to check the fingerprint of the server and then enter their credentials.