iTable of Contents1 SSH Configuration ·····································································································································1-1SSH Overview·········································································································································1-1Introduction to SSH ·························································································································1-1Algorithm and Key ···························································································································1-1SSH Operating Process ··················································································································1-2SSH Server and Client ····························································································································1-4Configuring the SSH Server····················································································································1-51.1.1 Configuring the User Interfaces for SSH Clients····································································1-6Configuring the SSH Management Functions·················································································1-7Configuring the SSH Server to Be Compatible with SSH1 Clients ·················································1-8Configuring Key Pairs······················································································································1-8Creating an SSH User and Specifying an Authentication Type ······················································1-9Specifying a Service Type for an SSH User on the Server···························································1-11Configuring the Public Key of a Client on the Server ····································································1-12Assigning a Public Key to an SSH User························································································1-12Exporting the Host Public Key to a File ·························································································1-13Configuring the SSH Client ···················································································································1-14SSH Client Configuration Task List ·······························································································1-14Configuring an SSH Client that Runs SSH Client Software ··························································1-14Configuring an SSH Client Assumed by an SSH2-Capable Switch··············································1-20Displaying and Maintaining SSH Configuration ····················································································1-23Comparison of SSH Commands with the Same Functions ··································································1-23SSH Configuration Examples ···············································································································1-24When Switch Acts as Server for Local Password Authentication ·················································1-24When Switch Acts as Server for Password and RADIUS Authentication ·····································1-27When Switch Acts as Server for Password and HWTACACS Authentication ······························1-32When Switch Acts as Server for Publickey Authentication ···························································1-34When Switch Acts as Client for Password Authentication ····························································1-40When Switch Acts as Client for Publickey Authentication·····························································1-41When Switch Acts as Client and First-Time Authentication is not Supported·······························1-44