SSH

This section describes how to configure the SSH protocol.

SSH (secure shell) is a network protocol that allows data to be exchanged using a secure channel between two networked devices. SSH uses public-key cryptography to authenticate the remote computer and allows the remote computer to authenticate the user, if necessary. SSH is typically used to log into a remote machine and execute commands.

To access SSH screens, click System > SSH.

SSH Global Settings

Figure 1. SSH Global Settings


Screen Objective This screen allows the user to configure the SSH initial settings.
Navigation

System > SSH

Fields
  • SSH Status—select the status of the SSH module. The default option is Enabled. The list contains:
    • Enable—enables the SSH feature in the switch. SSH feature enables the user to log into a remote machine and execute commands.
    • Disable—disables the SSH feature in the switch. This action disconnects the secure channel.
  • Version compatibility is set at Version 2 and cannot be changed.
Fields
  • SSH CipherList—select a Cipher-List. The cipher list takes values as bit mask. Setting a bit indicates that the corresponding cipher-list will be used for encryption. The default option is DES-CBC in NON-FIPS mode and 3DES-CBC in FIPS mode. The options are:
    • ECDH_RSA_AES256_GCM_SHA256
    • ECDH_RSA_AES128_GCM_SHA256
    • ECDH_RSA_CHACHA20_POLY1305
    • DHE_RSA_AES256_GCM_SHA256
    • ECDH_ECDSA_AES128_GCM_SHA256
  • Trace Level—this option enables debug logging at specific levels.
    • None
    • Warning
    • Protocol
    • Packet
    • Functions
Buttons
  • Apply—modifies attributes and saves the changes.