Configuring CLI over SSH using Public Key Authentication
When using a Secure Shell (SSH) connection for secure access to the device's CLI, the device uses the username-password method for authenticating users, by default. To increase security, you can use RSA or ECDSA public keys for user authentication instead of passwords. In this setup, when establishing an SSH connection, the device checks that the SSH private key of the client (user) matches the public key configured for the user on the device.
This section describes how to enable SSH for public key authentication and how to configure SSH public key authentication on the following operating systems:
■ | Windows using PuTTY (see Configuring SSH Public Key Authentication on Windows) |
■ | Linux using OpenSSH (see Configuring SSH Public Key Authentication on Linux) |