Strict host key checking is brilliant for enforcing security because of the inability to SSH to any device but as we know, with increased security often comes increased complexity. ![]() When an SSH session is initiated from a client (with strict host key checking enabled) to a server, the connection will fail if the servers public key is not already stored within the client’s database. Strict host key checking is a method of enforcing security on public keys by ensuring a public key is stored in the client’s database before allowing secure communication with the client. If your not aware of what strict host key checking is, let me quickly break it down. When configuring SSH on a Firepower chassis, you’re given the ability to configure strict host key checking. This process doesn’t seem to be widely documented hence the reason for wanting to capture and share the process. ![]() ![]() In this article, I want to cover the process of adding SSH host key’s to the FXOS chassis’.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |