|
Within step two, the exchange of public keys, Cisco identifies nine sub-steps for exchanging and verifying.
- Call the remote administrator and identify who the passive and active sides will be.
- The passive administrator enables an exchange connection.
- The active administrator initiates the exchange, sending the public key.
- If the exchange was successful, both ends will observe the serial number and fingerprint of the active side's public key.
- Once the passive administrator has verified the active side's public key via voice, the passive administrator accepts the public key.
|