Within step two, the exchange of public keys, Cisco identifies nine sub-steps for exchanging and verifying.

  1. Call the remote administrator and identify who the passive and active sides will be.
  2. The passive administrator enables an exchange connection.
  3. The active administrator initiates the exchange, sending the public key.
  4. If the exchange was successful, both ends will observe the serial number and fingerprint of the active side's public key.
  5. Once the passive administrator has verified the active side's public key via voice, the passive administrator accepts the public key.