8-2
Configuring Secure Shell (SSH)
Overview
Client Public Key Authentication (Login/Operator Level) with User
Password Authentication (Enable/Manager Level).
This option uses
one or more public keys (from clients) that must be stored on the switch. Only
a client with a private key that matches a stored public key can gain access
to the switch. (The same private key can be stored on one or more clients.)
Figure 8-1. Client Public Key Authentication Model
N o t e
SSH in HP switches is based on the OpenSSH software toolkit. For more
information on OpenSSH, visit
www.openssh.com
.
Switch SSH and User Password Authentication .
This option is a subset
of the client public-key authentication shown in figure 8-1. It occurs if the
switch has SSH enabled but does not have login access (
login public-key
)
configured to authenticate the client’s key. As in figure 8-1, the switch authen-
ticates itself to SSH clients. Users on SSH clients then authenticate themselves
to the switch (login and/or enable levels) by providing passwords stored
locally on the switch or on a or RADIUS server. However, the client
does not use a key to authenticate itself to the switch.
Figure 8-2. Switch/User Authentication
HP
Switch
(SSH
Server)
1. Switch-to-Client SSH authentication.
2.Client-to-Switch (
login rsa
) authentication
3.User-to-Switch (enable password) authentication
options:
– Local
–
– RADIUS
– None
SSH
Client
Work-
Station
HP
Switch
(SSH
Server)
SSH
Client
Work-
Station
1. Switch-to-Client SSH
2. User-to-Switch (login password and
enable password authentication)
options:
– Local
–
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......