8-28
Configuring Secure Shell (SSH)
Further Information on SSH Client Public-Key Authentication
Copying a client-public-key into the switch requires the following:
■
One or more client-generated public keys. Refer to the documentation
provided with your SSH client application.
■
A copy of each client public key (up to ten) stored in a single text file
or individually on a TFTP server to which the switch has access.
Terminate all client public-keys in the file except the last one with a
<CR><LF>.
N o t e o n P u b l i c
K e y s
The actual content of a public key entry in a public key file is determined by
the SSH client application generating the key. (Although you can manually add
or edit any comments the client application adds to the end of the key, such
as the
at the end of the key in figure 8-13 on page
Syntax:
copy tftp pub-key-file <
ip-address
> <
filename
> [<append | manager |
operator>] [oobm]
Copies a public key file from a TFTP server into flash
memory in the switch.
The
append
option adds the key(s) for operator access.
The
manager
option replaces the key(s) for manager
access; follow with the ‘append’ option to add the key(s).
The
operator
option replaces the key(s) for operator
access (default); follow with the ‘append’ option to add
the key(s).
For switches that have a separate out-of-band manage-
ment port, the
oobm
parameter specifies that the traffic
will go through the out-of-band management interface.
If this parameter is not specified, the traffic goes
through the data interface. The
oobm
parameter is not
available on switches that do not have a separate out-
of-band management port. Refer to Appendix I, “Net-
work Out-of-Band Management” in the Management
and Configuration Guide for more information on out-
of-band management.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......