2-16
Configuring Username and Password Security
Saving Security Credentials in a Config File
server application. (The encryption key is sometimes referred to as
“shared secret” or “secret” key.) For more information, see “
Authentication” on page 5-1 in this guide
.
shared secret (encryption) keys can be saved in a configuration file
by entering this command:
HP Switch(config)# tacacs-server key <keystring>
The option <
keystring
> is the encryption key (in clear text) used for secure
communication with all or a specific server.
RADIUS Shared-Secret Key Authentication
You can use RADIUS servers as the primary authentication method for users
who request access to a switch through Telnet, SSH, WebAgent, console, or
port-access (802.1X). The shared secret key is a text string used to encrypt
data in RADIUS packets transmitted between a switch and a RADIUS server
during authentication sessions. Both the switch and the server have a copy of
the key; the key is never transmitted across the network. For more
information, refer to “3. Configure the Switch To Access a RADIUS Server” on
page 6-14 in this guide
.
RADIUS shared secret (encryption) keys can be saved in a configuration file
by entering this command:
HP Switch(config)# radius-server key <keystring>
The option <
keystring
> is the encryption key (in clear text) used for secure
communication with all or a specific RADIUS server.
SSH Client Public-Key Authentication
Secure Shell version 2 (SSHv2) is used by HP switches to provide remote
access to SSH-enabled management stations. Although SSH provides Telnet-
like functions, unlike Telnet, SSH provides encrypted, two-way authenticated
transactions. SSH client public-key authentication is one of the types of
authentication used.
Client public-key authentication uses one or more public keys (from clients)
that must be stored on the switch. Only a client with a private key that matches
a public key stored on the switch can gain access at the manager or operator
level. For more information about how to configure and use SSH public keys
to authenticate SSH clients that try to connect to the switch, refer to
“Configuring Secure Shell (SSH)” on page 8-1 in this guide.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......