2-17
Configuring Username and Password Security
Saving Security Credentials in a Config File
The SSH security credential that is stored in the running configuration file is
configured with the
ip ssh public-key
command used to authenticate SSH
clients for manager or operator access, along with the hashed content of each
SSH client public-key.
N o t e
The
ip ssh public-key
command allows you to configure only one SSH client
public-key at a time. The
ip ssh public-key
command behavior includes an
implicit append that never overwrites existing public-key configurations on a
running switch.
If you download a software configuration file that contains SSH client public-
key configurations, the downloaded public-keys overwrite any existing keys,
as happens with any other configured values.
Syntax:
ip ssh public-key <manager |operator> keystring
Set a key for public-key authentication.
manager:
allows manager-level access using SSH public-key
authentication.
operator:
allows operator-level access using SSH public-key
authentication.
“
keystring”
:
. a legal SSHv2 (RSA or DSA) public key. The text
string for the public key must be a single quoted token. If the
keystring contains double-quotes, it can be quoted with single
quotes ('
keystring
'). The following restrictions for a
keystring apply:
■
A keystring cannot contain both single and double quotes.
■
A keystring cannot have extra characters, such as a blank
space or a new line. However, to improve readability, you
can add a backlash at the end of each line.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......