8-29
Configuring Secure Shell (SSH)
Further Information on SSH Client Public-Key Authentication
N o t e
copy
usb pub-key file
can also be used as a method for copying a public key file
to the switch.
For example, if you wanted to copy a client public-key file named
clientkeys.txt
from a TFTP server at 10.38.252.195 and then display the file contents:
Figure 8-14. Example of Copying and Displaying a Client Public-Key File Containing Two Different Client
Public Keys for the Same Client
show crypto client-public-key [<manager | operator>] [keylist-str] [babble
| fingerprint]
Displays the client public key(s) in the switch’s current
client-public-key file.
See “SSH Client Public-Key Authentication” on page
2-16 in this guide for information about public keys
saved in a configuration file.
The
babble
option converts the key data to phonetic
hashes that are easier for visual comparisons.
The
fingerprint
option converts the key data to hexadec-
imal hashes that are for the same purpose.
The
keylist-str
selects keys to display (comma-delimited
list).
The
manager
option allows you to select manager public
keys
The
operator
option allows you to select operator public
keys.
Key Index Number
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......