![HP HP ProCurve Series 6600 Access Security Manual Download Page 390](http://html.mh-extra.com/html/hp/hp-procurve-series-6600/hp-procurve-series-6600_access-security-manual_163101390.webp)
8-28
Configuring Secure Shell (SSH)
Further Information on SSH Client Public-Key Authentication
2.
Copy the client’s public key into a text file (
filename
.txt
). (For example,
you can use the Notepad editor included with the Microsoft® Windows®
software. If you want several clients to use client public-key authentica-
tion, copy a public key for each of these clients (up to ten) into the file.
Each key should be separated from the preceding key by a <CR><LF>.
3.
Copy the client-public-key file into a TFTP server accessible to the switch.
Copying a client-public-key into the switch requires the following:
■
One or more client-generated public keys. Refer to the documentation
provided with your SSH client application.
■
A copy of each client public key (up to ten) stored in a single text file
or individually on a TFTP server to which the switch has access.
Terminate all client public-keys in the file except the last one with a
<CR><LF>.
N o t e o n P u b l i c
K e y s
The actual content of a public key entry in a public key file is determined by
the SSH client application generating the key. (Although you can manually add
or edit any comments the client application adds to the end of the key, such
as the
at the end of the key in figure 8-13.)
Syntax:
copy <tftp | sftp> pub-key-file <
ip-address
> <
filename
> [<append |
manager | operator>]
Copies a public key file from a TFTP server into flash
memory in the switch.
The
append
option adds the key(s) for operator access.
The
manager
option replaces the key(s) for manager
access; follow with the ‘append’ option to add the key(s).
The
operator
option replaces the key(s) for operator
access (default); follow with the ‘append’ option to add
the key(s).
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......