8-34
Configuring Secure Shell (SSH)
SSH Client and Secure Sessions
The copied private key is stored in the ssh directory of the switch’s file system
and is persistent across switch reboots. After the initial copying is complete,
the client key can be overwritten by repeating the
copy
command. No verifi-
cation of the validity of the key is done when executing the copy command.
Copying the SSH-Client-Known-Hosts File
Replacing or Appending the SSH-Client-Known-Hosts File
There is one
SSH client known hosts file per switch, stored in the ssh directory
of the switch’s file system. The SSH client known hosts
file can be overwritten
or appended using the commands below. If the file already exists at that
location, you will be prompted for confirmation before overwriting the exist-
ing file:
Warning: The existing known hosts file will be
overwritten, continue [y/n] ?
IPv4:
Specifies the SFTP or TFTP server’s IPv4 address.
IPv6:
Specifies the SFTP or TFTP server’s IPv6 address.
<private-key-filename>:
The remote filename containing
the key.
[port <
tcp-port-num
>]:
TCP port of the SSH server on the
remote system.
Syntax
:
copy sftp ssh-client-known-hosts [user <username> | <username@>]
<hostname | IPv4 | IPv6> <
filename
> [append]
copy tftp ssh-client-known-hosts <hostname | IPv4 | IPv6> <
filename
>
[append]
copy usb ssh-client-known-hosts <
filename
> [append]
copy xmodem ssh-client-known-hosts [append]
Copies the SSH client known hosts file to the switch.
ssh-client-known-hosts:
The known hosts file.
[user <username | username@>]:
Optional; there must be
configured usernames for Operator and Manager.
If no
username
is specified, the client’s current
username
is used. There will be a prompt for a password if needed.
hostname:
Specifies the hostname of the TFTP server.
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......