Configuring Secure Shell (SSH)
Terminology
■
PEM (Privacy Enhanced Mode):
Refers to an ASCII-formatted
client public-key that has been encoded for portability and efficiency.
SSHv2 client public-keys are typically stored in the PEM format. See
figure 7-3 for an example of PEM-encoded ASCII keys.
■
Private Key:
An internally generated key used in the authentication
process. A private key generated by the switch is not accessible for
viewing or copying. A private key generated by an SSH client applica
tion is typically stored in a file on the client device and, together with
its public key counterpart, can be copied and stored on multiple
devices.
■
Public Key:
An internally generated counterpart to a private key. A
device’s public key is used to authenticate the device to other devices.
■
Enable Level:
Manager privileges on the switch.
■
Login Level:
Operator privileges on the switch.
■
Local password or username:
A Manager-level or Operator-level
password configured in the switch.
■
SSH Enabled:
(1) A public/private key pair has been generated on
the switch (
crypto key generate ssh [rsa]
) and (2) SSH is enabled (
ip
ssh
). (You can generate a key pair without enabling SSH, but you
cannot enable SSH without first generating a key pair. See “2. Gener
ating the Switch’s Public and Private Key Pair” on page 7-10 and “4.
Enabling SSH on the Switch and Anticipating SSH Client Contact
Behavior” on page 7-15.)
7-4
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......