Configuring Secure Shell (SSH)
Overview
Overview
Feature
Default
Menu
CLI
Web
Generating a public/private key pair on the switch
No
n/a
page 7-10
n/a
Using the switch’s public key
n/a
n/a
page 7-12
n/a
Enabling SSH
Disabled
n/a
page 7-15
n/a
Enabling client public-key authentication
Disabled
n/a
n/a
Enabling user authentication
Disabled
n/a
page 7-18
n/a
The switches covered in this guide use Secure Shell version 2 (SSHv2) to
provide remote access to management functions on the switches via
encrypted paths between the switch and management station clients capable
of SSH operation.
SSH provides Telnet-like functions but, unlike Telnet, SSH provides encrypted,
authenticated transactions. The authentication types include:
■
Client public-key authentication
■
Switch SSH and user password authentication
Client Public Key Authentication (Login/Operator Level) with User
Password Authentication (Enable/Manager Level).
This option uses
one or more public keys (from clients) that must be stored on the switch. Only
a client with a private key that matches a stored public key can gain access
to the switch. (The same private key can be stored on one or more clients.)
ProCurve
Switch
(SSH
Server)
1. Switch-to-Client SSH authentication.
2. Client-to-Switch (
login rsa
) authentication
3.User-to-Switch (enable password) authentication
options:
– Local
–
– RADIUS
– None
SSH
Client
Work-
Station
Figure 7-1. Client Public Key Authentication Model
7-2
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......