Configuring Secure Shell (SSH)
Prerequisite for Using SSH
Prerequisite for Using SSH
Before using the switch as an SSH server, you must install a publicly or
commercially available SSH client application on the computer(s) you use for
management access to the switch. If you want client public-key authentication
(page 7-2), then the client program must have the capability to generate or
import keys.
Public Key Formats
Any client application you use for client public-key authentication with the
switch must have the capability to export public keys. The switch can accept
keys in the PEM-Encoded ASCII Format or in the Non-Encoded ASCII format.
Comment
describing public
Beginning of actual SSHv2
public key in PEM-Encoded
Figure 7-3. Example of Public Key in PEM-Encoded ASCII Format Common for SSHv2 Clients
7-5
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......