6-7
Configuring Secure Shell (SSH)
Steps for Configuring and Using SSH for Switch and Client Authentication
B. Switch Preparation
1.
Assign a login (Operator) and enable (Manager) password on the
switch (page 6-9).
2.
Generate a public/private key pair on the switch (page 6-10).
You need to do this only once. The key remains in the switch even if
you reset the switch to its factory-default configuration. (You can
remove or replace this key pair, if necessary.)
3.
Copy the switch’s public key to the SSH clients you want to access
the switch (page 6-12).
4.
Enable SSH on the switch (page 6-15).
5.
Configure the primary and secondary authentication methods you
want the switch to use. In all cases, the switch will use its host-public-
key to authenticate itself when initiating an SSH session with a client.
• SSH Login (Operator) options:
– Option A:
Primary: Local, , or RADIUS password
Secondary: Local password or none. If the primary
authentication method is
local
, the secondary method
must be
none
.
– Option B:
Primary: Client public-key authentication (
login public-
key
— page 6-22)
Secondary:
none
Note that if you want the switch to perform client public-key
authentication, you must configure the switch with Option B.
• SSH Enable (Manager) options:
Primary: Local, , or RADIUS
Secondary: Local password or none. If the primary authenti-
cation method is
local
, the secondary method must be
none
.
6.
Use your SSH client to access the switch using the switch’s IP address
or DNS name (if allowed by your SSH client application). Refer to the
documentation provided with the client application.
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......