6-23
Configuring Secure Shell (SSH)
Further Information on SSH Client Public-Key Authentication
If you enable client public-key authentication, the following events occur
when a client tries to access the switch using SSH:
1.
The client sends its public key to the switch with a request for authenti-
cation.
2.
The switch compares the client’s public key to those stored in the switch’s
client-public-key file. (As a prerequisite, you must use the switch’s
copy
tftp
command to download this file to flash.)
3.
If there is not a match, and you have not configured the switch to accept
a login password as a secondary authentication method, the switch denies
SSH access to the client.
4.
If there is a match, the switch:
a.
Generates a random sequence of bytes.
b.
Uses the client’s public key to encrypt this sequence.
c.
Send these encrypted bytes to the client.
5.
The client uses its private key to decrypt the byte sequence.
6.
The client then:
a.
Combines the decrypted byte sequence with specific session data.
b.
Uses a secure hash algorithm to create a hash version of this informa-
tion.
c.
Returns the hash version to the switch.
7.
The switch computes its own hash version of the data in step 6 and
compares it to the client’s hash version. If they match, then the client is
authenticated. Otherwise, the client is denied access.
Using client public-key authentication requires these steps:
1.
Generate a public/private key pair for each client you want to have SSH
access to the switch. This can be a separate key for each client or the same
key copied to several clients.
2.
Copy the public key for each client into a client-public-key text file.
3.
Use
copy tftp
to copy the client-public-key file into the switch. Note that
the switch can hold 10 keys. The new key is appended to the client public-
key file
4.
Use the
aaa authentication ssh
command to enable client public-key
authentication.
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......