6-12
Configuring Secure Shell (SSH)
Configuring the Switch for SSH Operation
For example, to generate and display a new key:
Figure 6-5. Example of Generating a Public/Private Host Key Pair for the Switch
The 'show crypto host-public-key' displays data in two different formats
because your client may store it in either of these formats after learning the
key. If you wish to compare the switch key to the key as stored in your client's
known-hosts file, note that the formatting and comments need not match. For
version 1 keys, the three numeric values bit size, exponent <e>, and modulus
<n> must match; for PEM keys, only the PEM-encoded string itself must
match.
N o t e s
"Zeroizing" the switch’s key automatically disables SSH (sets
ip ssh
to
no
).
Thus, if you zeroize the key and then generate a new key, you must also re-
enable SSH with the
ip ssh
command before the switch can resume SSH
operation.
Host Public
Key for the
Switch
Version 1 and Version 2 Views
of Same Host Public Key
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......