6-29
Configuring Secure Shell (SSH)
Messages Related to SSH Operation
Client public key file corrupt or
not found. Use 'copy tftp pub-key-
file <ip-addr> <filename>' to down-
load new file.
The client key does not exist in the switch. Use
copy
tftp
to download the key from a TFTP server.
Download failed: overlength key in
key file.
Download failed: too many keys in key
file.
Download failed: one or more keys is
not a valid public key.
The public key file you are trying to download has one of the
following problems:
• A key in the file is too long. The maximum key length is
1024 characters, including spaces. This could also mean
that two or more keys are merged together instead of
being separated by a <CR><LF>.
• There are more than ten public keys in the key file and
switch total. Delete some keys from the switch or file. The
switch does not detect duplicate keys.
• One or more keys in the file is corrupted or is not a valid
rsa public key.
Refer to “To Create a Client-Public-Key Text File” on page
24 for information on client-public-key properties.
Error: Requested keyfile does not exist.
The client key does not exist in the switch. Use
copy
tftp
to download the key from a TFTP server.
Generating new RSA host key. If the
cache is depleted, this could take
up to two minutes.
After you execute the crypto key generate ssh [rsa]
command, the switch displays this message while it
is generating the key.
Host RSA key file corrupt or not
found. Use 'crypto key generate ssh
rsa' to create new host key.
The switch’s key is missing or corrupt. Use the
crypto
key generate ssh [rsa]
command to generate a new
key for the switch.
Message
Meaning
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......