7
Configuring Secure Shell (SSH)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4
Steps for Configuring and Using SSH
for Switch and Client Authentication
. . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5
General Operating Rules and Notes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7
Configuring the Switch for SSH Operation
. . . . . . . . . . . . . . . . . . . . . . 7-8
2. Generating the Switch’s Public and Private Key Pair . . . . . . . . . . . 7-9
Configuring Key Lengths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-12
3. Providing the Switch’s Public Key to Clients . . . . . . . . . . . . . . . . . . 7-12
5. Configuring the Switch for SSH Authentication . . . . . . . . . . . . . . . 7-19
6. Use an SSH Client To Access the Switch . . . . . . . . . . . . . . . . . . . . . 7-23
Further Information on SSH Client Public-Key Authentication
. 7-23
Messages Related to SSH Operation
. . . . . . . . . . . . . . . . . . . . . . . . . . . 7-29
7-1
Summary of Contents for PROCURVE 2910AL
Page 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Page 2: ......
Page 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Page 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Page 156: ...TACACS Authentication Operating Notes 4 30 ...
Page 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Page 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Page 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Page 592: ...12 Index ...
Page 593: ......