Configuring Secure Shell (SSH)
Further Information on SSH Client Public-Key Authentication
Syntax:
clear crypto public-key
Deletes the client-public-key file from the switch.
Syntax:
clear crypto public-key 3
Deletes the entry with an index of 3 from the
client-public-key file on the switch.
Enabling Client Public-Key Authentication.
After you TFTP a client-
public-key file into the switch (described above), you can configure the switch
to allow the following:
■
If an SSH client’s public key matches the switch’s client-public-key file,
allow that client access to the switch. If there is not a public-key match,
then deny access to that client.
Syntax:
aaa authentication ssh login public-key none
Allows SSH client access only if the switch detects a match
between the client’s public key and an entry in the client-
public-key file most recently copied into the switch.
C a u t i o n
To enable client public-key authentication to block SSH clients whose public
keys are not in the client-public-key file copied into the switch, you must
configure the Login Secondary as
none
. Otherwise, the switch allows such
clients to attempt access using the switch’s Operator password.
7-28
Summary of Contents for PROCURVE 2910AL
Page 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Page 2: ......
Page 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Page 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Page 156: ...TACACS Authentication Operating Notes 4 30 ...
Page 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Page 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Page 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Page 592: ...12 Index ...
Page 593: ......