xi
Monitoring Shared Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-42
8 Configuring Secure Shell (SSH)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4
Steps for Configuring and Using SSH
for Switch and Client Authentication
. . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5
General Operating Rules and Notes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7
Configuring the Switch for SSH Operation
. . . . . . . . . . . . . . . . . . . . . . 8-8
2. Generating the Switch’s Public and Private Key Pair . . . . . . . . . . . 8-9
Configuring Key Lengths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-12
3. Providing the Switch’s Public Key to Clients . . . . . . . . . . . . . . . . . . 8-12
5. Configuring the Switch for SSH Authentication . . . . . . . . . . . . . . . 8-20
6. Use an SSH Client To Access the Switch . . . . . . . . . . . . . . . . . . . . . 8-24
Further Information on SSH Client Public-Key Authentication
. 8-25
Messages Related to SSH Operation
. . . . . . . . . . . . . . . . . . . . . . . . . . . 8-31
9 Configuring Secure Socket Layer (SSL)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......