8-28
Configuring Secure Shell (SSH)
Further Information on SSH Client Public-Key Authentication
Copying a client-public-key into the switch requires the following:
■
One or more client-generated public keys. Refer to the documentation
provided with your SSH client application.
■
A copy of each client public key (up to ten) stored in a single text file
or individually on a TFTP server to which the switch has access.
Terminate all client public-keys in the file except the last one with a
<CR><LF>.
N o t e o n P u b l i c
K e y s
The actual content of a public key entry in a public key file is determined by
the SSH client application generating the key. (Although you can manually add
or edit any comments the client application adds to the end of the key, such
as the
at the end of the key in figure 8-13 on page
Syntax:
copy tftp pub-key-file <
ip-address
> <
filename
> [<append | manager |
operator>] [oobm]
Copies a public key file from a TFTP server into flash
memory in the switch.
The
append
option adds the key(s) for operator access.
The
manager
option replaces the key(s) for manager
access; follow with the ‘append’ option to add the key(s).
The
operator
option replaces the key(s) for operator
access (default); follow with the ‘append’ option to add
the key(s).
For switches that have a separate out-of-band manage-
ment port, the
oobm
parameter specifies that the traffic
will go through the out-of-band management interface.
If this parameter is not specified, the traffic goes
through the data interface. The
oobm
parameter is not
available on switches that do not have a separate out-
of-band management port. Refer to Appendix I, “Net-
work Out-of-Band Management” in the Management
and Configuration Guide for more information on out-
of-band management.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......