8-29
Configuring Secure Shell (SSH)
Further Information on SSH Client Public-Key Authentication
N o t e
copy
usb pub-key file
can also be used as a method for copying a public key file
to the switch.
For example, if you wanted to copy a client public-key file named
clientkeys.txt
from a TFTP server at 10.38.252.195 and then display the file contents:
Figure 8-14. Example of Copying and Displaying a Client Public-Key File Containing Two Different Client
Public Keys for the Same Client
show crypto client-public-key [<manager | operator>] [keylist-str] [babble
| fingerprint]
Displays the client public key(s) in the switch’s current
client-public-key file.
See “SSH Client Public-Key Authentication” on page
2-16 in this guide for information about public keys
saved in a configuration file.
The
babble
option converts the key data to phonetic
hashes that are easier for visual comparisons.
The
fingerprint
option converts the key data to hexadec-
imal hashes that are for the same purpose.
The
keylist-str
selects keys to display (comma-delimited
list).
The
manager
option allows you to select manager public
keys
The
operator
option allows you to select operator public
keys.
Key Index Number
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......