8-1
8
Configuring Secure Shell (SSH)
Overview
The switches covered in this guide use Secure Shell version 2 (SSHv2) to
provide remote access to management functions on the switches via
encrypted paths between the switch and management station clients capable
of SSH operation.
SSH provides Telnet-like functions but, unlike Telnet, SSH provides encrypted,
authenticated transactions. The authentication types include:
■
Client public-key authentication
■
Switch SSH and user password authentication
Feature
Default
Menu
CLI
WebAgent
Generating a public/private key pair on the switch
No
n/a
n/a
Using the switch’s public key
n/a
n/a
page 8-12
n/a
Enabling SSH
Disabled
n/a
page 8-15
n/a
Enabling client public-key authentication
Disabled
n/a
n/a
Enabling user authentication
Disabled
n/a
page 8-20
n/a
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......