8-3
Configuring Secure Shell (SSH)
Terminology
Terminology
■
SSH Server:
An HP switch with SSH enabled.
■
Key Pair:
A pair of keys generated by the switch or an SSH client
application. Each pair includes a public key, that can be read by
anyone and a private key held internally in the switch or by a client.
■
PEM (Privacy Enhanced Mode):
Refers to an ASCII-formatted
client public-key that has been encoded for portability and efficiency.
SSHv2 client public-keys are typically stored in the PEM format. See
figure 8-3 for an example of PEM-encoded ASCII keys.
■
Private Key:
An internally generated key used in the authentication
process. A private key generated by the switch is not accessible for
viewing or copying. A private key generated by an SSH client applica-
tion is typically stored in a file on the client device and, together with
its public key counterpart, can be copied and stored on multiple
devices.
■
Public Key:
An internally generated counterpart to a private key. A
device’s public key is used to authenticate the device to other devices.
■
Enable Level:
Manager privileges on the switch.
■
Login Level:
Operator privileges on the switch.
■
Local password or username:
A Manager-level or Operator-level
password configured in the switch.
■
SSH Enabled:
(1) A public/private key pair has been generated on
the switch (
generate ssh [dsa | rsa]
) and (2) SSH is enabled (
ip ssh
).
(You can generate a key pair without enabling SSH, but you cannot
enable SSH without first generating a key pair. See “2. Generating the
Switch’s Public and Private Key Pair” on page 8-9 and “4. Enabling
SSH on the Switch and Anticipating SSH Client Contact Behavior” on
page 8-15.)
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......