8-11
Configuring Secure Shell (SSH)
Configuring the Switch for SSH Operation
For example, to generate and display a new key:
Figure 8-5. Example of Generating a Public/Private Host Key Pair for the Switch
zeroize <ssh | cert | autorun [rsa]>
Erases the switch’s public/private key pair and dis-
ables SSH operation.
show crypto host-public-key
Displays switch’s public key. Displays the version 1
and version 2 views of the key.
See “SSH Client Public-Key Authentication” on page
2-16 in this guide for information about public keys
saved in a configuration file.
[ babble ]
Displays hashes of the switch’s public key in phonetic
format. (See “Displaying the Public Key” on page
8-14.)
[ fingerprint ]
Displays fingerprints of the switch’s public key in
hexadecimal format. (See “Displaying the Public Key”
on page 8-14.)
Host Public
Key for the
Switch
Version 1 and Version 2 views
of same host public key
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......