8-26
Configuring Secure Shell (SSH)
Further Information on SSH Client Public-Key Authentication
3.
If there is not a match, and you have not configured the switch to accept
a login password as a secondary authentication method, the switch denies
SSH access to the client.
4.
If there is a match, the switch:
a.
Generates a random sequence of bytes.
b.
Uses the client’s public key to encrypt this sequence.
c.
Send these encrypted bytes to the client.
5.
The client uses its private key to decrypt the byte sequence.
6.
The client then:
a.
Combines the decrypted byte sequence with specific session data.
b.
Uses a secure hash algorithm to create a hash version of this informa-
tion.
c.
Returns the hash version to the switch.
7.
The switch computes its own hash version of the data from step 6 and
compares it to the client’s hash version. If they match, then the client is
authenticated. Otherwise, the client is denied access.
Using client public-key authentication requires these steps:
1.
Generate a public/private key pair for each client you want to have SSH
access to the switch. This can be a separate key for each client or the same
key copied to several clients.
2.
Copy the public key for each client into a client-public-key text file.
3.
Use
copy tftp
to copy the client-public-key file into the switch. Note that
the switch can hold 10 keys. The new key is appended to the client public-
key file
4.
Use the
aaa authentication ssh
command to enable client public-key
authentication.
To Create a Client-Public-Key Text File.
These steps describe how to
copy client-public-keys into the switch for challenge-response authentication,
and require an understanding of how to use your SSH client application.
Figure 8-13. Example of a Client Public Key
Bit Size
Exponent <e>
Modulus <n>
Comment
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......