Configuring Secure Shell (SSH)
Further Information on SSH Client Public-Key Authentication
N o t e o n P u b l i c
The actual content of a public key entry in a public key file is determined by
K e ys
the SSH client application generating the key. (Although you can manually add
or edit any comments the client application adds to the end of the key, such
as the
at the end of the key in figure 7-13 on page
7-23.)
Syntax:
copy tftp pub-key-file <
ip-address
> <
filename
>
Copies a public key file from a TFTP server into flash
memory in the switch.
show crypto client-public-key [babble | fingerprint]
Displays the client public key(s) in the switch’s current
client-public-key file.
The
babble
option converts the key data to phonetic
hashes that are easier for visual comparisons.
The
fingerprint
option converts the key data to phonetic
hashes that are for the same purpose.
For example, if you wanted to copy a client public-key file named
clientkeys.txt
from a TFTP server at 10.38.252.195 and then display the file contents:
Key Index Number
Figure 7-14. Example of Copying and Displaying a Client Public-Key File Containing Two Different Client
Public Keys for the Same Client
Replacing or Clearing the Public Key File.
The client public-key file
remains in the switch’s flash memory even if you erase the startup-config file,
reset the switch, or reboot the switch.
■
You can remove the existing client public-key file or specific keys by
executing the
clear crypto public-key
command.
7-25
Содержание J8697A
Страница 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Страница 2: ......
Страница 22: ...Product Documentation Feature Index xx ...
Страница 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Страница 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Страница 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Страница 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Страница 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Страница 230: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 8 22 ...
Страница 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Страница 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Страница 388: ...10 Index ...
Страница 389: ......