6-2
Configuring Secure Shell (SSH)
Overview
Overview
The ProCurve switches covered in this guide use Secure Shell version 2
(SSHv2) to provide remote access to management functions on the switches
via encrypted paths between the switch and management station clients
capable of SSH operation.
SSH provides Telnet-like functions but, unlike Telnet, SSH provides encrypted,
authenticated transactions. The authentication types include:
■
Client public-key authentication
■
Switch SSH and user password authentication
Client Public Key Authentication (Login/Operator Level) with User
Password Authentication (Enable/Manager Level).
This option uses
one or more public keys (from clients) that must be stored on the switch. Only
a client with a private key that matches a stored public key can gain access
to the switch. (The same private key can be stored on one or more clients.)
Figure 6-1. Client Public Key Authentication Model
Feature
Default
Menu
CLI
Web
Generating a public/private key pair on the switch
No
n/a
page 6-10
n/a
Using the switch’s public key
n/a
n/a
page 6-12
n/a
Enabling SSH
Disabled
n/a
page 6-15
n/a
Enabling client public-key authentication
Disabled
n/a
pages 6-19,
6-22
n/a
Enabling user authentication
Disabled
n/a
page 6-19
n/a
ProCurve
Switch
(SSH
Server)
1. Switch-to-Client SSH authentication.
2.Client-to-Switch (
login rsa
) authentication
3.User-to-Switch (enable password) authentication
options:
– Local
–
– RADIUS
– None
SSH
Client
Work-
Station
Содержание ProCurve 2510-24
Страница 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Страница 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Страница 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 316: ...8 Index ...
Страница 317: ......