Configuring Secure Shell (SSH)
Further Information on SSH Client Public-Key Authentication
Figure 6-13 shows how to check the results of the above commands.
Lists the current SSH
authentication
configuration.
Shows the contents of
the public key file
downloaded with the
copy tftp
command in
figure 6-12. In this
example, the file
contains two client
public-keys.
Client Key Index Number
Figure 6-13. SSH Configuration and Client-Public-Key Listing From Figure 6-12
6. Use an SSH Client To Access the Switch
Test the SSH configuration on the switch to ensure that you have achieved the
level of SSH operation you want for the switch. If you have problems, refer to
"RADIUS-Related Problems" in the Troubleshooting chapter of the
Manage
ment and Configuration Guide
for your switch.
Further Information on SSH Client
Public-Key Authentication
The section titled “5. Configuring the Switch for SSH Authentication” on page
6-18 lists the steps for configuring SSH authentication on the switch. However,
if you are new to SSH or need more details on client public-key authentication,
this section may be helpful.
6-21
Содержание ProCurve 2800 Series
Страница 2: ......
Страница 24: ...Getting Started To Set Up and Install the Switch in Your Network This page is intentionally unused 1 12 ...
Страница 44: ...Configuring Username and Password Security Front Panel Security This page is intentionally unused 2 20 ...
Страница 132: ...RADIUS Authentication and Accounting Messages Related to RADIUS Operation This page is intentionally unused 5 32 ...
Страница 182: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 7 22 ...
Страница 268: ...Configuring and Monitoring Port Security Operating Notes for Port Security This page is intentionally unused 9 38 ...
Страница 299: ......