HP ProCurve 6200yl Series Access Security Manual page 10

Hide thumbs Also See for ProCurve 6200yl Series:
Table of Contents

Advertisement

7 Configuring Secure Shell (SSH)
viii
Viewing RADIUS Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-29
General RADIUS Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-29
RADIUS Authentication Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-31
RADIUS Accounting Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-32
Changing RADIUS-Server Access Order . . . . . . . . . . . . . . . . . . . . . . . 6-33
Messages Related to RADIUS Operation . . . . . . . . . . . . . . . . . . . . . . . 6-36
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Prerequisite for Using SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5
Public Key Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5
Steps for Configuring and Using SSH
for Switch and Client Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8
Configuring the Switch for SSH Operation . . . . . . . . . . . . . . . . . . . . . . 7-9
1. Assigning a Local Login (Operator) and
Enable (Manager) Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9
2. Generating the Switch's Public and Private Key Pair . . . . . . . . . . 7-10
3. Providing the Switch's Public Key to Clients . . . . . . . . . . . . . . . . . . 7-12
4. Enabling SSH on the Switch and Anticipating SSH
Client Contact Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15
5. Configuring the Switch for SSH Authentication . . . . . . . . . . . . . . . 7-18
6. Use an SSH Client To Access the Switch . . . . . . . . . . . . . . . . . . . . . 7-21
Further Information on SSH Client Public-Key Authentication . 7-22
Messages Related to SSH Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-27

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents