Secure Shell Server Configuration - HP GbE2c - Blc Layer 2/3 Fiber SFP Option Cli Reference Manual

Hp gbe2c ethernet blade switch for c-class bladesystem iscli reference guide
Hide thumbs Also See for GbE2c - Blc Layer 2/3 Fiber SFP Option:
Table of Contents

Advertisement

Table 76
Syslog Configuration commands
Command
[no] logging log {<feature>}
show logging

Secure Shell Server configuration

Telnet traffic on the network is not secure. These commands enable Secure Shell (SSH) access from any SSH client.
The SSH program securely logs into another computer over a network and executes commands in a secure
environment. All data using SSH is encrypted.
Secure Shell can be configured on the switch using the console port only. The commands are not available if you
access the switch using Telnet or the Browser-based Interface (BBI).
NOTE:
See the HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Application Guide for information on
SSH.
The following table describes the SSHD Configuration commands.
Table 77
SSHD Configuration commands
Command
ssh interval <0-24>
ssh scp-password
ssh generate-host-key
Description
Displays a list of features for which syslog messages can be
generated. You can choose to enable/disable specific
features or enable/disable syslog on all available features.
Features include:
console
system
mgmt
cli
stg
vlan
ssh
ntp
ip
web
rmon
ufd
Command mode: Global configuration
Displays the current syslog settings.
Command mode: All
Description
Defines interval for auto-generating the RSA server key. The switch will auto-
generate the RSA server key at the interval defined in this command. The range is 0-
24 hours.
The value of zero (0) means the RSA server key auto-generation is disabled. If the
switch has been busy performing any other key generation and the assigned time of
interval expires, the RSA server will skip generating the key.
Command mode: Global configuration
Defines the administrator password that is for Secure Copy (SCP) only. The
username for this SCP administrator is scpadmin.
Typically, SCP is used to copy files securely from one machine to another. In the
switch, SCP is used to download and upload the switch configuration using secure
channels.
Command mode: Global configuration
Generates the RSA host keys manually. The switch creates this key automatically
while configuring the switch with Secure Shell (SSH). But you can generate the key
manually by using this command if you need to overwrite the key for security
reasons. The command will take effect immediately.
Command mode: Global configuration
Configuration Commands 83

Advertisement

Table of Contents
loading

This manual is also suitable for:

Gbe2c

Table of Contents