HP 2600 Series Function Manual page 151

Access security guide procurve 2600, 2600-pwr, 2800, 4100, 6108 series
Hide thumbs Also See for 2600 Series:
Table of Contents

Advertisement

Syntax: aaa authentication ssh login < local | tacacs | radius >[< local | none >]
Configures a password method for the primary and second-
ary login (Operator) access. If you do not specify a secondary
method, it defaults to none.
If the primary method is local, the secondary method is
always none, which may or may not be specified.
aaa authentication ssh enable < local | tacacs | radius>[< local | none >]
Configures a password method for the primary and second-
ary enable (Manager) access. If you do not specify a second-
ary method, it defaults to none.
If the primary method is local, the secondary method is
always none, which may or may not be specified.
Option B: Configuring the Switch for Client Public-Key SSH
Authentication. When configured with this option, the switch uses its pub-
lic key to authenticate itself to a client, but the client must also provide a client
public-key for the switch to authenticate. This option requires the additional
step of copying a client public-key file from a TFTP server into the switch.
This means that before you can use this option, you must:
1.
Create a key pair on an SSH client.
2.
Copy the client's public key into a public-key file (which can contain up
to ten client public-keys).
3.
Copy the public-key file into a TFTP server accessible to the switch and
download the file to the switch.
(For more on these topics, refer to "Further Information on SSH Client Public-
Key Authentication" on page 6-21.)
With steps 1 - 3, above, completed and SSH properly configured on the switch,
if an SSH client contacts the switch, login authentication automatically occurs
using the switch and client public-keys. Then, after the client gains login
access, the switch controls client access to the manager level by requiring the
passwords configured earlier by the aaa authentication ssh enable command.
Configuring Secure Shell (SSH)
Configuring the Switch for SSH Operation
6-19

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents