Security Configuration
Using SSH
ProCurve(config)#ip ssh
ProCurve(config-ssh)#?
Secure Shell Server commands:
address
ciphers
macs
port
power
shutdown
ssh
version
5-8
Using SSH
SSH provides more secure communications than using Telnet because
connections are authenticated and communications over the network are
encrypted. Secure shell (SSH) is a protocol based on OpenSSH that allows you
to log in to a remote switch and execute commands on that system.
The switch provides both an SSH server and client. To configure the SSH
server use the Configuration mode command ip ssh (and the SSH
Configuration mode no shutdown command).
Both server and client support SSH version 1 and 2. If TACACS+ or RADIUS
authentication is enabled on the switch, passwords are authenticated by the
TACACS+ or RADIUS server. Private and public keys on a per-user basis are
not supported.
Establishing SSH Sessions
The SSH Server parameters are:
- Set address on which to accept Secure Shell connections
- Set ciphers to allow for Secure Shell protocol version 2
- Set Message Authentication Codes to allow for SSH protocol
version 2
- Set default port for Secure Shell
- Power control various slots
- Stop Secure Shell service
- Open a Secure Shell connection to another host
- Set Secure Shell protocol versions to use