Ssh Support For Mpls L3Vpn; Fips Compliance; Configuring The Device As An Ssh Server - HP 6600 Security Configuration Manual

Table of Contents

Advertisement

Password-publickey authentication—The server requires clients that run SSH2 to pass both
password authentication and publickey authentication. However, if a client runs SSH1, it only needs
to pass either authentication.
Any authentication—The server requires the client to pass either of password authentication and
publickey authentication.
In a password authentication process, if the remote AAA server requires the user for a password
secondary authentication, it sends the SSH server an authentication response with a prompt. The prompt
is transparently transmitted to the client, and displayed on the client to notify the user to enter a specified
password. After the user enters the correct password and passes validity check by the remote AAA server,
the device returns an authentication success message to the client.
NOTE:
Only clients that run SSH2 or a later version support password secondary authentication that is initiated
by the AAA server.

SSH support for MPLS L3VPN

With this function, you can configure the device as an SSH client to establish connections with SSH
servers in different MPLS L3VPNs.
As shown in
services of the two VPNs isolated. After a PE is enabled with the SSH client function, it can establish SSH
connections with CEs in different VPNs that are enabled with the SSH server function to implement secure
access to the CEs and secure transfer of log file.
Figure 106 SSH support for MPLS L3VPN

FIPS compliance

The router supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode (see "Configuring FIPS") and non-FIPS mode.

Configuring the device as an SSH server

You can configure the device as an Stelnet, SFTP, or SCP server. Because the configuration procedures
are similar, the SSH server represents the Stelnet, SFTP, and SCP server unless otherwise specified.
Figure
106, the hosts in VPN 1 and VPN 2 access the MPLS backbone through PEs, with the
315

Advertisement

Table of Contents
loading

This manual is also suitable for:

Hsr6600

Table of Contents