Specifying Mac Algorithms For Ssh2; Displaying And Maintaining Ssh; Stelnet Configuration Examples; Password Authentication Enabled Stelnet Server Configuration Example - HP FlexNetwork 10500 Series Security Configuration Manual

Hide thumbs Also See for FlexNetwork 10500 Series:
Table of Contents

Advertisement

Specifying MAC algorithms for SSH2

Step
1.
Enter system view.
2.
Specify MAC algorithms for
SSH2.

Displaying and maintaining SSH

Execute display commands in any view.
Task
Display the source IP address configured for
the SFTP client.
Display the source IP address configured for
the Stelnet client.
Display SSH server status or sessions.
Display SSH user information on the SSH
server.
Display the public keys of the local key pairs.
Display information about peer public keys.

Stelnet configuration examples

Unless otherwise noted, devices in the configuration examples operate in non-FIPS mode.
When you configure SSH on devices operating in FIPS mode, follow these restrictions and
guidelines:
The modulus length of the key pair must be 2048 bits.
When the device acts as the Stelnet server, it supports only RSA and ECDSA key pairs. If both
RSA and ECDSA key pairs exist on the server, the server uses the ECDSA key pair.
Password authentication enabled Stelnet server
configuration example
Network requirements
As shown in
The switch acts as the Stelnet server and uses password authentication.
The username and password of the client are saved on the switch.
Command
system-view
Figure
99:
In non-FIPS mode:
ssh2 algorithm mac { md5 |
md5-96 | sha1 | sha1-96 |
sha2-256 | sha2-512 } *
In FIPS mode:
ssh2 algorithm mac { sha1
| sha1-96 | sha2-256 |
sha2-512 } *
Command
display sftp client source
display ssh client source
display ssh server { session | status }
display ssh user-information [ username ]
display public-key local { dsa | ecdsa | rsa } public
[ name publickey-name ]
display public-key peer [ brief | name publickey-name ]
379
Remarks
N/A
By default, SSH2 uses the MAC
algorithms sha2-256, sha2-512,
sha1, md5, sha1-96, and
md5-96 in descending order of
priority for algorithm negotiation.

Advertisement

Table of Contents
loading

Table of Contents