HP ProCurve 2510G Series Manual page 170

Access security guide
Hide thumbs Also See for ProCurve 2510G Series:
Table of Contents

Advertisement

Configuring Secure Shell (SSH)
Further Information on SSH Client Public-Key Authentication
Bit Size
Exponent <e>
Figure 6-13. Example of a Client Public Key
Notes
6-24
To Create a Client-Public-Key Text File. These steps describe how to
copy client-public-keys into the switch for RSA challenge-response authenti-
cation, and require an understanding of how to use your SSH client applica-
tion.
Modulus <n>
Comments in public key files, such as smith@support.cairns.com in figure 6-13,
may appear in a SSH client application's generated public key. While such
comments may help to distinguish one key from another, they do not pose any
restriction on the use of a key by multiple clients and/or users.
Public key illustrations such as the key shown in figure 6-13 usually include
line breaks as a method for showing the whole key. However, in practice, line
breaks in a public key will cause errors resulting in authentication failure.
Comment

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents