![](/images/backgrounds/285815/hp-4100gl-users-manual-549937103x1.png)
Configuring Secure Shell (SSH)
Configuring the Switch for SSH Operation
Configures a password method for the primary and secondary enable (Manager) access. If you do not spec ify an optional secondary method, it defaults to none.
Option B: Configuring the Switch for Client
1. Create a key pair on an SSH client.
2. Copy the client’s public key into a
3. Copy the
(For more on these topics, refer to “Further Information on SSH Client Public- Key Authentication” on page
With steps 1 - 3, above, completed and SSH properly configured on the switch, if an SSH client contacts the switch, login authentication automatically occurs first, using the switch and client
Syntax: copy tftp
| Copies a public key file into the switch. |
| aaa authentication ssh login |
| Configures the switch to authenticate a client public |
| key at the login level with an optional secondary pass |
| word method (default: none). |
|
|
Caution | To allow SSH access only to clients having the correct public key, you must |
| configure the secondary (password) method for login |
| Otherwise a client without the correct public key can still gain entry by |
| submitting a correct local login password. |