![](/images/backgrounds/285815/hp-4100gl-users-manual-54993789x1.png)
Configuring Secure Shell (SSH)
Public Key Formats
Public Key FormatsAny client application you use for client
|
|
|
|
|
|
|
| Beginning of actual SSHv2 |
|
| Comment |
|
| |
| describing public |
| public key in |
|
|
|
|
|
|
Figure
|
|
|
|
|
|
Bit |
| Exponent |
|
|
|
|
| Modulus |
| ||
Size |
| <e> |
| <n> |
|
|
|
|
|
|
|
|
|
|
|
|
|
Figure
For
Table | SSH Options |
|
|
|
| |
|
|
|
|
|
| |
Switch | Primary SSH | Authenticate | Authenticate | Primary Switch | Secondary Switch | |
Access | Authentication | Switch Public Key | Client Public Key | Password | Password | |
Level |
| to SSH Clients? | to the Switch? | Authentication | Authentication | |
Operator | ssh login rsa | Yes | Yes1 | No1 | local or none | |
(Login) | ssh login Local | Yes | No | Yes | local or none | |
Level | ||||||
ssh login TACACS | Yes | No | Yes | local or none | ||
| ||||||
| ssh login RADIUS | Yes | No | Yes | local or none |