![](/images/backgrounds/285815/hp-4100gl-users-manual-54993790x1.png)
Configuring Secure Shell (SSH)
Steps for Configuring and Using SSH for Switch and Client Authentication
Switch | Primary SSH | Authenticate | Authenticate | Primary Switch | Secondary Switch | |
Access | Authentication | Switch Public Key | Client Public Key | Password | Password | |
Level |
| to SSH Clients? | to the Switch? | Authentication | Authentication | |
|
|
|
|
|
| |
Manager | ssh enable local | Yes | No | Yes | local or none | |
(Enable) | ssh enable tacacs | Yes | No | Yes | local or none | |
Level | ||||||
ssh enable radius | Yes | No | Yes | local or none | ||
|
1For ssh login
The general steps for configuring SSH include:
A. Client Preparation
1. Install an SSH client application on a management station you want to use for access to the switch. (Refer to the documentation provided with your SSH client application.)
2.
a.Either generate a public/private key pair on the client computer (if your client application allows) or import a client key pair that you have generated using another SSH application.
b.Copy the client public key into an ASCII file on a TFTP server accessible to the switch and download the client public key file to the switch . (The client public key file can hold up to 10 client keys.) This topic is covered under “To Create a