Configuring Secure Shell (SSH)
Configuring the Switch for SSH Operation
Caution
Note
Protect your private key file from access by anyone other than yourself. If someone can access your private key file, they can then penetrate SSH security on the switch by appearing to be you.
SSH does not protect the switch from unauthorized access via the web interface, Telnet, SNMP, or the serial port. While web and Telnet access can be restricted by the use of passwords local to the switch, if you are unsure of the security this provides, you may want to disable
5. Configure the Switch for SSH Authentication
Note that all methods in this section result in authentication of the switch’s public key by an SSH client. However, only Option B (page
ProCurve recommends that you always assign a
Authentication. When configured with this option, the switch uses its public key to authenticate itself to a client, but uses only passwords for client authentication.