Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

Here you can view all the pages of manual HP 5500 Ei 5500 Si Switch Series Configuration Guide. The HP manuals for Printer are available online for free. You can easily download all the documents as PDF.

Page 1951

 286 
Configuring SSH2.0 
Overview 
Introduction to SSH2.0 
Secure Shell (SSH) offers an approach to logging in to a remote device securely. Using encryption and 
strong authentication, SSH protects devices against attacks such as IP spoofing and plain text password 
interception. 
The swi tch c an not only work  as  an SSH ser ver  to  suppor t c onnections wi th SSH cl ients, but al so  work  as  
an SSH client to allow users to establish SSH connections with a remote device acting as the SSH server....

Page 1952

 287 
secondary protocol version numbers constitute the protocol version number. The software version 
number is used for debugging.  
4. After receiving the packet, the client resolves  the packet and compares the server’s protocol 
version number with that of its own. If the serv er’s protocol version is lower and supportable, the 
client uses the protocol version of the server; otherw ise, the client uses its own protocol version. In 
either case, the client sends a packet to the server  to notify the...

Page 1953

 288 
its username, public key, and publickey algorithm information. The server checks whether the public 
key is valid. If the public key is invalid, the authentication fails. Otherwise, the server authenticates 
the client by the digital signature. Finally, the server sends a message to the client to inform it of the 
authentication result. The switch supports using the publickey algorithms RSA and DSA for digital 
signature. 
An SSH2.0 server might require the client to pass both password...

Page 1954

 289 
SSH connection across VPNs (available only on the HP 5500 
EI) 
With this function, you can configure the device as an SSH client to establish connections with SSH 
servers in different VPNs. 
As shown in Figure 100, the ho
 sts in VPN 1 and VPN 2 access the MPLS backbone through PEs, with the 
s e r v i c e s  o f  t h e  t w o  V P N s  i s o l a t e d .  A f t e r  a n  H P  55 0 0  E I  sw i t c h  t h a t  a c t s  a s  a n  M C E  d e v i c e  i s  e n a b l e d  w i t h  
the SSH client...

Page 1955

 290 
To support SSH clients that use different types of key pairs, generate both DSA and RSA key pairs on the 
SSH ser ver. 
Generating procedure 
To generate DSA or RSA key pairs on the SSH server:  
Step Command Remarks 
1.   Enter system view. 
system-view  N/A 
2.  Generate DSA or RSA key 
pairs.  public-key local create 
{ dsa  | rsa  } By default, neither DSA nor RSA 
key pairs exist. 
 
Commands for generating DSA or RSA key pairs 
The public-key local create rsa  command generates a server RSA...

Page 1956

 291 
Configuration procedure 
To configure the protocols for a user interface to support:  
Step Command Remarks 
1.  Enter system view. 
system-view  N/A 
2.  Enter user interface view of 
one or more user interfaces.  user-interface 
vty number  
[ ending-number ]   N/A 
3.
  Set the login authentication 
mode to  scheme.  authentication-mode
 scheme   By default, the authentication 
mode is 
password .  
4.  Configure the user interface(s) 
to support SSH login.  protocol inbound 
{ all  | ssh }...

Page 1957

 292 
Step Command Remarks 
6.  Return to system view. 
peer-public-key end  N/A 
 
Importing a client public key from a public key file 
 
Step Command 
1.  Enter system view. 
system-view 
2.  Import the public key from a public key file. 
public-key peer keyname import sshkey  filename  
 
For more information about client public key configuration, see  Managing public keys.  
Configuring an SSH user 
To configure an SSH user that uses publickey authentication, you must perform the procedure in this...

Page 1958

 293 
•  If you change the authentication mode or public  key for an SSH user that has been logged in, the 
change can take effect only at the next login of the user. 
Configuration procedure 
To configure an SSH user and specify the  service type and authentication method:  
Step Command Remarks 
1.  Enter system view. 
system-view  N/A 
2.  Create an SSH user, and 
specify the service type and 
authentication method. 
• For Stelnet users: 
ssh user  username  service-type 
stelnet  authentication-type...

Page 1959

 294 
Step Command Remarks 
3.  Set the RSA server key pair 
update interval.  ssh server rekey-interval
 hours   Optional. 
By default, the interval is 0, and the 
RSA server key pair is not updated.
 
4.
  Set the SSH user 
authentication timeout period.  ssh server authentication-timeout 
time-out-value
  Optional. 
60 seconds by default.
 
5.  Set the maximum number of 
SSH authentication attempts.  ssh server authentication-retries
 
times   Optional. 
3 by default. 
 
Setting the DSCP value for...

Page 1960

 295 
Step Command  Remarks 
2.  Specify a source IP 
address or interface for 
the SSH client. 
• Specify a source IPv4 address or interface for the 
SSH client: 
ssh client source  { ip  ip-address  | interface 
interface-type interface-number  } 
• Specify a source IPv6 address or interface for the 
SSH client: 
ssh client ipv6 source  { ipv6  ipv6-address  | 
interface  interface-type interface-number  }  Select either approach.
 
B y  d e f a u l t ,  a n  S S H  c l i e n t  
uses the IP address of...
Start reading HP 5500 Ei 5500 Si Switch Series Configuration Guide

Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide

All HP manuals