HP 6125G HP 6125G & 6125G/XG Blade Switches Security Configuration Gui - Page 191

Configuration procedure, Enabling the SSH server function

Page 191 highlights

• The length of the modulus of RSA server keys and host keys must be in the range of 512 to 2048 bits. Some SSH2.0 clients require that the length of the key modulus be at least 768 bits on the SSH server side. • The public-key local create dsa command generates only the host key pair. SSH1 does not support the DSA algorithm. • The length of the modulus of DSA host keys must be in the range of 512 to 2048 bits. Some SSH2.0 clients require that the length of the key modulus be at least 768 bits on the SSH server side. • For more information about the public-key local create command, see Security Command Reference. Configuration procedure To generate DSA or RSA key pairs on the SSH server: Step 1. Enter system view. 2. Generate DSA or RSA key pairs. Command Remarks system-view N/A public-key local create { dsa | rsa } By default, neither DSA nor RSA key pairs exist. Enabling the SSH server function Step 1. Enter system view. 2. Enable the SSH server function. Command system-view ssh server enable Remarks N/A Disabled by default NOTE: When the device acts as an SCP server, only one SCP user is allowed to access to the SCP server at one time. Configuring the user interfaces for SSH clients An SSH client accesses the switch through a VTY user interface. You must configure the user interfaces for SSH clients to allow SSH login. The configuration takes effect only for clients that log in after the configuration. Configuration guidelines • If you configure a user interface to support SSH, be sure to configure the corresponding authentication mode with the authentication-mode scheme command. • For a user interface configured to support SSH, you cannot change the authentication mode. To change the authentication mode, undo the SSH support configuration first. Configuration procedure To configure the protocols for a user interface to support: 181

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285

181
The length of the modulus of RSA server keys and host keys must be in the range of 512 to 2048 bits.
Some SSH2.0 clients require that the length of the key modulus be at least 768 bits on the SSH
server side.
The
public-key local create dsa
command generates only the host key pair. SSH1 does not support
the DSA algorithm.
The length of the modulus of DSA host keys must be in the range of 512 to 2048 bits. Some SSH2.0
clients require that the length of the key modulus be at least 768 bits on the SSH server side.
For more information about the
public-key local create
command, see
Security Command
Reference
.
Configuration procedure
To generate DSA or RSA key pairs on the SSH server:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Generate DSA or RSA key
pairs.
public-key local create
{
dsa
|
rsa
}
By default, neither DSA nor RSA
key pairs exist.
Enabling the SSH server function
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enable the SSH server
function.
ssh server enable
Disabled by default
NOTE:
When the device acts as an SCP server, only one SCP user is allowed to access to the SCP server at one
time.
Configuring the user interfaces for SSH clients
An SSH client accesses the switch through a VTY user interface. You must configure the user interfaces for
SSH clients to allow SSH login. The configuration takes effect only for clients that log in after the
configuration.
Configuration guidelines
If you configure a user interface to support SSH, be sure to configure the corresponding
authentication mode with the
authentication-mode scheme
command.
For a user interface configured to support SSH, you cannot change the authentication mode. To
change the authentication mode, undo the SSH support configuration first.
Configuration procedure
To configure the protocols for a user interface to support: