HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 6

Stelnet client configuration task list, Configuring the IPv4 source guard function, iv

Page 6 highlights

Example for entering a peer public key 120 Network requirements 120 Configuration procedure 120 Verifying the configuration 121 Example for importing a public key from a public key file 122 Network requirements 122 Configuration procedure 122 Verifying the configuration 124 Configuring SSH 125 Overview 125 How SSH works 125 SSH authentication methods 126 FIPS compliance 127 Configuring the device as an SSH server 127 SSH server configuration task list 127 Generating local DSA or RSA key pairs 127 Enabling the SSH server function 128 Enabling the SFTP server function 128 Configuring the user interfaces for Stelnet clients 129 Configuring a client's host public key 129 Configuring an SSH user 130 Setting the SSH management parameters 131 Configuring the device as an Stelnet client 132 Stelnet client configuration task list 132 Specifying a source IP address or source interface for the Stelnet client 133 Establishing a connection to an Stelnet server 133 Configuring the device as an SFTP client 135 SFTP client configuration task list 135 Specifying a source IP address or source interface for the SFTP client 135 Establishing a connection to an SFTP server 135 Working with SFTP directories 137 Working with SFTP files 137 Displaying help information 137 Terminating the connection with the SFTP server 138 Configuring the device as an SCP client 138 Displaying and maintaining SSH 139 Stelnet configuration examples 140 Password authentication enabled Stelnet server configuration example 140 Publickey authentication enabled Stelnet server configuration example 142 Password authentication enabled Stelnet client configuration example 148 Publickey authentication enabled Stelnet client configuration example 151 SFTP configuration examples 153 Password authentication enabled SFTP server configuration example 153 Publickey authentication enabled SFTP client configuration example 155 SCP file transfer with password authentication 158 Network requirements 158 Configuration procedure 159 Configuring IP source guard 161 Overview 161 Static IP source guard binding entries 161 Dynamic IPv4 source binding entries 162 IP source guard configuration task list 162 Configuring the IPv4 source guard function 162 iv

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

iv
Example for entering a peer public key ···················································································································· 120
Network requirements········································································································································· 120
Configuration procedure ···································································································································· 120
Verifying the configuration ································································································································· 121
Example for importing a public key from a public key file ····················································································· 122
Network requirements········································································································································· 122
Configuration procedure ···································································································································· 122
Verifying the configuration ································································································································· 124
Configuring SSH ····················································································································································· 125
Overview······································································································································································· 125
How SSH works··················································································································································· 125
SSH authentication methods······························································································································· 126
FIPS compliance ··························································································································································· 127
Configuring the device as an SSH server·················································································································· 127
SSH server configuration task list ······················································································································ 127
Generating local DSA or RSA key pairs ··········································································································· 127
Enabling the SSH server function······················································································································· 128
Enabling the SFTP server function ······················································································································ 128
Configuring the user interfaces for Stelnet clients ···························································································· 129
Configuring a client's host public key ··············································································································· 129
Configuring an SSH user ···································································································································· 130
Setting the SSH management parameters ········································································································ 131
Configuring the device as an Stelnet client ··············································································································· 132
Stelnet client configuration task list
···················································································································· 132
Specifying a source IP address or source interface for the Stelnet client ······················································ 133
Establishing a connection to an Stelnet server ································································································· 133
Configuring the device as an SFTP client ·················································································································· 135
SFTP client configuration task list ······················································································································· 135
Specifying a source IP address or source interface for the SFTP client ························································· 135
Establishing a connection to an SFTP server ···································································································· 135
Working with SFTP directories ··························································································································· 137
Working with SFTP files ······································································································································ 137
Displaying help information ······························································································································· 137
Terminating the connection with the SFTP server ····························································································· 138
Configuring the device as an SCP client ··················································································································· 138
Displaying and maintaining SSH ······················································································································ 139
Stelnet configuration examples ··································································································································· 140
Password authentication enabled Stelnet server configuration example ······················································ 140
Publickey authentication enabled Stelnet server configuration example······················································· 142
Password authentication enabled Stelnet client configuration example························································ 148
Publickey authentication enabled Stelnet client configuration example ························································ 151
SFTP configuration examples ······································································································································ 153
Password authentication enabled SFTP server configuration example·························································· 153
Publickey authentication enabled SFTP client configuration example ··························································· 155
SCP file transfer with password authentication········································································································· 158
Network requirements········································································································································· 158
Configuration procedure ···································································································································· 159
Configuring IP source guard ·································································································································· 161
Overview······································································································································································· 161
Static IP source guard binding entries··············································································································· 161
Dynamic IPv4 source binding entries ················································································································ 162
IP source guard configuration task list ······················································································································· 162
Configuring the IPv4 source guard function
·············································································································· 162