xiv
6. Use an SSH Client To Access the Switch . . . . . . . . . . . . . . . . . . . . . 8-24
Further Information on SSH Client Public-Key Authentication . 8-25
SSH Client and Secure Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-31
Opening a Secure Session to an HP Switch . . . . . . . . . . . . . . . . . . . . . 8-32
Operating Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-32
Copying Client Key Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-33
Copying the SSH-Client-Known-Hosts File . . . . . . . . . . . . . . . . . . . . . 8-34
Replacing or Appending the SSH-Client-Known-Hosts File . . . . 8-34
Copying the SSH Client Known Hosts File to
Another Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-35
Copying the Host Public Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-36
Removing the SSH Client Key Pair . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-36
Removing the SSH Client Known Hosts File . . . . . . . . . . . . . . . . . . . . 8-37
Displaying Open Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-37
Messages Related to SSH Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-39
Logging Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-40
Debug Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-40
9 Configuring Secure Socket Layer (SSL)
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-3
Prerequisite for Using SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4
Steps for Configuring and Using SSL for Switch and Client
Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4
General Operating Rules and Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5
Configuring the Switch for SSL Operation . . . . . . . . . . . . . . . . . . . . . . 9-6
1. Assigning a Local Login (Operator) and
Enabling (Manager) Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6
2. Generating the Switch’s Server Host Certificate . . . . . . . . . . . . . . . 9-6
To Generate or Erase the Switch’s Server Certificate
with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7
Comments on Certificate Fields. . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-8
Generate a Self-Signed Host Certificate with the WebAgent . . . 9-12