Configuring secure shell (ssh) – HP 4100GL User Manual

Page 7

Advertising
background image

Outline of the Steps for Configuring RADIUS Authentication . . . . . . 3-6

1. Configure Authentication for the Access Methods You Want

RADIUS To Protect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8

2. Configure the Switch To Access a RADIUS Server . . . . . . . . . . . . 3-10

3. Configure the Switch’s Global RADIUS Parameters . . . . . . . . . . . 3-12

Local Authentication Process

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14

Controlling Web Browser Interface Access

When Using RADIUS Authentication

. . . . . . . . . . . . . . . . . . . . . . . . . 3-15

Configuring RADIUS Accounting

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16

Operating Rules for RADIUS Accounting . . . . . . . . . . . . . . . . . . . . . . 3-17

Steps for Configuring RADIUS Accounting . . . . . . . . . . . . . . . . . . . . . 3-18

1. Configure the Switch To Access a RADIUS Server . . . . . . . . . 3-19
2. Configure Accounting Types and the Controls for

Sending Reports to the RADIUS Server . . . . . . . . . . . . . . . . 3-20

3. (Optional) Configure Session Blocking and

Interim Updating Options . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22

Viewing RADIUS Statistics

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23

General RADIUS Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23

RADIUS Authentication Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25

RADIUS Accounting Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-26

Changing RADIUS-Server Access Order

. . . . . . . . . . . . . . . . . . . . . . . 3-27

Messages Related to RADIUS Operation

. . . . . . . . . . . . . . . . . . . . . . . 3-29

4 Configuring Secure Shell (SSH)

Contents

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1

Overview

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2

Terminology

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3

Prerequisite for Using SSH

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4

Public Key Formats

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5

Steps for Configuring and Using SSH for Switch and Client

Authentication

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5

General Operating Rules and Notes

. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8

Configuring the Switch for SSH Operation

. . . . . . . . . . . . . . . . . . . . . . 4-9

v

Advertising