Scp Configuration Example Based On Suite B Algorithms - HP FlexNetwork 10500 Series Security Configuration Manual

Hide thumbs Also See for FlexNetwork 10500 Series:
Table of Contents

Advertisement

# Authorize the local user client001 to use the SSH service.
[SwitchB-luser-manage-client001] service-type ssh
# Assign the user role network-admin to the local user client001.
[SwitchB-luser-manage-client001] authorization-attribute user-role network-admin
[SwitchB-luser-manage-client001] quit
# Configure the SSH user client001. Specify the service type as scp and the authentication
method as password for the user.
[SwitchB] ssh user client001 service-type scp authentication-type password
2.
Configure an IP address for VLAN-interface 2 on the SCP client.
<SwitchA> system-view
[SwitchA] interface vlan-interface 2
[SwitchA-Vlan-interface2] ip address 192.168.0.2 255.255.255.0
[SwitchA-Vlan-interface2] quit
[SwitchA] quit
3.
Connect to the SCP server, download the file remote.bin from the server, and save it locally
with the name local.bin.
<SwitchA> scp 192.168.0.1 get remote.bin local.bin
Username: client001
Connecting to 192.168.0.1 port 22.
The server is not authenticated. Continue? [Y/N]:y
Do you want to save the server public key? [Y/N]:n
client001@192.168.0.1's password:
remote.bin

SCP configuration example based on Suite B algorithms

Network requirements
As shown in
Switch A acts as an SCP client (SSH2).
Switch B acts as the SCP server (SSH2), and it uses publickey authentication.
Switch B uses the following algorithms for the algorithm negotiation with the SCP client:
Key exchange algorithms ecdh-sha2-nistp256 and ecdh-sha2-nistp384.
Encryption algorithms aes128-gcm and aes256-gcm.
Public key algorithms x509v3-ecdsa-sha2-nistp256 and x509v3-ecdsa-sha2-nistp384.
Configure Switch A to establish an SCP connection to Switch B based on the Suite B algorithms.
After the connection is established, you can log in to Switch B to transfer files.
Figure 116 Network diagram
Configuration procedure
1.
Generate the client's certificates and the server's certificates. (Details not shown.)
You must first configure the certificates of the server and the client because they are required
for identity authentication between the two parties.
Figure
116:
100% 2875
408
2.8KB/s
00:00

Advertisement

Table of Contents
loading

Table of Contents