Fips compliance, Configuring the device as an ssh server, Ssh server configuration task list – H3C Technologies H3C S12500-X Series Switches User Manual
Page 183: Generating local dsa or rsa key pairs
171
•
Password-publickey authentication—The server requires SSH2 clients to pass both password
authentication and publickey authentication. However, an SSH1 client only needs to pass either
authentication, regardless of the requirement of the server.
•
Any authentication—The server requires clients to pass either password authentication or publickey
authentication.
116B
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode (see "
874H
Configuring FIPS
") and non-FIPS mode.
117B
Configuring the device as an SSH server
You can configure the device as an Stelnet, SFTP, or SCP server. Because the configuration procedures
are similar, the SSH server represents the Stelnet, SFTP, or SCP server unless otherwise specified.
263B
SSH
server configuration task list
Tasks at a glance
Remarks
(Required.)
875H
Generating local DSA or RSA key pairs
N/A
(Required.)
876H
Enabling the SSH server function
Required for Stelnet and SCP servers.
(Required.)
877H
Enabling the SFTP server function
Required for SFTP server.
(Required.)
878H
Configuring the user lines for Stelnet clients
N/A
(Required.)
879H
Configuring a client's host public key
Required if the authentication method is publickey,
password-publickey, or any.
(Required/optional.)
880H
Configuring an SSH user
Required if the authentication method is publickey,
password-publickey, or any.
Optional if the authentication method is password.
(Optional.)
881H
Setting the SSH management parameters
N/A
264B
Generating local DSA or RSA key pairs
IMPORTANT:
Do not generate the local DSA key pair when the device operates in FIPS mode as an SSH server. User
authentication will fail because the SSH server operating in FIPS mode supports only RSA key pairs.
The DSA or RSA key pairs are required for generating the session key and session ID in the key exchange
stage, and can also be used by a client to authenticate the server. When a client tries to authenticate the
server, it compares the public key that it receives from the server with the server public key that it saved
locally. If the keys are consistent, the client uses the public key to authenticate the digital signature that
receives from the server. If the digital signatures are consistent, the authentication succeeds.
To support SSH clients that use different types of key pairs, generate both DSA and RSA key pairs on the
SSH server.
- H3C S5560 Series Switches H3C WX6000 Series Access Controllers H3C WX5000 Series Access Controllers H3C WX3000 Series Unified Switches H3C LSWM1WCM10 Access Controller Module H3C LSWM1WCM20 Access Controller Module H3C LSQM1WCMB0 Access Controller Module H3C LSRM1WCM2A1 Access Controller Module H3C LSBM1WCM2A0 Access Controller Module H3C S9800 Series Switches H3C S5130 Series Switches H3C S5120 Series Switches