beautypg.com

H3C Technologies H3C S7500E Series Switches User Manual

Page 11

background image

v

11 Public Key Configuration······················································································································11-1

Asymmetric Key Algorithm Overview····································································································11-1

Basic Concepts······························································································································11-1

Key Algorithm Types ·····················································································································11-1

Asymmetric Key Algorithm Applications························································································11-2

Configuring the Local Asymmetric Key Pair··························································································11-2

Creating an Asymmetric Key Pair ·································································································11-2

Displaying or Exporting the Local RSA or DSA Host Public Key ··················································11-3

Destroying an Asymmetric Key Pair······························································································11-3

Configuring the Public Key of a Peer ····································································································11-4

Displaying and Maintaining Public Keys ·······························································································11-5

Public Key Configuration Examples······································································································11-5

Configuring the Public Key of a Peer Manually ·············································································11-5

Importing the Public Key of a Peer from a Public Key File····························································11-7

SSH2.0 Configuration·································································································································11-1

SSH2.0 Overview··································································································································11-1

Introduction to SSH2.0 ··················································································································11-1

Operation of SSH ··························································································································11-1

Configuring the Device as an SSH Server····························································································11-4

SSH Server Configuration Task List······························································································11-4

Generating a DSA or RSA Key Pair ······························································································11-5

Enabling the SSH Server Function································································································11-5

Configuring the User Interfaces for SSH Clients···········································································11-6

Configuring a Client Public Key·····································································································11-6

Configuring an SSH User ··············································································································11-8

Setting the SSH Management Parameters ···················································································11-9

Configuring the Device as an SSH Client ···························································································11-10

SSH Client Configuration Task List ·····························································································11-10

Specifying a Source IP address/Interface for the SSH Client ·····················································11-11

Configuring Whether First-time Authentication is Supported ······················································11-11

Establishing a Connection Between the SSH Client and the Server ··········································11-12

Displaying and Maintaining SSH·········································································································11-13

SSH Server Configuration Examples··································································································11-13

When Switch Acts as Server for Password Authentication ·························································11-13

When Switch Acts as Server for Publickey Authentication ·························································11-16

SSH Client Configuration Examples ···································································································11-21

When Switch Acts as Client for Password Authentication ··························································11-21

When Switch Acts as Client for Publickey Authentication···························································11-24

12 SFTP Configuration ·······························································································································12-1

SFTP Overview ·····································································································································12-1

Configuring the Device as an SFTP Server ··························································································12-1

Configuration Prerequisites ···········································································································12-1

Enabling the SFTP Server·············································································································12-1

Configuring the SFTP Connection Idle Timeout Period ································································12-2

Configuring the Device an SFTP Client ································································································12-2