beautypg.com

H3C Technologies H3C S3600 Series Switches User Manual

Page 890

background image

i

Table of Contents

1 SSH Configuration·····································································································································1-1

SSH Overview·········································································································································1-1

Introduction to SSH ·························································································································1-1

Algorithm and Key ···························································································································1-1

SSH Operating Process ··················································································································1-2

SSH Server and Client ····························································································································1-4

Configuring the SSH Server····················································································································1-5

Configuring the User Interfaces for SSH Clients·············································································1-6

Configuring the SSH Management Functions ·················································································1-7

Configuring the SSH Server to Be Compatible with SSH1 Clients ·················································1-8

Configuring Key Pairs······················································································································1-8

Creating an SSH User and Specifying an Authentication Type ······················································1-9

Specifying a Service Type for an SSH User on the Server···························································1-11

Configuring the Public Key of a Client on the Server ····································································1-12

Assigning a Public Key to an SSH User························································································1-12

Exporting the Host Public Key to a File ·························································································1-13

Configuring the SSH Client ···················································································································1-14

SSH Client Configuration Task List ·······························································································1-14

Configuring an SSH Client that Runs SSH Client Software ··························································1-14

Configuring an SSH Client Assumed by an SSH2-Capable Switch··············································1-21

Displaying and Maintaining SSH Configuration ····················································································1-24

Comparison of SSH Commands with the Same Functions ··································································1-24

SSH Configuration Examples ···············································································································1-25

When Switch Acts as Server for Local Password Authentication ·················································1-25

When Switch Acts as Server for Password and RADIUS Authentication ·····································1-28

When Switch Acts as Server for Password and HWTACACS Authentication ······························1-32

When Switch Acts as Server for Publickey Authentication ···························································1-34

When Switch Acts as Client for Password Authentication ····························································1-40

When Switch Acts as Client for Publickey Authentication·····························································1-41

When Switch Acts as Client and First-Time Authentication is not Supported·······························1-43

This manual is related to the following products: