Session request, Interaction – H3C Technologies H3C WX3000E Series Wireless Switches User Manual
Page 304

290
An SSH2.0 server might require the client to pass both password authentication and publickey
authentication (password-publickey authentication) or either of them (any authentication). However, if the
client is running SSH1, the client only needs to pass either authentication, regardless of the requirement
of the server.
The authentication implements in the following steps:
1.
The client sends the server an authentication request that includes the username, the authentication
method, and the information related to the authentication method (for example, the password in
the case of password authentication).
2.
The server authenticates the client. If the authentication fails, the server sends the client a message
to inform the client of the failure and the methods available for re-authentication.
3.
The client selects a method from the list to initiate another authentication.
4.
The preceding process repeats until the authentication succeeds, or the number of failed
authentication attempts exceeds the maximum of authentication attempts. In the latter case, the
server tears the session down.
NOTE:
Only clients that runs SSH2.0 or a later version support password re-authentication that the SSH server
initiates.
Session request
After passing authentication, the client sends a session request to the server, and the server listens to and
processes the request from the client. If the server successfully processes the request, the server sends an
SSH_SMSG_SUCCESS packet to the client and goes on to the interaction stage with the client. Otherwise,
the server sends an SSH_SMSG_FAILURE packet to the client to indicate that the processing has failed or
it cannot resolve the request.
Interaction
In this stage, the server and the client exchanges data as follows:
1.
The client encrypts and sends the command to be executed to the server.
2.
The server decrypts and executes the command, and then encrypts and sends the result to the
client.
3.
The client decrypts and displays the result on the terminal.
In this stage, you can paste commands in text format and execute them at the CLI. The text pasted at one
time must be no more than 2000 bytes. H3C recommends you to paste commands in the same view.
Otherwise, the server might not be able to execute the commands correctly.
To execute more than 2000 bytes of command text, save the commands in a configuration file, upload
it to the server through SFTP, and use it to restart the server.
- H3C WX5500E Series Access Controllers H3C WX3500E Series Access Controllers H3C WX2500E Series Access Controllers H3C WX6000 Series Access Controllers H3C WX5000 Series Access Controllers H3C LSWM1WCM10 Access Controller Module H3C LSUM3WCMD0 Access Controller Module H3C LSUM1WCME0 Access Controller Module H3C LSWM1WCM20 Access Controller Module H3C LSQM1WCMB0 Access Controller Module H3C LSRM1WCM2A1 Access Controller Module H3C LSBM1WCM2A0 Access Controller Module H3C WA3600 Series Access Points H3C WA2600 Series WLAN Access Points H3C S10500 Series Switches H3C S5800 Series Switches H3C S5820X Series Switches H3C S12500 Series Switches H3C S9500E Series Switches H3C MSR 5600 H3C MSR 50 H3C MSR 3600 H3C MSR 30 H3C MSR 2600 H3C MSR 20-2X[40] H3C MSR 20-1X H3C MSR 930 H3C MSR 900 H3C SR8800 H3C SR6600-X H3C SR6600 H3C SecPath F5020 H3C SecPath F5040 H3C VMSG VFW1000