H3C Technologies H3C WX6000 Series Access Controllers User Manual
Page 26
xxi
ICMP-echo Test Configuration Example ·····················································································63-18
DHCP Test Configuration Example·····························································································63-19
FTP Test Configuration Example ································································································63-20
HTTP Test Configuration Example······························································································63-21
UDP-jitter Test Configuration Example ·······················································································63-21
SNMP Test Configuration Example·····························································································63-23
TCP Test Configuration Example································································································63-24
UDP-echo Test Configuration Example ······················································································63-25
DLSw Test Configuration Example ·····························································································63-26
64 SSH Configuration·································································································································64-1
SSH2.0 Overview··································································································································64-1
Algorithm and Key ·························································································································64-1
Asymmetric Key Algorithm ············································································································64-2
SSH Operating Process ················································································································64-2
Configuring the Device as an SSH Server····························································································64-5
SSH Server Configuration Task List······························································································64-5
Enabling SSH Server·····················································································································64-5
Configuring the User Interfaces for SSH Clients···········································································64-6
Configuring RSA and DSA Keys ···································································································64-6
Configuring a Client Public Key·····································································································64-7
Configuring an SSH User ··············································································································64-8
Setting the SSH Management Parameters ·················································································64-10
Configuring the Device as an SSH Client ···························································································64-11
SSH Client Configuration Task List ·····························································································64-11
Specifying a Source IP address/Interface for the SSH client······················································64-11
Configuring Whether First-time Authentication is Supported ······················································64-11
Establishing a Connection Between the SSH Client and the Server ··········································64-12
Displaying and Maintaining SSH·········································································································64-12
SSH Server Configuration Examples··································································································64-13
When Using Password Authentication ························································································64-13
When Using Publickey Authentication·························································································64-15
SSH Client Configuration Examples ···································································································64-19
When Using Password Authentication ························································································64-19
When Using Publickey Authentication·························································································64-21
65 SFTP Service··········································································································································65-1
SFTP Overview ·····································································································································65-1
Configuring an SFTP Server·················································································································65-1
Configuration Prerequisites ···········································································································65-1
Enabling the SFTP Server·············································································································65-1
Configuring the SFTP Connection Idle Timeout Period ································································65-2
Configuring an SFTP Client ··················································································································65-2
Specifying a Source IP Address or Interface for the SFTP Client·················································65-2
Establishing a Connection to the SFTP Server·············································································65-2
Working with the SFTP Directories ·······························································································65-3
Working with SFTP Files ···············································································································65-4