beautypg.com

H3C Technologies H3C SecPath F1000-E User Manual

Page 10

background image

v

SNMPv3 configuration example························································································································ 142

 

SNMP logging configuration example ············································································································· 143

 

Configuring MIB style ············································································································································· 146

 

Setting the MIB style ····················································································································································· 146

 

Displaying and maintaining MIB style ······················································································································· 146

 

Configuring RSH ····················································································································································· 147

 

RSH overview ······························································································································································· 147

 

Configuration procedure ············································································································································· 147

 

RSH configuration example ········································································································································ 147

 

Configuring SSH ····················································································································································· 150

 

Feature and hardware compatibility ·························································································································· 150

 

Overview ······································································································································································· 150

 

SSH operation ····················································································································································· 150

 

SSH support for VPNs ········································································································································· 153

 

Configuring the firewall as an SSH server ················································································································ 153

 

SSH server configuration task list ······················································································································ 153

 

Generating local DSA or RSA key pairs ··········································································································· 154

 

Enabling the SSH server function ······················································································································· 154

 

Configuring the user interfaces for SSH clients ································································································ 155

 

Configuring a client's host public key ··············································································································· 155

 

Configuring an SSH user ···································································································································· 156

 

Setting the SSH management parameters ········································································································ 158

 

Configuring the firewall as an SSH client ················································································································· 158

 

SSH client configuration task list ························································································································ 158

 

Specifying a source IP address/interface for the SSH client ·········································································· 159

 

Enabling and disabling first-time authentication ······························································································ 159

 

Establishing a connection between an SSH client and the server ································································· 160

 

Displaying and maintaining SSH ······························································································································· 161

 

SSH server configuration examples ··························································································································· 162

 

Password authentication enabled SSH server configuration example ·························································· 162

 

Publickey authentication enabled SSH server configuration example ··························································· 164

 

SSH client configuration examples ····························································································································· 169

 

Password authentication enabled SSH client configuration example ···························································· 169

 

Publickey authentication enabled SSH client configuration example ···························································· 172

 

Configuring SFTP ····················································································································································· 175

 

Overview ······································································································································································· 175

 

Configuring the firewall as an SFTP server ··············································································································· 175

 

Configuration prerequisites ································································································································ 175

 

Enabling the SFTP server ···································································································································· 175

 

Configuring the SFTP connection idle timeout period ····················································································· 176

 

Configuring the firewall as an SFTP client ················································································································· 176

 

Specifying a source IP address or interface for the SFTP client ······································································ 176

 

Establishing a connection to the SFTP server ···································································································· 176

 

Working with SFTP directories ··························································································································· 177

 

Working with SFTP files ······································································································································ 178

 

Displaying help information ······························································································································· 179

 

Terminating the connection to the remote SFTP server ···················································································· 179

 

SFTP client configuration example ····························································································································· 179

 

SFTP server configuration example ···························································································································· 183

 

Managing virtual firewalls ······································································································································ 186

 

Overview ······································································································································································· 186

 

Configuring a virtual device ······································································································································· 187