312
C
HAPTER
36: SSH T
ERMINAL
S
ERVICES
Configuring supported protocols
CAUTION:
When SSH protocol is specified, to ensure a successful login, you must
configure the AAA authentication using the
authentication-mode scheme
command.
The
protocol inbound ssh
configuration fails if you configured
authentication-mode password
or
authentication-mode none
. When you
configure SSH protocol successfully for the user interface, then you cannot configure
authentication-mode password
or
authentication-mode none
any more.
Generating or destroying RSA key pairs
The name of the server RSA key pair is in the format of switch name plus _host,
S4200G_host for example.
After you use the command, the system prompts you to define the key length.
■
In SSH1.x, the key length is in the range of 512 to 2,048 (bits).
■
In SSH2.0, the key length is in the range of 1024 to 2048 (bits). To make SSH 1.x
compatible, 512- to 2,048-bit keys are allowed on clients, but the length of server
keys must be more than 1,024 bits. Otherwise, clients cannot be authenticated.
CAUTION:
■
For a successful SSH login, you must generate a local RSA key pair first.
■
You just need to execute the command once, with no further action required even
after the system is rebooted.
■
If you use this command to generate an RSA key provided an old one exits, the
system will prompt you to replace the previous one or not.
Table 264
Configure supported protocols
Operation
Command
Remarks
Enter system view
system-view
-
Enter one or multiple user
interface views
user-interface
[
type-keyword
]
number
[
ending-number ]
Required
Configure the protocols supported
in the user interface view(s)
protocol inbound
{
all
|
ssh
|
telnet }
Optional
By default, the system
supports both Telnet and
SSH.
Table 265
Generate or destroy RSA key pairs
Operation
Command
Remarks
Enter system view
system-view
-
Generate a local RSA key pair
rsa local-key-pair create
Required
Destroy a local RSA key pair
rsa local-key-pair destroy
Optional
Summary of Contents for 3CR17660-91
Page 10: ...8 CONTENTS ...
Page 14: ...4 ABOUT THIS GUIDE ...
Page 46: ...32 CHAPTER 5 LOGGING IN THROUGH WEB BASED NETWORK MANAGEMENT SYSTEM ...
Page 48: ...34 CHAPTER 6 LOGGING IN THROUGH NMS ...
Page 60: ...46 CHAPTER 9 VLAN CONFIGURATION ...
Page 64: ...50 CHAPTER 10 MANAGEMENT VLAN CONFIGURATION ...
Page 80: ...66 CHAPTER 13 GVRP CONFIGURATION ...
Page 98: ...84 CHAPTER 15 LINK AGGREGATION CONFIGURATION ...
Page 112: ...98 CHAPTER 18 MAC ADDRESS TABLE MANAGEMENT ...
Page 126: ...112 CHAPTER 19 LOGGING IN THROUGH TELNET ...
Page 162: ...148 CHAPTER 20 MSTP CONFIGURATION ...
Page 274: ...260 CHAPTER 29 IGMP SNOOPING CONFIGURATION ...
Page 276: ...262 CHAPTER 30 ROUTING PORT JOIN TO MULTICAST GROUP CONFIGURATION ...
Page 298: ...284 CHAPTER 33 SNMP CONFIGURATION ...
Page 304: ...290 CHAPTER 34 RMON CONFIGURATION ...
Page 338: ...324 CHAPTER 36 SSH TERMINAL SERVICES ...
Page 356: ...342 CHAPTER 38 FTP AND TFTP CONFIGURATION ...
Page 365: ...Information Center Configuration Example 351 S4200G terminal logging ...
Page 366: ...352 CHAPTER 39 INFORMATION CENTER ...
Page 378: ...364 CHAPTER 40 BOOTROM AND HOST SOFTWARE LOADING ...
Page 384: ...370 CHAPTER 41 Basic System Configuration and Debugging ...
Page 388: ...374 CHAPTER 43 NETWORK CONNECTIVITY TEST ...
Page 406: ...392 CHAPTER 45 CONFIGURATION OF NEWLY ADDED CLUSTER FUNCTIONS ...