316
C
HAPTER
36: SSH T
ERMINAL
S
ERVICES
Configure the login protocol for the client002 user as SSH and authentication type as
RSA public key.
[4200G]
ssh user client002 authentication-type rsa
Generate randomly RSA key pairs on the SSH2.0 client and send the corresponding
public keys to the server.
Configure client public keys on the server, with their name as S4200G002.
[4200G]
rsa peer-public-key S4200G002
[4200G-rsa-public-key]
public-key-code begin
[4200G-rsa-key-code]
308186028180739A291ABDA704F5D93DC8FDF84C427463
[4200G-rsa-key-code]
1991C164B0DF178C55FA833591C7D47D5381D09CE82913
[4200G-rsa-key-code]
D7EDF9C08511D83CA4ED2B30B809808EB0D1F52D045DE4
[4200G-rsa-key-code]
0861B74A0E135523CCD74CAC61F8E58C452B2F3F2DA0DC
[4200G-rsa-key-code]
C48E3306367FE187BDD944018B3B69F3CBB0A573202C16
[4200G-rsa-key-code]
BB2FC1ACF3EC8F828D55A36F1CDDC4BB45504F020125
[4200G-rsa-key-code]
public-key-code end
[4200G-rsa-public-key]
peer-public-key end
[4200G]
ssh user client002 assign rsa-key S4200G002
Start the SSH client software on the host which stores the RSA private keys and make
corresponding configuration to establish an SSH connection.
SSH Client Configuration
Example
Network Requirements
As shown in Figure 102,
■
Switch A serves as an SSH client with user name as client003.
■
Switch B serves as an SSH server, with its IP address 10.165.87.136.
Network diagram
Figure 102
Network diagram for SSH client configuration
Configuration procedure
1
Configure the client to run the initial authentication.
[4200G]
ssh client first-time enable
2
Configure server public keys on the client.
[4200G]
rsa peer-public-key public
[4200G-rsa-public-key]
public-key-code begin
[4200G-rsa-key-code]
308186028180739A291ABDA704F5D93DC8FDF84C427463
PC
IP address
:
10.165.87.136
SSH Client
Switch B
SSH Server
Switch A
PC
IP address
:
10.165.87.136
SSH Client
Switch B
SSH Server
Switch A
Summary of Contents for 3CR17660-91
Page 10: ...8 CONTENTS ...
Page 14: ...4 ABOUT THIS GUIDE ...
Page 46: ...32 CHAPTER 5 LOGGING IN THROUGH WEB BASED NETWORK MANAGEMENT SYSTEM ...
Page 48: ...34 CHAPTER 6 LOGGING IN THROUGH NMS ...
Page 60: ...46 CHAPTER 9 VLAN CONFIGURATION ...
Page 64: ...50 CHAPTER 10 MANAGEMENT VLAN CONFIGURATION ...
Page 80: ...66 CHAPTER 13 GVRP CONFIGURATION ...
Page 98: ...84 CHAPTER 15 LINK AGGREGATION CONFIGURATION ...
Page 112: ...98 CHAPTER 18 MAC ADDRESS TABLE MANAGEMENT ...
Page 126: ...112 CHAPTER 19 LOGGING IN THROUGH TELNET ...
Page 162: ...148 CHAPTER 20 MSTP CONFIGURATION ...
Page 274: ...260 CHAPTER 29 IGMP SNOOPING CONFIGURATION ...
Page 276: ...262 CHAPTER 30 ROUTING PORT JOIN TO MULTICAST GROUP CONFIGURATION ...
Page 298: ...284 CHAPTER 33 SNMP CONFIGURATION ...
Page 304: ...290 CHAPTER 34 RMON CONFIGURATION ...
Page 338: ...324 CHAPTER 36 SSH TERMINAL SERVICES ...
Page 356: ...342 CHAPTER 38 FTP AND TFTP CONFIGURATION ...
Page 365: ...Information Center Configuration Example 351 S4200G terminal logging ...
Page 366: ...352 CHAPTER 39 INFORMATION CENTER ...
Page 378: ...364 CHAPTER 40 BOOTROM AND HOST SOFTWARE LOADING ...
Page 384: ...370 CHAPTER 41 Basic System Configuration and Debugging ...
Page 388: ...374 CHAPTER 43 NETWORK CONNECTIVITY TEST ...
Page 406: ...392 CHAPTER 45 CONFIGURATION OF NEWLY ADDED CLUSTER FUNCTIONS ...