SFTP Configuration
441
n
If you specify to authenticate a client through public key on the server, the client
needs to read the local private key when logging in to the SFTP server. Since both
RSA and DSA are available for public key authentication, you need to use the
identity-key
key word to specify the algorithms to get correct local private key;
otherwise you will fail to log in. For details, see SSH Operation Manual.
SFTP Configuration
Example
Network requirements
As shown in Figure 151, establish an SSH connection between the SFTP client
(switch A) and the SFTP server (switch B). Log in to switch B through switch A to
manage and transmit files. An SFTP user with the user name "client001" and
password "abc" exists on the SFTP server.
Network diagram
Figure 151
Network diagram for SFTP configuration
Configuration procedure
1
Configure the SFTP server (switch B)
# Create key pairs.
<4210> system-view
[4210] public-key local create rsa
[4210] public-key local create dsa
# Create a VLAN interface on the switch and assign to it an IP address, which is
used as the destination address for the client to connect to the SFTP server.
[4210] interface vlan-interface 1
[4210-Vlan-interface1] ip address 192.168.0.1 255.255.255.0
[4210-Vlan-interface1] quit
# Specify the SSH authentication mode as AAA.
[4210] user-interface vty 0 4
[4210-ui-vty0-4] authentication-mode scheme
# Configure the protocol through which the remote user logs in to the switch as
SSH.
[4210-ui-vty0-4] protocol inbound ssh
[4210-ui-vty0-4] quit
# Create a local user client001.
[4210] local-user client001
[4210-luser-client001] password simple abc
[4210-luser-client001] service-type ssh
[4210-luser-client001] quit
Switch B
SFTP Server
SFTP Client
Vlan -Int1
192.168.0.1/24
Vlan -Int1
192.168.0.2/24
Switch A
Summary of Contents for 4210 PWR
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION...
Page 340: ...338 CHAPTER 30 CLUSTER...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT...