SSH Terminal Services
203
Configuring authentication type
New users must specify authentication type. Otherwise, they cannot access the
switch.
If RSA authentication type is defined, then the RSA public key of the client user must
be configured on the switch.
By default, no authentication type is specified for a new user, so they cannot access
the switch.
If you specify the
password-publickey
keyword when execute the
ssh user
username
authentication-type
command, users using SSHv1 can log onto a switch
if they pass one of the authentications, whereas those using SSHv2 need to pass both
of the authentications to log onto a switch.
Configuring server SSH attributes
Configuring server SSH authentication timeout time and retry number can effectively
assure security of SSH connections and avoid illegal actions.
Configure server SSH attributes
Configuring client public keys
This operation is not required for password authentication type.
You can configure RSA public keys for client users on the server in two ways:
1
Manual mode
■
Operations on the client include:
■
SSH1.5/2.0-supported client software generates randomly RSA key pairs.
■
SSHKEY.EXE software converts the public part of the RSA key into PKCS code
format.
Operations on the server are described in Table 184.
Table 182
Configure authentication type
Operation
Command
Description
Enter system view
system-view
-
Configure authentication type
for SSH users
ssh user
username
authentication-type
{
password
|
password-publickey
|
rsa
|
all
}
Required
Table 183
Configure server SSH attributes
Operation
Command
Description
Enter system view
system-view
-
Set SSH authentication
timeout time
ssh server timeout
seconds
Optional
The timeout time defaults to 60
seconds.
Set SSH authentication retry
number
ssh server
authentication-retries
times
Optional
The retry number defaults to 3.
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...