208
C
HAPTER
15: SSH T
ERMINAL
S
ERVICES
Network diagram
Figure 50
Network diagram for SSH client configuration
Configuration procedure
1
Configure the client to run the initial authentication.
[S5500]
ssh client first-time enable
2
Configure server public keys on the client.
[S5500]
rsa peer-public-key public
[S5500-rsa-public-key] public-key-code begin
[S5500-rsa-key-code] 308186028180739A291ABDA704F5D93DC8FDF84C427463
[S5500-rsa-key-code] 1991C164B0DF178C55FA833591C7D47D5381D09CE82913
[S5500-rsa-key-code] D7EDF9C08511D83CA4ED2B30B809808EB0D1F52D045DE4
[S5500-rsa-key-code] 0861B74A0E135523CCD74CAC61F8E58C452B2F3F2DA0DC
[S5500-rsa-key-code] C48E3306367FE187BDD944018B3B69F3CBB0A573202C16
[S5500-rsa-key-code] BB2FC1ACF3EC8F828D55A36F1CDDC4BB45504F020125
[S5500-rsa-key-code] public-key-code end
[S5500-rsa-public-key] peer-public-key end
[S5500]
ssh client 10.165.87.136 assign rsa-key public
3
Start SSH client.
Settings for the two authentication types are described respectively in the following:
a
Use the password authentication and start the client using the default encryption
algorithm.
[S5500]
ssh2 10.165.87.136
username:
client003
Trying 10.165.87.136
Press CTRL+K to abort
Connected to 10.165.87.136...
The Server is not autherncated.Do you continue access it?(Y/N):y
Do you want to save the server's public key?(Y/N):y
Enter password:
*********************************************************
* All rights reserved (1997-2005) *
* Without the owner's prior written consent, *
*no decompiling or reverse-engineering shall be allowed.*
*********************************************************
<S5500>
PC
IP address
:
10.165.87.136
SSH Client
Switch B
SSH Server
Switch A
PC
IP address
:
10.165.87.136
SSH Client
Switch B
SSH Server
Switch A
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...