3Com Switch 8800 Configuration Guide
Chapter 50 SSH Terminal Service
50-3
z
The server initiates a procedure to authenticate the user. If the server is configured
not to authenticate the user, the process proceeds to session request phase
directly.
z
The client employs an authentication mode to authenticate the server till the
authentication succeeds or the server tears down the connection because of
timeout.
Note:
SSH provides two authentication modes: password authentication and RSA
authentication.
1) Password authentication procedure:
z
The client sends the username and password to the server;
z
The server compares the username and password sent from the client with the local
configuration. If it finds an exact match, the authentication succeeds.
2) RSA authentication procedure:
z
The server configures an RSA public key for the client;
z
The client sends its RSA public key member module to the server;
z
The server performs validity authentication on the member module. If the
authentication succeeds, the server generates a random number, encrypts it using
the RSA public key from the client, and sends the encrypted information back to the
client;
z
Both the server and the client uses the random number and the session ID with the
length of 16 characters as parameters to calculate the authentication data;
z
The client sends the authentication data it generates to the server;
z
The server compares the authentication data from the client with that locally
calculated. If they match, the authentication succeeds.
4) Session request: If the authentication succeeds, the client sends a session
request to the server. When the server has successfully processed the request,
SSH enters the interactive session phase.
5) Interactive session: The client and the server exchange data till the session is
over.
50.1.2 SSH Server Configuration
The following table describes the SSH server configuration tasks.
Table 50-1
SSH2.0 Configuration tasks
Num
Item
Command
Description
1 Entering
system
view <SW8800>
system-view
–