390
C
HAPTER
36: SSH C
ONFIGURATION
and goes on to the interactive session stage with the client. Otherwise, the server
sends back to the client an SSH_SMSG_FAILURE packet, indicating that the
processing fails or it cannot resolve the request. The client sends a session request
to the server, which processes the request and establishes a session.
Data exchange
In this stage, the server and the client exchanges data in this way:
■
The client encrypts and sends the command to be executed to the server.
■
The server decrypts and executes the command, and then encrypts and sends
the result to the client.
■
The client decrypts and displays the result on the terminal.
Configuring the SSH
Server
You must perform necessary configurations on the SSH server for SSH clients to
access.
SSH Server
Configuration Tasks
Configuring the Protocol
Support for the User
Interface
You must configure the supported protocol(s) for SSH remote login. Note that the
configuration does not take effect immediately, but will be effective for
subsequent login requests.
Table 299
SSH server configuration tasks
Tasks
Description
Configuring
the SSH server
Configuring the Protocol
Support for the User Interface
Required
Generating/Destroying a RSA
or DSA Key Pair
Required
Exporting the RSA or DSA
Public Key
Optional
Creating an SSH User and
Specify an Authentication Type
Required
Specifying a Service Type for
an SSH User
Optional
Configuring SSH Management Optional
Configuring the Client Public
Key on the Server
Required for
pubilckey
authentication;
unnecessary for
password
authentication
Assigning a Public Key to an
SSH User
Required for
pubilckey
authentication;
unnecessary for
password
authentication
Table 300
Configure the protocol(s) that a user interface supports
Operation
Command
Description
Enter system view
system-view
-
Enter the view of one or
multiple user interfaces
user-interface
[
type
]
first-number
[
last-number
]
-
Configure the authentication
mode as scheme
authentication-mode
scheme
[
command-authorization
]
Required
By default, the user interface
authentication mode is
password
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...