Configuring the SSH Server
391
c
CAUTION:
■
If you have configured a user interface to support SSH protocol, you must
configure AAA authentication for the user interface by using the
authentication-mode scheme
command to ensure successful login.
■
On a user interface, if the
authentication-mode password
or
authentication-mode none
command has been executed, the
protocol
inbound ssh
command is not available. Similarly, if the
protocol inbound ssh
command has been executed, the
authentication-mode password
and
authentication-mode none
commands are not available.
Generating/Destroying a
RSA or DSA Key Pair
This configuration task lets you generate or destroy a key pair. You must generate
an RSA or DSA key pair on the server for an SSH client to log in successfully. When
generating a key pair, you will be prompted to enter the key length in bits, which
is between 512 and 2048. In case a key pair already exists, the system will ask
whether to replace the existing key pair.
n
■
The command for generating a key pair can survive a reboot. You only need to
configure it once.
■
Some third-party software, for example, WinSCP, requires that the modulo of a
public key be greater than or equal to 768. Therefore, a local key pair of more
than 768 bits is recommended.
Specify the supported
protocol(s)
protocol inbound
{
all
|
ssh
|
telnet
}
Optional
By default, both Telnet and
SSH are supported.
Table 300
Configure the protocol(s) that a user interface supports
Operation Command Description
Table 301
Create or destroy a key pair
Operation
Command
Remarks
Enter system view
system-view
Generate an RSA key pair
rsa local-key-pair create
Required
Use either command
By default, no RSA key pair is
created.
public-key local create rsa
Destroy the RSA key pair
rsa local-key-pair destroy
Optional
Use either command to
destroy the configured RSA
key pair.
public-key local destroy rsa
Generate a DSA key pair
public-key local create dsa
Required
By default, no DSA key pair is
created.
Destroy the DSA key pair
public-key local destroy
dsa
Optional
Use the command to destroy
the configured DSA key pair.
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...