394
C
HAPTER
36: SSH C
ONFIGURATION
■
For details of the
header
command, see the corresponding section in
Login
Command
.
Configuring the Client
Public Key on the Server
n
This configuration is not necessary if the
password
authentication mode is
configured for SSH users.
With the
publickey
authentication mode configured for an SSH client, you must
configure the client’s RSA or DSA host public key(s) on the server for
authentication.
You can manually configure the public key or import it from a public key file. In the
former case, you can manually copy the client’s public key to the server. In the
latter case, the system automatically converts the format of the public key
generated by the client to complete the configuration on the server, but the
client’s public key should be transferred from the client to the server beforehand
through FTP/TFTP.
You can also use the following commands to configure the client’s RSA public key
on the server.
Table 307
Configure the client’s public key manually
Operation
Command
Description
Enter system view
system-view
Enter public key view
public-key peer
keyname
Required
Enter public key edit view
public-key-code begin
Configure a public key for the
client
Enter the content of the
public key
When you input the key data,
spaces are allowed between
the characters you input
(because the system can
remove the spaces
automatically); you can also
press <Enter> to continue
your input at the next line. But
the key you input should be a
hexadecimal digit string
coded in the public key
format.
Return to public key view
from public key edit view
public-key-code end
-
Exit public key view and
return to system view
peer-public-key end
-
Table 308
Import the public key from a public key file
Operation
Command
Description
Enter system view
system-view
-
Import the public key from a
public key file
public-key peer
keyname
import sshkey
filename
Required
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...