396
C
HAPTER
36: SSH C
ONFIGURATION
Configuring the SSH
Client
An SSH client software or SSH2-capable switch can serve as an SSH client to access
the SSH server.
SSH Client Configuration
Tasks
Configuring the SSH
Client Using an SSH
Client Software
A variety of SSH client software are available, such as PuTTY and OpenSSH. For an
SSH client to establish a connection with an SSH server, use the following
commands:
n
■
Selecting the protocol for remote connection as SSH. Usually, a client can use a
variety of remote connection protocols, such as Telnet, Rlogin, and SSH. To
establish an SSH connection, you must select SSH
■
When a Switch 4210 acts as the SSH server, select 2.0 for the clients.
■
Specifying the private key file. On the server, if public key authentication is
enabled for an SSH user and a public key is set for the user, the private key file
corresponding to the public key must be specified on the client. RSA key pairs
and DSA key pairs are generated by a tool of the client software.
The following takes the client software of PuTTY, PuTTYGen and SSHKEY as
examples to illustrate how to configure the SSH client:
Generate a client key
To generate a client key, run PuTTYGen.exe, and select from the
Parameters
area
the type of key you want to generate, either SSH-2 RSA or SSH-2 DSA, then click
Generate.
Table 311
SSH client configuration tasks
Tasks
Description
Configuring the SSH
client
Using an SSH client software
Use either approach
On an SSH2-capable switch
Table 312
Configuration tasks for using a client software
Tasks
Description
“Generate a client key”
Required for
publickey
authentication;
unnecessary for
password
authentication
“Specify the IP address of the Server”
Required
“Select a protocol for remote connection”
Required
“Select an SSH version”
Required
“Open an SSH connection with publickey
authentication”
Required for
publickey
authentication;
unnecessary for
password
authentication
“Open an SSH connection with password
authentication”
Required for
publickey
authentication;
unnecessary for
password
authentication
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...