Operation Manual – SSH
H3C S5600 Series Ethernet Switches
Table of Contents
i
Table of Contents
Chapter 1 SSH Configuration....................................................................................................... 1-1
1.1 SSH Overview.................................................................................................................... 1-1
1.1.1 Introduction to SSH ................................................................................................. 1-1
1.1.2 Algorithm and Key ................................................................................................... 1-2
1.1.3 Asymmetric Key Algorithm ...................................................................................... 1-2
1.1.4 SSH Operating Process .......................................................................................... 1-3
1.2 SSH Server and Client Configuration Task List................................................................. 1-5
1.3 Configuring the SSH Server .............................................................................................. 1-6
1.3.1 Configuring the User Interfaces for SSH Clients..................................................... 1-7
1.3.2 Configuring the SSH Management Functions......................................................... 1-8
1.3.3 Configuring the SSH Server to Be Compatible with SSH1 Clients ......................... 1-9
1.3.4 Generating/Destroying Key Pairs............................................................................ 1-9
1.3.5 Creating an SSH User and Specifying an Authentication Type............................ 1-10
1.3.6 Specifying a Service Type for an SSH User ......................................................... 1-11
1.3.7 Configuring the Public Key of a Client on the Server............................................ 1-12
1.3.8 Assigning a Public Key to an SSH User ............................................................... 1-13
1.3.9 Exporting the RSA or DSA Public Key .................................................................. 1-13
1.4 Configuring the SSH Client.............................................................................................. 1-14
1.4.1 SSH Client Configuration Task List....................................................................... 1-14
1.4.2 Configuring an SSH Client that Runs SSH Client Software.................................. 1-15
1.4.3 Configuring an SSH Client Assumed by an SSH2-Capable Switch ..................... 1-22
1.5 Displaying and Maintaining SSH Configuration............................................................... 1-26
1.6 Comparison of SSH Commands with the Same Functions ............................................. 1-26
1.7 SSH Configuration Examples .......................................................................................... 1-27
1.7.1 When Switch Acts as Server for Local Password Authentication ......................... 1-27
1.7.2 When Switch Acts as Server for Password and RADIUS Authentication ............. 1-30
1.7.3 When Switch Acts as Server for Password and HWTACACS Authentication...... 1-35
1.7.4 When Switch Acts as Server for Publickey Authentication ................................... 1-38
1.7.5 When Switch Acts as Client for Password Authentication .................................... 1-45
1.7.6 When Switch Acts as Client for Publickey Authentication .................................... 1-47
1.7.7 When Switch Acts as Client and First-Time Authentication is not Supported ...... 1-50