
415
# Establish an SCP connection to the SCP server
192.168.0.1
based on the 192-bit Suite B
algorithms.
<SwitchA> scp 192.168.0.1 get src.cfg suite-b 192-bit pki-domain client384
server-pki
-domain server384
Username: client002
Press CTRL+C to abort.
Connecting to 192.168.0.1 port 22.
src.cfg 100% 4814 4.7KB/s 00:00
<SwitchA>
NETCONF over SSH configuration example with
password authentication
Unless otherwise noted, devices in the configuration examples are in non-FIPS mode.
When you configure SSH on devices operating in FIPS mode, follow these restrictions and
guidelines:
•
The modulus length of the key pair must be 2048 bits.
•
When the device acts as the NETCONF-over-SSH server, it supports only RSA and ECDSA key
pairs. If both RSA and ECDSA key pairs exist on the server, the server uses the ECDSA key
pair.
Network requirements
As shown in
•
The switch uses local password authentication.
•
The client's username and password are saved on the switch.
Establish a NETCONF-over-SSH connection between the host and the switch, so that you can log in
to the switch to perform NETCONF operations.
Figure 117 Network diagram
Configuration procedure
# Generate RSA key pairs.
<Switch> system-view
[Switch] public-key local create rsa
The range of public key size is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
Summary of Contents for 10500 series
Page 326: ...312 No duration limit for this SA ...