Configuration Guide
SSH Terminal Service Configuration
Figure 9
Caution
To ensure the security of RSA public key authentication, the length of the
RSA key pairs must be greater or equal to 768 bits when generating RSA key
pairs.
Operations on a Server
After keys are generated on the client, the SSH server, namely the network
device, needs to copy the client public-key file to flash, and associate the file
with the SSH user name. Each user can associate with an RSA public key and
a DSA public key. See the following contents.
Ruijie# configure terminal
Ruijie(config)# ip ssh peer test public-key rsa flash:rsa.pub
Ruijie(config)# ip ssh peer test public-key dsa flash:dsa.pub
In this way, the client can log in to the network device using the public-key
based authentication method.
Using SSH to Transfer Files
Operations on a Server
Secure CoPy (SCP) is used in SSH file transfer. The SCP server function
needs to be enabled on the network device, so that the client can use SCP to
transfer files to the network device, or download files from the network device.
See the following contents.
Ruijie# configure terminal
Ruijie(config)# ip scp server enable
Summary of Contents for RG-S2900G-E Series
Page 1: ...RG S2900G E Series Switch RGOS Configuration Guide Release 10 4 2b12 p1 ...
Page 91: ...Configuration Guide Configuring PoE Configuration ...
Page 133: ...Configuration Guide EEE Configuration ...
Page 319: ...Configuration Guide QinQ Configuration ...
Page 408: ......
Page 409: ...IP Routing Configuration 1 Static Route Configuration ...
Page 412: ......
Page 413: ...Multicast Configuration 1 IGMP Snooping Configuration 2 MLD Snooping Configuration ...
Page 757: ......
Page 758: ...ACL QoS Configuration 1 Access Control List Configuration 2 QoS Configuration ...
Page 801: ...Reliability Configuration 1 RLDP Configuration 2 TPP Configuration 3 SEM Configuration ...
Page 901: ...Configuration Guide ERSPAN Configuration ...
Page 902: ...Web based Configuration 1 Web based Configuration ...