312
C
HAPTER
36: SSH T
ERMINAL
S
ERVICES
Configuring supported protocols
CAUTION:
When SSH protocol is specified, to ensure a successful login, you must
configure the AAA authentication using the
authentication-mode scheme
command.
The
protocol inbound ssh
configuration fails if you configured
authentication-mode password
or
authentication-mode none
. When you
configure SSH protocol successfully for the user interface, then you cannot configure
authentication-mode password
or
authentication-mode none
any more.
Generating or destroying RSA key pairs
The name of the server RSA key pair is in the format of switch name plus _host,
S4200G_host for example.
After you use the command, the system prompts you to define the key length.
■
In SSH1.x, the key length is in the range of 512 to 2,048 (bits).
■
In SSH2.0, the key length is in the range of 1024 to 2048 (bits). To make SSH 1.x
compatible, 512- to 2,048-bit keys are allowed on clients, but the length of server
keys must be more than 1,024 bits. Otherwise, clients cannot be authenticated.
CAUTION:
■
For a successful SSH login, you must generate a local RSA key pair first.
■
You just need to execute the command once, with no further action required even
after the system is rebooted.
■
If you use this command to generate an RSA key provided an old one exits, the
system will prompt you to replace the previous one or not.
Table 264
Configure supported protocols
Operation
Command
Remarks
Enter system view
system-view
-
Enter one or multiple user
interface views
user-interface
[
type-keyword
]
number
[
ending-number ]
Required
Configure the protocols supported
in the user interface view(s)
protocol inbound
{
all
|
ssh
|
telnet }
Optional
By default, the system
supports both Telnet and
SSH.
Table 265
Generate or destroy RSA key pairs
Operation
Command
Remarks
Enter system view
system-view
-
Generate a local RSA key pair
rsa local-key-pair create
Required
Destroy a local RSA key pair
rsa local-key-pair destroy
Optional
Содержание 4200G 12-Port
Страница 10: ...8 CONTENTS...
Страница 14: ...4 ABOUT THIS GUIDE...
Страница 46: ...32 CHAPTER 5 LOGGING IN THROUGH WEB BASED NETWORK MANAGEMENT SYSTEM...
Страница 48: ...34 CHAPTER 6 LOGGING IN THROUGH NMS...
Страница 60: ...46 CHAPTER 9 VLAN CONFIGURATION...
Страница 64: ...50 CHAPTER 10 MANAGEMENT VLAN CONFIGURATION...
Страница 80: ...66 CHAPTER 13 GVRP CONFIGURATION...
Страница 98: ...84 CHAPTER 15 LINK AGGREGATION CONFIGURATION...
Страница 112: ...98 CHAPTER 18 MAC ADDRESS TABLE MANAGEMENT...
Страница 126: ...112 CHAPTER 19 LOGGING IN THROUGH TELNET...
Страница 162: ...148 CHAPTER 20 MSTP CONFIGURATION...
Страница 274: ...260 CHAPTER 29 IGMP SNOOPING CONFIGURATION...
Страница 276: ...262 CHAPTER 30 ROUTING PORT JOIN TO MULTICAST GROUP CONFIGURATION...
Страница 298: ...284 CHAPTER 33 SNMP CONFIGURATION...
Страница 304: ...290 CHAPTER 34 RMON CONFIGURATION...
Страница 338: ...324 CHAPTER 36 SSH TERMINAL SERVICES...
Страница 356: ...342 CHAPTER 38 FTP AND TFTP CONFIGURATION...
Страница 365: ...Information Center Configuration Example 351 S4200G terminal logging...
Страница 366: ...352 CHAPTER 39 INFORMATION CENTER...
Страница 378: ...364 CHAPTER 40 BOOTROM AND HOST SOFTWARE LOADING...
Страница 384: ...370 CHAPTER 41 Basic System Configuration and Debugging...
Страница 388: ...374 CHAPTER 43 NETWORK CONNECTIVITY TEST...
Страница 406: ...392 CHAPTER 45 CONFIGURATION OF NEWLY ADDED CLUSTER FUNCTIONS...
Страница 422: ...408 CHAPTER 48 UDP HELPER CONFIGURATION...