SSH Terminal Services
313
Configuring authentication type
New users must specify authentication type. Otherwise, they cannot access the
switch.
CAUTION:
■
If RSA authentication type is defined, then the RSA public key of the client user
must be configured on the switch.
■
By default, no authentication type is specified for a new user, so they cannot
access the switch.
■
For the
password-publickey
authentication type: SSHv1 client users can access
the switch as long as they pass one of the two authentications. SSHv2 client users
can access the switch only when they pass both the authentications.
Configuring server SSH attributes
Configuring server SSH authentication timeout time and retry times can effectively
assure security of SSH connections and avoid illegal actions.
Configuring client public keys
You can configure RSA public keys for client users on the switch and specify RSA
private keys, which correspond to the public keys, on the client. Then client keys are
generated randomly by the SSH2.0 client software. This operation is not required for
password authentication type.
Table 266
Configure authentication type
Operation
Command
Remarks
Enter system view
system-view
-
Configure authentication type for
SSH users
ssh user
username
authentication-type
{
password
|
password-publickey
|
rsa
|
all
}
Required
Table 267
Configure server SSH attributes
Operation
Command
Remarks
Enter system view
system-view
-
Set SSH authentication
timeout time
ssh server timeout
seconds
Optional
The timeout time defaults to
60 seconds.
Set SSH authentication retry
times
ssh server
authentication-retries
times
Optional
The retry times defaults to 3.
Table 268
Configure client public keys
Operation
Command
Remarks
Enter system view
system-view
-
Enter public key view
rsa peer-public-key
key-name
Required
Enter public key edit view
public-key-code begin
You can key in a blank space
between characters, since the
system can remove the blank
space automatically. But the
public key should be
composed of hexadecimal
characters.
Return to public key view from
public key edit view
public-key-code end
The system saves public key
data when exiting from public
key edit view
Содержание 4200G 12-Port
Страница 10: ...8 CONTENTS...
Страница 14: ...4 ABOUT THIS GUIDE...
Страница 46: ...32 CHAPTER 5 LOGGING IN THROUGH WEB BASED NETWORK MANAGEMENT SYSTEM...
Страница 48: ...34 CHAPTER 6 LOGGING IN THROUGH NMS...
Страница 60: ...46 CHAPTER 9 VLAN CONFIGURATION...
Страница 64: ...50 CHAPTER 10 MANAGEMENT VLAN CONFIGURATION...
Страница 80: ...66 CHAPTER 13 GVRP CONFIGURATION...
Страница 98: ...84 CHAPTER 15 LINK AGGREGATION CONFIGURATION...
Страница 112: ...98 CHAPTER 18 MAC ADDRESS TABLE MANAGEMENT...
Страница 126: ...112 CHAPTER 19 LOGGING IN THROUGH TELNET...
Страница 162: ...148 CHAPTER 20 MSTP CONFIGURATION...
Страница 274: ...260 CHAPTER 29 IGMP SNOOPING CONFIGURATION...
Страница 276: ...262 CHAPTER 30 ROUTING PORT JOIN TO MULTICAST GROUP CONFIGURATION...
Страница 298: ...284 CHAPTER 33 SNMP CONFIGURATION...
Страница 304: ...290 CHAPTER 34 RMON CONFIGURATION...
Страница 338: ...324 CHAPTER 36 SSH TERMINAL SERVICES...
Страница 356: ...342 CHAPTER 38 FTP AND TFTP CONFIGURATION...
Страница 365: ...Information Center Configuration Example 351 S4200G terminal logging...
Страница 366: ...352 CHAPTER 39 INFORMATION CENTER...
Страница 378: ...364 CHAPTER 40 BOOTROM AND HOST SOFTWARE LOADING...
Страница 384: ...370 CHAPTER 41 Basic System Configuration and Debugging...
Страница 388: ...374 CHAPTER 43 NETWORK CONNECTIVITY TEST...
Страница 406: ...392 CHAPTER 45 CONFIGURATION OF NEWLY ADDED CLUSTER FUNCTIONS...
Страница 422: ...408 CHAPTER 48 UDP HELPER CONFIGURATION...