202
C
HAPTER
15: SSH T
ERMINAL
S
ERVICES
Configuring supported protocols
When SSH protocol is specified, to ensure a successful login, you must configure the
AAA authentication using the
authentication-mode scheme
command.
The
protocol inbound ssh
configuration fails if you configured
authentication-mode password
and
authentication-mode none
. When you
configured SSH protocol successfully for the user interface, then you cannot
configure authentication-mode password and authentication-mode none any more.
Generating or destroying RSA key pairs
The name of the server RSA key pair is in the format of switch name plus _host,
S5500_host for example.
After you use the command, the system prompts you to define the key length.
■
In SSH1.x, the key length is in the range of 512 to 2,048 (bits).
■
In SSH 2.0, the key length is in the range of 1,024 to 2,048 (bits). To make SSH 1.x
compatible, 512 to 2,048-bit keys are allowed on clients, but the length of server
keys must be more than 1,024 bits. Otherwise, clients cannot be authenticated.
For a successful SSH login, you must generate the local RSA key pairs first.
You just need to execute the command once, with no further action required even
after the system is rebooted.
If you use this command to generate an RSA key provided an old one exits, the
system will prompt you to replace the previous one or not.
As a fabric contains multiple devices, you need to execute the
rsa local-key-pair
create
command first to make sure all the devices in the fabric share one RSA
local-key pair.
Table 180
Configure supported protocols
Operation Command
Description
Enter system view
system-view
-
Enter one or multiple user
interface views
user-interface
[ type-keyword ]
number [ ending-number ]
Required
Configure the protocols supported
in the user interface view(s)
protocol inbound
{
all |ssh |
telnet
}
Optional
By default, the system
supports both Telnet and
SSH.
Table 181
Generate or destroy RSA key pairs
Operation
Command
Description
Enter system view
system-view
-
Generate a local RSA key pair
rsa local-key-pair create
Required
Destroy a local RSA key pair
rsa local-key-pair destroy
Required
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...