204
C
HAPTER
15: SSH T
ERMINAL
S
ERVICES
The manual mode is rather complex since it requires format conversation with the
specific software first and then manual configuration.
2
Automatic mode with the command
Operations on the client include:
■
SSH1.5/2.0-supported client software generates randomly RSA key pairs.
■
Send the public key file to the Flash memory of the server using FTP/TFTP.
Operations on the server are described in Table 185.
The automatic mode is recommended for its simplicity.
Table 184
Configure client public keys
Operation
Command
Description
Enter system view
system-view
-
Enter public key view
rsa peer-public-key
key-name
Required
Enter public key edit view
public-key-code begin
Required
You can key in a blank space
between characters, since the system
can remove the blank space
automatically. But the public key
should be composed of hexadecimal
characters.
Return to public key view and
save the public keys
public-key-code end
Required
The system saves public key data
when exiting from public key edit
view
Return to system view
peer-public-key end
-
Allocate public keys to SSH
users
ssh user
username
assign
rsa-key
keyname
Required
Keyname
is the name of an existing
public key. If the user already has a
public key, the new public key
overrides the old one.
Table 185
Configure client public keys
Operation
Command
Description
Enter system view
system-view
-
Convert the format and
automatically configure the
client public keys
rsa peer-public-key
key-name
import sshkey
filename
Required
The
filename
in the command must
be consistent with the public key file
name to be sent to the server Flash
memory.
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...