SSH Terminal Services
515
Displaying and Debugging SSH
Run the
display
command in any view to view the running of SSH and further to
check configuration result.
Run the
debugging
command to debug the SSH.
Perform the following configurations in any view.
Table 584
Display SSH Information
SSH Configuration
Example
Networking Requirements
As shown in Figure 143, configure a local connection from the SSH Client to the
Switch. The client uses SSH protocol to access the Switch.
Networking Diagram
Figure 143
Networking for SSH Local Configuration
Configuration Procedure
1
You should run this command before any other configuration:
[SW5500]
rsa local-key-pair create
If you have configured local key pair in advance, this operation is unnecessary.
2
For password authentication mode
[SW5500]
user-interface vty 0 4
[SW5500-ui-vty0-4]
authentication-mode scheme
[SW5500-ui-vty0-4]
protocol inbound ssh
[SW5500]
local-user client001
[SW5500-luser-client001]
password simple 3com
[SW5500-luser-client001]
service-type ssh
[SW5500]ssh user client001
authentication-type password
Select the default values for SSH authentication timeout value, retry value and update
interval of server key. Then run SSH1.5 client program on the PC which is connected
to the Switch and access the Switch using username “client001” and password
“3com”.
3
For RSA authentication mode:
Create local user client002
[SW5500]
local-user client002
Operation
Command
Display host and server public keys
display rsa local-key-pair public
Display client RSA public key
display rsa peer-public-key [ brief | name
keyname
]
Display SSH state information and
session
display ssh server { status | session }
Display SSH user information
display ssh user-information [
username
]
Enable SSH debugging
debugging ssh server { VTY
index
| all }
Disable SSH debugging
undo debugging ssh server { VTY
index
| all }
S
S
H
C
lient
S
w
itch
S
S
H
C
lient
S
w
itch
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...