396
C
HAPTER
36: SSH C
ONFIGURATION
Configuring the SSH
Client
An SSH client software or SSH2-capable switch can serve as an SSH client to access
the SSH server.
SSH Client Configuration
Tasks
Configuring the SSH
Client Using an SSH
Client Software
A variety of SSH client software are available, such as PuTTY and OpenSSH. For an
SSH client to establish a connection with an SSH server, use the following
commands:
n
■
Selecting the protocol for remote connection as SSH. Usually, a client can use a
variety of remote connection protocols, such as Telnet, Rlogin, and SSH. To
establish an SSH connection, you must select SSH
■
When a Switch 4210 acts as the SSH server, select 2.0 for the clients.
■
Specifying the private key file. On the server, if public key authentication is
enabled for an SSH user and a public key is set for the user, the private key file
corresponding to the public key must be specified on the client. RSA key pairs
and DSA key pairs are generated by a tool of the client software.
The following takes the client software of PuTTY, PuTTYGen and SSHKEY as
examples to illustrate how to configure the SSH client:
Generate a client key
To generate a client key, run PuTTYGen.exe, and select from the
Parameters
area
the type of key you want to generate, either SSH-2 RSA or SSH-2 DSA, then click
Generate.
Table 311
SSH client configuration tasks
Tasks
Description
Configuring the SSH
client
Using an SSH client software
Use either approach
On an SSH2-capable switch
Table 312
Configuration tasks for using a client software
Tasks
Description
“Generate a client key”
Required for
publickey
authentication;
unnecessary for
password
authentication
“Specify the IP address of the Server”
Required
“Select a protocol for remote connection”
Required
“Select an SSH version”
Required
“Open an SSH connection with publickey
authentication”
Required for
publickey
authentication;
unnecessary for
password
authentication
“Open an SSH connection with password
authentication”
Required for
publickey
authentication;
unnecessary for
password
authentication
Содержание Switch 4210 9-Port
Страница 10: ...Password Control Configuration 556 Displaying Password Control 563 Password Control Configuration Example 564 ...
Страница 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Страница 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Страница 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Страница 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Страница 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Страница 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Страница 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Страница 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Страница 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Страница 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Страница 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Страница 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Страница 340: ...338 CHAPTER 30 CLUSTER ...
Страница 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Страница 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Страница 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Страница 451: ......
Страница 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Страница 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Страница 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...