Configuring the SSH Client
405
Establish the connection between the SSH client and server
The client’s method of establishing an SSH connection to the SSH server varies
with authentication types. See Table 316 for details.
n
When logging into the SSH server using public key authentication, an SSH client
needs to read the local private key for authentication. As two algorithms (RSA or
DSA) are available, the
identity-key
keyword must be used to specify one
algorithm in order to get the correct private key.
Table 314
Enable the device to support first-time authentication
Operation
Command
Description
Enter system view
system-view
Enable the device to support
first-time authentication
ssh client first-time enable
Optional
By default, the client is
enabled to run initial
authentication.
Table 315
Disable first-time authentication support
Operation
Command
Description
Enter system view
system-view
Disable first-time
authentication support
undo ssh client first-time
Required
By default, the client is
enabled to run first-time
authentication.
Configure server public key
Refer to “Configuring the
Client Public Key on the
Server” on page 394
Required
The method of configuring
server public key on the client
is similar to that of
configuring client public key
on the server.
Specify the host key name of
the server
ssh client
{
server-ip
|
server-name
}
assign
{
publickey
|
rsa-key
}
keyname
Required
Table 316
Establish an SSH connection
Operation
Command
Description
Enter system view
system-view
Start the client to establish a
connection with an SSH server
ssh2
{
host-ip
|
host-name
} [
port-num
] [
identity-key
{
dsa
|
rsa
} |
prefer_kex
{
dh_group1
|
dh_exchange_group
} |
prefer_ctos_cipher
{
des
|
aes128
} |
prefer_stoc_cipher
{
des
|
aes128
} |
prefer_ctos_hmac
{
sha1
|
sha1_96
|
md5
|
md5_96
} |
prefer_stoc_hmac
{
sha1
|
sha1_96
|
md5
|
md5_96
} ] *
Required
In this command, you can also
specify the preferred key
exchange algorithm,
encryption algorithms and
HMAC algorithms between
the server and client.
HMAC: Hash-based message
authentication code
Note that:
The
identity-key
keyword is
unnecessary in password
authentication and optional in
public key authentication.
Содержание Switch 4210 9-Port
Страница 10: ...Password Control Configuration 556 Displaying Password Control 563 Password Control Configuration Example 564 ...
Страница 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Страница 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Страница 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Страница 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Страница 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Страница 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Страница 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Страница 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Страница 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Страница 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Страница 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Страница 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Страница 340: ...338 CHAPTER 30 CLUSTER ...
Страница 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Страница 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Страница 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Страница 451: ......
Страница 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Страница 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Страница 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...