
408
# Authorize the local user
client001
to use the
SSH
service.
[SwitchB-luser-manage-client001] service-type ssh
# Assign the user role
network-admin
to the local user
client001
.
[SwitchB-luser-manage-client001] authorization-attribute user-role network-admin
[SwitchB-luser-manage-client001] quit
# Configure the SSH user
client001
. Specify the service type as
scp
and the authentication
method as
password
for the user.
[SwitchB] ssh user client001 service-type scp authentication-type password
2.
Configure an IP address for VLAN-interface 2 on the SCP client.
<SwitchA> system-view
[SwitchA] interface vlan-interface 2
[SwitchA-Vlan-interface2] ip address 192.168.0.2 255.255.255.0
[SwitchA-Vlan-interface2] quit
[SwitchA] quit
3.
Connect to the SCP server, download the file
remote.bin
from the server, and save it locally
with the name
local.bin
.
<SwitchA> scp 192.168.0.1 get remote.bin local.bin
Username: client001
Connecting to 192.168.0.1 port 22.
The server is not authenticated. Continue? [Y/N]:y
Do you want to save the server public key? [Y/N]:n
[email protected]’s password:
remote.bin 100% 2875 2.8KB/s 00:00
SCP configuration example based on Suite B algorithms
Network requirements
As shown in
•
Switch A acts as an SCP client (SSH2).
•
Switch B acts as the SCP server (SSH2), and it uses publickey authentication.
•
Switch B uses the following algorithms for the algorithm negotiation with the SCP client:
{
Key exchange algorithms
ecdh-sha2-nistp256
and
ecdh-sha2-nistp384
.
{
Encryption algorithms
aes128-gcm
and
aes256-gcm
.
{
Public key algorithms
x509v3-ecdsa-sha2-nistp256
and
x509v3-ecdsa-sha2-nistp384
.
Configure Switch A to establish an SCP connection to Switch B based on the Suite B algorithms.
After the connection is established, you can log in to Switch B to transfer files.
Figure 116 Network diagram
Configuration procedure
1.
Generate the client's certificates and the server's certificates. (Details not shown.)
You must first configure the certificates of the server and the client because they are required
for identity authentication between the two parties.
Содержание 10500 series
Страница 326: ...312 No duration limit for this SA ...