1-6
Follow these steps to configure the protocols for the current user interface to support:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Enter user interface view of one
or more user interfaces
user-interface
vty
number
[
ending-number
]
—
Set the login authentication
mode to
scheme
authentication-mode
scheme
[
command-authorization
]
Required
By default, the authentication
mode is
password
.
Configure the user interface(s)
to support SSH login
protocol inbound
{
all
|
ssh
}
Optional
All protocols are supported by
default.
z
For detailed information about the
authentication-mode
and
protocol inbound
commands, refer
to
User Interface Commands
of the
System Volume.
z
If you configure a user interface to support SSH, be sure to configure the corresponding
authentication method with the
authentication-mode scheme
command.
z
For a user interface configured to support SSH, you cannot change the authentication mode. To
change the authentication mode, undo the SSH support configuration first.
Configuring a Client Public Key
This configuration task is only necessary for SSH users using publickey authentication.
For each SSH user that uses publickey authentication to login, you must configure the client’s DSA or
RSA host public key on the server, and configure the client to use the corresponding private key.
To configure the public key of an SSH client, you can:
z
Configure it manually: You can input or copy the public key to the local host. The copied public key
must have not been converted and be in the distinguished encoding rules (DER) encoding format.
z
Import it from the public key file: During the import process, the system will automatically convert
the public key to a string coded using the Public Key Cryptography Standards (PKCS). Before
importing the public key, you must upload the public key file (in binary) to the local host through
FTP or TFTP.
Содержание 4500G PWR 24-Port
Страница 200: ...1 5 ProviderB GigabitEthernet1 0 2 undo stp enable ProviderB GigabitEthernet1 0 2 bpdu tunnel dot1q stp ...
Страница 252: ...1 7 Clearing ARP entries from the ARP table may cause communication failures ...
Страница 362: ...i Table of Contents 1 Dual Stack Configuration 1 1 Dual Stack Overview 1 1 Configuring Dual Stack 1 1 ...
Страница 407: ...1 8 1 1 ms 1 ms 1 ms 1 1 6 1 2 1 ms 1 ms 1 ms 1 1 4 1 3 1 ms 1 ms 1 ms 1 1 2 2 Trace complete ...
Страница 786: ...1 16 3 In the case of PIM SM use the display current configuration command to check the BSR and RP information ...
Страница 1387: ...1 23 ...
Страница 1443: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 1720: ...ii Single Device Upgrade 3 4 IRF System Upgrade 3 5 ...