![Huawei Quidway NetEngine 20 series Скачать руководство пользователя страница 168](http://html.mh-extra.com/html/huawei/quidway-netengine-20-series/quidway-netengine-20-series_configuration-manual_169449168.webp)
Quidway NetEngine20/20E
Configuration Guide - Basic Configurations
9 Telnet and SSH
Issue 05 (2010-01-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
9-19
z
The purpose of enabling the first-time authentication on the SSH client is to skip checking whether
the RSA public key of the SSH server is valid when the STelnet or SFTP client logs in to the SSH
server for the first time. The check is skipped because the STelnet or SFTP server has not saved the
RSA public key of the SSH server at this time.
z
If the first-time authentication is not enabled on the SSH client, when the STelnet or SFTP client
logs in to the SSH server for the first time, the STelnet or SFTP client fails to pass the check on the
RSA public key validity and cannot log in to the server.
Except for enabling the first-time authentication on the SSH client, the STelnet or SFTP client can assign
the RSA public key in advance to the SSH server on the SSH client to log in to the server successfully
for the first time.
9.5.3 Configuring the SSH Client to Assign the RSA Public Key to
the SSH Server
Do as follows on the router that serves as the SSH client:
Step 1
Run:
system-view
The system view is displayed.
Step 2
Run:
ssh client
servername
assign rsa-key
keyname
The RSA public key is assigned to the SSH server.
----End
Before the peer RSA public key is assigned to the SSH server, the SSH client must be configured and the
assigned RSA public key must be the RSA public key of the SSH server. Thus, the STelnet or SFTP
client can pass the validity check on the RSA public key of the SSH server.
9.5.4 Enabling the STelnet Client
Do as follows on the router that serves as the SSH client:
Step 1
Run:
system-view
The system view is displayed.
Step 2
Run:
stelnet
[
-a
X.X.X.X
]
host-ipv4
|
ipv6
[
-a
X:X::X:X
]
host-ipv6
[
-i
{
interface-type
interface-number
|
interface-name
} ] }
[
port
] [
prefer-kex
{
dh-group1
|
dh-exchange-group
} ] [
prefer-ctos-cipher
{
des
|
3des
|
aes128
} ] [
prefer-stoc-cipher
{
des
|
3des
|
aes128
} ] [
prefer-ctos-hmac
{
sha1
|
sha1-96
|
md5
|
md5-96
} ]
[
prefer-stoc-hmac
{
sha1
|
sha1-96
|
md5
|
md5-96
} ] [ -
vpn-instance
vpn-instance-name
]
The SSH server is logged in to through STelnet.
----End