Quidway NetEngine20/20E
Configuration Guide - Basic Configurations
9 Telnet and SSH
Issue 05 (2010-01-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
9-37
sftp server enable
ssh user client001
ssh user client002
ssh user client001 authentication-type password
ssh user client002 authentication-type RSA
ssh user client002 assign rsa-key rsakey001
ssh user client001 service-type sftp
ssh user client002 service-type sftp
ssh user client001 sftp-directory
flash:
.
ssh user client002 sftp-directory
flash:
.
#
user-interface vty 0 4
authentication-mode aaa
protocol inbound ssh
#
return
9.8.4 Example for Accessing the SSH Server Through Other Port
Numbers
Networking Requirements
The standard monitored port number of the SSH protocol is 22. If the attacker accesses the
standard port continuously, the bandwidth is consumed and the performance of the server is
affected, and other users cannot access the standard port.
After the number of the port monitored by the SSH server is set to the other port numbers, the
attacker does not know the change of the number of the monitored port and keeps sending the
socket connection with the standard port number as 22. After detecting that the number of the
port that requests the connection is not the number of the monitored port, the SSH does not set
up the socket connection.
Thus, only the valid user can set up the socket connection through the non-standard monitored
port set by the SSH server, and follow the procedure of negotiating the SSH version number,
negotiating the algorithm, generating the session key, authenticating, sending session request
and performing the interactive session.
The networking diagram is shown in
Figure 9-8
.