3Com 4210 PWR Configuration Manual page 407

9/18/26 port and pwr 9/18/26 port 4210 series switch
Table of Contents

Advertisement

Table 314 Enable the device to support first-time authentication
Operation
Enter system view
Enable the device to support
first-time authentication
Table 315 Disable first-time authentication support
Operation
Enter system view
Disable first-time
authentication support
Configure server public key
Specify the host key name of
the server
Establish the connection between the SSH client and server
The client's method of establishing an SSH connection to the SSH server varies
with authentication types. See Table 316 for details.
Table 316 Establish an SSH connection
Operation
Enter system view
Start the client to establish a
connection with an SSH server
n
When logging into the SSH server using public key authentication, an SSH client
needs to read the local private key for authentication. As two algorithms (RSA or
DSA) are available, the identity-key keyword must be used to specify one
algorithm in order to get the correct private key.
Command
system-view
ssh client first-time enable
Command
system-view
undo ssh client first-time
Refer to "Configuring the
Client Public Key on the
Server" on page 394
ssh client { server-ip |
server-name } assign {
publickey | rsa-key }
keyname
Command
system-view
ssh2 { host-ip | host-name } [
port-num ] [ identity-key {
dsa | rsa } | prefer_kex {
dh_group1 |
dh_exchange_group } |
prefer_ctos_cipher { des |
aes128 } |
prefer_stoc_cipher { des |
aes128 } | prefer_ctos_hmac
{ sha1 | sha1_96 | md5 |
md5_96 } |
prefer_stoc_hmac { sha1 |
sha1_96 | md5 | md5_96 } ] *
Configuring the SSH Client
Description
Optional
By default, the client is
enabled to run initial
authentication.
Description
Required
By default, the client is
enabled to run first-time
authentication.
Required
The method of configuring
server public key on the client
is similar to that of
configuring client public key
on the server.
Required
Description
Required
In this command, you can also
specify the preferred key
exchange algorithm,
encryption algorithms and
HMAC algorithms between
the server and client.
HMAC: Hash-based message
authentication code
Note that:
The identity-key keyword is
unnecessary in password
authentication and optional in
public key authentication.
405

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents