3Com 4200G 12-Port Configuration Manual page 328

4200g series switch
Hide thumbs Also See for 4200G 12-Port:
Table of Contents

Advertisement

314
C
36: SSH T
HAPTER
ERMINAL
SSH Client Configuration
Displaying SSH
Configuration
S
ERVICES
Table 268 Configure client public keys (Continued)
Operation
Return to system view from
public key view
Allocate public keys to SSH users ssh user username assign
Table 269 describes SSH configuration tasks.
Table 269 Configure SSH client
Operation
Command
Enter system view
system-view
Enable the connection
ssh2 host-ipaddr [ port ] [ prefer_kex
between SSH client
{ dh_group1 | dh_exchange_group } ] [
and server
prefer_ctos_cipher { des | aes128 } ] [
prefer_stoc_cipher { des | aes128 } ] [
prefer_ctos_hmac { sha1 | sha1_96 |
md5 | md5_96 } ] [ prefer_stoc_hmac
{ sha1 | sha1_96 | md5 | md5_96 } ]
Allocate a public key to
ssh client server-ip assign rsa-key
the server
keyname
Configure the client to
ssh client first-time enable
run the initial
authentication
In the initial authentication, if the SSH client does not have the public key for the
server which it accesses for the first time, the client continues to access the server and
save locally the public key of the server. Then at the next access, the client can
authenticate the server using the public key saved locally.
Use the display commands in any view to view the running of SSH and further to
check the configuration result.
Table 270 Display SSH configuration
Operation
Display host and server public keys
Display client RSA public key
Display SSH status and session
information
Display SSH user information
Command
peer-public-key end
rsa-key keyname
Command
display rsa local-key-pair public
display rsa peer-public-key [ brief | name keyname ]
display ssh server { status | session }
display ssh user-information [ username ]
Remarks
Required
Keyname is the name of an
existing public key. If the user
already has a public key, the
new public key overrides the
old one.
Remarks
Required
You can use this command
to enable the connection
between SSH client and
server, define key
exchange algorithm
preference, encryption
algorithm preference and
HMAC algorithm
preference between the
server and client.
Required
You can specify on the
client the public key for the
server to be connected to
guarantee the client can be
connected to a reliable
server.
Optional
By default, the client runs
the initial authentication.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents