Configuring Ssh Server - Huawei Quidway S6500 Series Operation Manual

Hide thumbs Also See for Quidway S6500 Series:
Table of Contents

Advertisement

Operation Manual - System Management
Quidway S6500 Series Ethernet Switches
Key negotiation stage: Both ends negotiate key algorithm and compute session
key. The server randomly generates its RSA key and sends the public key to the
client. The client figures out session key based on the public key from the server
and the random number generated locally. The client encrypts the random number
with the public key from the server and sends the result back to the server. The
server then decrypts the received data with the server private key to get the client
random number. It then uses the same algorithm to work out the session key
based on server public key and the returned random number. Then both ends get
the same key without data transfer over the network, while the key is used at both
ends for encryption and description.
Authentication stage: The server authenticates the user at the client after
obtaining session key. The client sends its username to the server: If the
username has been created and configured as no authentication, authentication
stage is skipped for this user. Otherwise, authentication process continues. SSH
supports two authentication types: password authentication and RSA
authentication. In the first type, the server compare the username and password
received with those configured locally. The user is allowed to log on to the switch if
the usernames and passwords match exactly. RSA authentication works in this
way: The RSA public key of the client user is configured at the server. The client
first sends the member modules of its RSA public key to the server, which checks
its validity. If it is valid, the server generates a random number, which is sent to the
client after being encrypted with RSA public key. Both ends calculate
authentication data based on the random number and session ID. The client
sends the authentication data calculated back to the server, which compares it
with its attention data obtained locally. If they match exactly, the user is allowed to
access the switch. Otherwise, authentication process fails.
Session request stage: The client sends session request messages to the server
which processes the request messages.
Interactive session stage: Both ends exchange data till the session ends.
Session packets are encrypted in transfer and the session key is generated randomly.
Encryption is used in exchanging session key and RSA authentication achieves key
exchange without transfer over the network. SSH can protect server-client data security
to the uttermost. The authentication will also start even if the username received is not
configured at the server, so malicious intruders cannot judge whether a username they
key in exists or not. This is also a way to protect username.

8.1.2 Configuring SSH Server

Basic configuration tasks refer to those required for successful connection from SSH
client to SSH server, which advanced configuration tasks are those modifying SSH
parameters.
Configuration tasks on SSH server include:
Huawei Technologies Proprietary
8-2
Chapter 8 SSH Terminal Services

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Release 3000 series

Table of Contents