3Com 7757 Configuration Manual page 774

3com switch 7750 family
Hide thumbs Also See for 7757:
Table of Contents

Advertisement

774
C
71: SSH T
HAPTER
ERMINAL
SSH Server
Configuration
S
ERVICES
Password authentication works as follows: The client sends a password
authentication request carrying the encrypted username and password to the
server. The server decrypts the request to obtain the username and password in
plain text, and matches the username and password against those configured
on itself. Then, it returns the authentication result according to the matching
result.
RSA authentication works as follows: The client sends an RSA authentication
request carrying the username, public key and public key algorithm to the
server. The server checks the validity of the public key. If the key is invalid, the
server returns an authentication failure message directly; otherwise, the server
authenticates the client and returns the authentication result to the client.
4 Session request stage. After successful authentication, the client sends session
request messages to the server. The server processes the request messages.
5 Interactive session stage. Both ends exchange data till the session ends.
The following table describes SSH server configuration tasks.
Table 608 Configure SSH2.0 server
Configuration
Configure supported
protocols
Generate a local RSA key pair rsa local-key-pair create
Destroy a local RSA key pair
Create an SSH user
Specify a default
authentication type for SSH
users
Configure authentication
type for SSH users
Set SSH authentication
timeout time
Set SSH authentication retry
times
Set the update interval for the
server key
Specify the server compatible
with the SSH1.x
version-supported client.
Allocate public keys for SSH
users
Configuring supported protocols
Table 609 Configure supported protocols
Operation
Enter system view
Keyword
protocol inbound
rsa local-key-pair destroy
ssh user username
ssh authentication-type
default
ssh user username
authentication-type
ssh server timeout
ssh server
authentication-retries
ssh server rekey-interval
ssh server compatible-ssh1x
enable
ssh user username assign
rsa-key keyname
Command
system-view
Description
Refer to "Configuring
supported protocols" on
page 774
Refer to "Generating or
destroying RSA key pairs" on
page 775
Refer to "Creating an SSH
user" on page 776.
Refer to "Configuring
authentication type" on page
776
Refer to "Configuring server
SSH attributes" on page 777
Refer to "Configuring a
Client Public Key" on page
777
Description
-

Advertisement

Table of Contents
loading

This manual is also suitable for:

775077587754

Table of Contents