When Switch Acts As Client For Password Authentication - 3Com 4500 Configuration Manual

26/50-port
Hide thumbs Also See for 4500:
Table of Contents

Advertisement

Click Browse to bring up the file selection window, navigate to the private key file and click OK.
5)
From the window shown in
prompted to enter the username.

When Switch Acts as Client for Password Authentication

Network requirements
As shown in
Figure
(SSH Server) for secure data exchange. The user name for login is client001 and the SSH server's IP
address is 10.165.87.136. Password authentication is required.
Network diagram
Figure 1-30 Switch acts as client for password authentication
Configuration procedure
Configure Switch B
# Create a VLAN interface on the switch and assign an IP address, which the SSH client will use as the
destination for SSH connection.
<SwitchB> system-view
[SwitchB] interface vlan-interface 1
[SwitchB-Vlan-interface1] ip address 10.165.87.136 255.255.255.0
[SwitchB-Vlan-interface1] quit
Generating the RSA key pair on the server is prerequisite to SSH login.
# Generate RSA key pair.
[SwitchB] public-key local create rsa
# Set the authentication mode for the user interfaces to AAA.
[SwitchB] user-interface vty 0 4
[SwitchB-ui-vty0-4] authentication-mode scheme
# Enable the user interfaces to support SSH.
[SwitchB-ui-vty0-4] protocol inbound ssh
[SwitchB-ui-vty0-4] quit
# Create local user client001, and set the authentication password to abc, the login protocol to SSH,
and user command privilege level to 3.
[SwitchB] local-user client001
Figure
1-29, click Open. If the connection is normal, you will be
1-30, establish an SSH connection between Switch A (SSH Client) and Switch B
1-38

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

4500 pwr

Table of Contents