Then, you need to transmit the public key file to the server through FTP or TFTP.
Configure the SFTP server
# Generate RSA and DSA key pairs and enable the SSH server.
[SwitchB] public-key local create rsa
[SwitchB] public-key local create dsa
[SwitchB] ssh server enable
# Enable the SFTP server.
[SwitchB] sftp server enable
# Configure an IP address for VLAN interface 1, which the SSH client uses as the destination for SSH
[SwitchB] interface vlan-interface 1
[SwitchB-Vlan-interface1] ip address 192.168.0.1 255.255.255.0
# Set the authentication mode on the user interfaces to AAA.
[SwitchB] user-interface vty 0 4
[SwitchB-ui-vty0-4] authentication-mode scheme
# Set the protocol that a remote user uses to log in as SSH.
[SwitchB-ui-vty0-4] protocol inbound ssh
# Import the peer public key from the file pubkey.
[SwitchB] public-key peer Switch001 import sshkey pubkey
# For user client001, set the service type as SFTP, authentication type as publickey, public key as
Switch001, and working folder as flash:/
[SwitchB] ssh user client001 service-type sftp authentication-type publickey assign
publickey Switch001 work-directory flash:/
Establish a connection between the SFTP client and the SFTP server
# Establish a connection to the remote SFTP server and enter SFTP client view.
<SwitchA> sftp 192.168.0.1 identity-key rsa
Input Username: client001
Trying 192.168.0.1 ...
Press CTRL+K to abort
Connected to 192.168.0.1 ...
The Server is not authenticated. Continue? [Y/N]:y
Do you want to save the server public key? [Y/N]:n
# Display files under the current directory of the server, delete the file named z, and check if the file has
been deleted successfully.
sftp-client> delete z
The following File will be deleted:
1759 Aug 23 06:52 config.cfg
225 Aug 24 08:01 pubkey2
283 Aug 24 07:39 pubkey
0 Sep 01 06:22 new
225 Sep 01 06:55 pub
0 Sep 01 08:00 z