3Com 4200G 12-Port Configuration Manual page 325

4200g series switch
Hide thumbs Also See for 4200G 12-Port:
Table of Contents

Advertisement

SSH supports two authentication types: password authentication and RSA
authentication.
(1) Password authentication works as follows:
The client sends its username and password to the server.
The server compares the username and password received with those configured
locally. The user is allowed to log on to the Switch if the usernames and passwords
match exactly.
(2) RSA authentication works as follows:
Configure the RSA public key of the client user at the server.
The client sends the member modules of its RSA public key to the server.
The server checks the validity of the member module. If it is valid, the server
generates a random number, which is sent to the client after being encrypted with
RSA public key of the client.
Both ends calculate authentication data based on the random number and session
ID.
The client sends the authentication data calculated back to the server.
The server compares it with its authentication data obtained locally. If they match
exactly, the user is allowed to access the switch.
4 Session request stage. The client sends session request messages to the server which
processes the request messages.
5 Interactive session stage. Both ends exchange data till the session ends.
SSH Server
Table 263 describes SSH server configuration tasks.
Configuration
Table 263 Configure SSH2.0 server
Serial
No
1
2
3
4
5
Operation
Configure supported
protocols
Generate a local RSA key pair rsa local-key-pair create
Destroy the local RSA key pair rsa local-key-pair destroy
Configure authentication
mode for SSH users
Set SSH authentication
timeout time
Set SSH authentication retry
times
Allocate public keys for SSH
users
SSH Terminal Services 311
Command
protocol inbound
ssh user username
authentication-type
ssh server timeout
ssh server
authentication-retries
ssh user username assign
rsa-key keyname
Remarks
Refer to "Configuring
supported protocols"
Refer to "Generating or
destroying RSA key
pairs"
Refer to "Configuring
authentication type "
Refer to "Configuring
server SSH attributes "
Refer to "Configuring
client public keys "

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents