H3C S3100-52P Operating instructions

Type
Operating instructions
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Table of Contents
i
Table of Contents
Chapter 1 SSH Terminal Service..................................................................................................1-1
1.1 SSH Terminal Service .......................................................................................................1-1
1.1.1 Introduction to SSH.................................................................................................1-1
1.1.2 SSH Server Configuration.......................................................................................1-3
1.1.3 SSH Client Configuration......................................................................................1-10
1.1.4 Configuring the Device as an SSH Client............................................................. 1-17
1.1.5 Displaying SSH Configuration...............................................................................1-19
1.1.6 SSH Server Configuration Example...................................................................... 1-19
1.1.7 Configuring the Device as an SSH Client Configuration Example........................1-21
1.2 SFTP Service...................................................................................................................1-23
1.2.1 Introduction to SFTP.............................................................................................1-23
1.2.2 SFTP Server Configuration...................................................................................1-23
1.2.3 SFTP Client Configuration on the Switch.............................................................. 1-24
1.2.4 SFTP Configuration Example................................................................................1-28
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-1
Chapter 1 SSH Terminal Service
1.1 SSH Terminal Service
1.1.1 Introduction to SSH
Secure shell (SSH) provides secure communication and powerful authentication for
remote user login to a switch over an insecure network, thus preventing assaults such
as IP address spoofing, plain-text password interception.
Currently, the S3100-52P Ethernet Switches support SSH2.0. Acting as an SSH server,
a switch allows for the connections of multiple SSH clients. Through SSH Client, a user
can establish a connection to a switch or UNIX host running SSH Server.
Figure 1-1 and Figure 1-2 shows two ways to establish SSH connection between client
and server.
z Establishing SSH connection through a LAN
100BASE-TX
Server
Ethernet
Workstation
Laptop
PC
SSH
Switch
SSH
100BASE-TX
Server
Ethernet
Workstation
Laptop
PC
SSH Client
Switch
SSH Server
100BASE-TX
Server
Ethernet
Workstation
Laptop
PC
SSH
Switch
SSH
100BASE-TX
Server
100BASE-TX
Server
Ethernet
Workstation
Laptop
PC
SSH
Switch
SSH
100BASE-TX
Server
Ethernet
Workstation
Laptop
PC
SSH Client
Switch
SSH Server
Figure 1-1 Establish SSH connection through a LAN
z Establishing SSH connection through a WAN
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-2
Local switch
Local Ethernet
WANServer
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Remote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Laptop
WANServer
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Rem
Remote sw itch
SSH
ote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Remote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Laptop
WANServer
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Rem
SSH
ote Ethernet
Server
Local switch
Local Ethernet
WANServer
PC
SSH
PC
Laptop
Laptop
Local switch
Local Ethernet
WANServer
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Remote Ethernet
Server
WAN
PC
Laptop
Laptop
Workstation
Workstation
Remote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Laptop
WANServer
PC
SSH
PC
Laptop
Laptop
WANServer
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Server
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Rem
Remote sw itch
SSH
ote Ethernet
Server
WANServer
PC
SSH
Workstation
Workstation
Rem
Remote sw itch
SSH
ote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Remote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Workstation
Remote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Laptop
WANServer
PC
SSH
PC
Laptop
Laptop
WANServer
PC
SSH Client
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Rem
SSH Server
ote Ethernet
Server
Local switch
Local Ethernet
WANServer
PC
SSH
PC
Laptop
Laptop
Local switch
Local Ethernet
WANServer
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Remote Ethernet
Server
WAN
PC
Laptop
Laptop
Workstation
Workstation
Remote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Laptop
WANServer
PC
SSH
PC
Laptop
Laptop
WANServer
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Server
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Rem
Remote sw itch
SSH
ote Ethernet
Server
WANServer
PC
SSH
Workstation
Workstation
Rem
Remote sw itch
SSH
ote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Remote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Workstation
Remote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Laptop
WANServer
PC
SSH
PC
Laptop
Laptop
WANServer
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Rem
SSH
ote Ethernet
Server
Local switch
Local Ethernet
WANServer
PC
SSH
PC
Laptop
Laptop
Local switch
Local Ethernet
WANServer
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Remote Ethernet
Server
WAN
PC
Laptop
Laptop
Workstation
Workstation
Remote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Laptop
WANServer
PC
SSH
PC
Laptop
Laptop
WANServer
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Server
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Rem
Remote sw itch
SSH
ote Ethernet
Server
WANServer
PC
SSH
Workstation
Workstation
Rem
Remote sw itch
SSH
ote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Remote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Workstation
Remote Ethernet
Server
WANServer
PC
SSH
PC
Laptop
Laptop
WANServer
PC
SSH
PC
Laptop
Laptop
WANServer
PC
SSH Client
PC
Laptop
Laptop
PC
Laptop
Laptop
Workstation
Workstation
Rem
SSH Server
ote Ethernet
Server
Figure 1-2 Establish SSH connection through a WAN
The communication process between a SSH client and server goes through the
following five stages.
1) Version negotiation stage:
z The client sends a TCP connection request to the server.
z When a TCP connection is established, the two ends begin to negotiate an SSH
version.
z If they get a successful negotiation, they go to the key negotiation stage.
Otherwise the server terminates the TCP connection.
2) Key negotiation stage:
z The server sends the public key in a randomly generated RSA key pair to the
client.
z The client calculates a session key by using the public key received from the
server and a random number it generates randomly.
z The client encrypts the random number with the public key from the server and
sends the result data to the server.
z The server then decrypts the received data with the private key in the RSA key pair
to get the random number on the client.
z The server calculates a session key by using the public key and the random
number through the same algorithm as the client.
Then, the server and the client get the same session key, and use it for data encryption
and decryption to secure their subsequent communication.
3) Authentication negotiation stage:
z The client sends its username information to the server.
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-3
z The server starts to authenticate the user. If the user is configured as having no
authentication on the server, the following step is skipped and the session request
stage starts directly.
z The server authenticates the user in some way (see the following note), till the
authentication succeeds or the connection is terminated due to authentication
timeout.
Note:
SSH provides two kinds of authentication: password authentication and RSA
authentication.
(1) Password authentication works as follows:
z The client sends the username and password to the server.
z The server compares the received username and password against those
configured locally. The user passes the authentication if the server finds a match for
both username and password.
(2) RSA authentication works as follows:
z Configure the RSA public key of the client at the server.
z The client sends the member module of its RSA public key to the server.
z The server checks the validity of the member module. If it is valid, the server
generates a random number, which is sent to the client after being encrypted with
RSA public key of the client.
z Both the server and the client calculate authentication data by using the random
number and session ID.
z The client sends the authentication data it calculates to the server.
z The server compares the received authentication data with the authentication data
on itself. If they are identical, the authentication succeeds.
4) Session request stage. The client sends a session request to the server, which
processes the request and establish a session.
5) Interactive session stage. Both ends exchange data till the session ends.
1.1.2 SSH Server Configuration
The following table describes SSH Server configuration tasks.
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-4
Table 1-1 SSH2.0 Server configuration tasks
Operation Command Related section
Configure user interface(s) to
support specified protocol(s)
protocol inbound
Section “
Configuring
user interface(s) to
support specified
protocol(s)
"
Generate local RSA key pair
rsa local-key-pair create
Destroy local RSA key pair
rsa local-key-pair
destroy
Section “
Generating
or destroying local
RSA key pair
"
Specify a default
authentication type for SSH
users
ssh authentication-type
default
Configure authentication type
for an SSH user
ssh user username
authentication-type
Section "
Configuring
authentication type for
a user
"
Set SSH authentication
timeout time
ssh server timeout
Set SSH authentication retry
times
ssh server
authentication-retries
Section “Configuring
SSH management
Configure a client public key
for an SSH user
ssh user username
assign rsa-key keyname
Section “
Configuring a
client public key for a
user
"
I. Configuring user interface(s) to support specified protocol(s)
Table 1-2 Configure user interface(s) to support specified protocol(s)
Operation Command Description
Enter system view
system-view
Enter the view of one or
multiple user interfaces
user-interface
[
type-keyword ] number
[
ending-number ]
Required
Configure the user
interface(s) to support
specified protocol(s)
protocol inbound
{ all
|ssh | telnet }
Optional
By default, both Telnet
and SSH are supported.
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-5
Caution:
z If you have configured a user interface to support SSH protocol, to ensure a
successful login to the user interface, you must configure AAA authentication for the
user interface by using the authentication-mode scheme command.
z For a user interface, if you have executed the authentication-mode password or
authentication-mode none command, the protocol inbound ssh command
cannot be executed; if you have executed the protocol inbound ssh command,
neither of the authentication-mode password and authentication-mode none
commands can be executed.
II. Generating or destroying local RSA key pair
This configuration task is used to generate or destroy an RSA key pair on the server,
which is named in the format of switch name plus "_Host", for example, H3C_host.
After you issue the rsa local-key-pair create command, the system prompts you to
input a key length.
In SSH2.0, the key length is in the range of 512 to 2,048 (bits).
Table 1-3 Generate or destroy local RSA key pair
Operation Command Description
Enter system view
system-view
Generate local RSA key pair
rsa local-key-pair create
Required
Destroy local RSA key pair
rsa local-key-pair destroy
Optional
Caution:
z For a successful SSH login, you must first generate the RSA key pair of the server.
z You just need to execute the rsa local-key-pair create command once, and need
not execute the command again after the system is rebooted.
z If you re-execute the rsa local-key-pair create command, the system will ask
whether you want to replace the original key pair with a new one.
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-6
Note:
After the rsa local-key-pair create command is executed, you can execute the
display rsa local-key-pair public command to display information about the public
key (in H3C_host, for example).
III. Configuring authentication type for a user
For a new user, you must specify the authentication type. Otherwise, the user cannot
access the switch.
Table 1-4 Configure authentication type for a user
Operation Command Description
Enter system view
system-view
Specify a default
authentication type for
SSH users
ssh authentication-type
default
{ password | rsa
| password-publickey |
all }
Configure authentication
type for an SSH user
ssh user username
authentication-type
{ password |
password-publickey |
rsa| all }
At least one required;
By default, no
authentication type is
specified for an SSH user,
and the user can not
access the switch.
Note that:
z The ssh authentication-type default command is used to configure the default
authentication type for all SSH users.
z The ssh user username authentication-type command is used to configure an
authentication type for a specific SSH user.
z When both commands are configured with different authentication types, for the
specific user (user specified by the username argument), the authentication type
specified by the ssh user username authentication-type command will take
effect instead of that specified for all SSH users.
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-7
Caution:
z If RSA authentication type is configured for a user, the RSA public key of the client
user must be configured on the switch.
z By default, no authentication type is specified for a new user, and the new user
cannot access the switch.
z For the password-publickey authentication type, users can access the switch only
when they pass both kinds of authentications.
z For the password authentication type, username should be consistent with the
valid user name defined in AAA; for the RSA authentication type, username is the
SSH local user name, so that there is no need to configure a local user in AAA.
z If the default authentication type for SSH users is password and local AAA
authentication is adopted, you need not use the ssh user command to create an
SSH user. Instead, you can use the local-user command to create a user name and
its password and then set the service type of the user to SSH.
z If the default authentication type for SSH users is password and remote
authentication (RADIUS authentication, for example) is adopted, you need not use
the ssh user command to create an SSH user, because it is created on the remote
server. And the user can use its username and password configured on the remote
server to access the network.
IV. Configuring SSH management
The configuration of SSH management includes the setting of authentication timeout
time, and authentication retry times. After the configuration, the SSH management
function is able to prevent illegal activities such as malicious password guessing, thus
ensure the security of SSH connections.
Table 1-5 Configure SSH management
Operation Command Description
Enter system view
system-view
Set SSH
authentication
timeout time
ssh server timeout
seconds
Optional
By default, the timeout
time is 60 seconds.
Set SSH
authentication retry
times
ssh server
authentication-retries
times
Optional
By default, the number of
retry times is 3.
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-8
V. Configuring a client public key for a user
On the switch, you can configure a client public key (generated randomly on a client) for
a client user. This configuration is not required for password authentication type.
There are two methods to configure a client public key for a user.
1) Manual configuration
First, perform the following operations on a client:
z Use the SSH2.0 client software to randomly generate a RSA key pair.
z Use the SSHKEY.exe program to transform the public key in the RSA key pair to
PKCS (public-key cryptography standards) format.
Then, perform the following operations on the server:
Table 1-6 Configure client public key for a user
Operation Command Description
Enter system view
system-view
Enter public key view
rsa peer-public-key
key-name
Required
Enter public key edit
view to input a client
public key
public-key-code
begin
When you input the key data,
spaces are allowed between the
characters you input (because the
system can remove the spaces
automatically); you can also press
<Enter> to continue your input at
the next line. But the key you input
should be a hexadecimal digit
string coded in the public key
format.
Return to public key
view from public key
edit view
public-key-code
end
The system saves the public key
data you input when exiting public
key edit view.
Return to system
view from public key
view
peer-public-key
end
Assign a client public
key to an SSH user
ssh user username
assign rsa-key
keyname
Required
Keyname
is the name of an
existing public key. If the user has
already been assigned with a
public key, the newly assigned
public key overwrites the old one.
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-9
Note:
The above method requires you to transform the format of the public key on the client,
and then manually configure the transformed public key on the server. So, the method
is relatively more complex.
2) Automatic configuration
First, perform the following operations on a client:
z Use the SSH2.0 client software to randomly generate a RSA key pair.
z Use FTP/TFTP to transfer the corresponding public key file to the Flash memory of
the server.
Then, perform the following operations on the server:
Table 1-7 Automatic configuration
Operation Command Description
Enter system view
system-view
Transform the format of the key
in a client public key file and
automatically configure a client
public key on the server
rsa peer-public-key
key-name import
sshkey file-name
filename must be
consistent with the name
of a public key file in the
Flash memory.
Note:
The above method does not require you to manually configure a public key. So the
method is relatively simple and is the recommended method.
VI. Specifying a source IP address/interface for the SSH server
You can perform the following configurations to specify a source IP address or a source
interface for the SSH server, thus enhancing traffic manageability.
Table 1-8 Specify a source IP address/interface for the SSH server
Operation Command Description
Enter system view
system-view
Specify a source IP address
for the SSH server
ssh-server source-ip ip-address
Optional
Specify a source interface
for the SSH server
ssh-server source-interface
interface-type interface-number
Optional
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-10
1.1.3 SSH Client Configuration
A variety of SSH client software are available, such as PuTTY and FreeBSD. For an
SSH client to establish a connection with an SSH server, you must complete these
configuration tasks:
z Specifying the IP address of the server
z Selecting the protocol for remote connection Usually, a client can use a variety of
remote connection protocols, such as Telnet, Rlogin, SSH. To establish an SSH
connection, you must select SSH.
z Selecting the SSH version Since the device supports SSH Server 2.0 now, select
2.0 or lower for the client.
z Specifying the RSA private key file. The RSA keys for an SSH user include a
public key and a private key, which are generated by the tool accompanied with
the client software. The public key must be configured on the server, while the
private key must be configured on the client.
The following takes the client software of PuTTY, PuTTYGen and SSHKEY as
examples to illustrate how to configure the SSH client:
I. Generating the Client Key
To generate the client key pair, run PuTTYGen.exe, choose “SSH2(RSA)” in the
parameter field and click “Generate”.
Figure 1-3 Generating the client key (1)
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-11
While generating the key pair, you must move the mouse continuously. The mouse
should be restricted off the green process bar in the blue box of
Figure 1-4. Otherwise,
the process bar does not move and the key pair cannot be generated.
Figure 1-4 Generating the client key (2)
After the key pair is generated, click “Save public key” and enter the file name (public
for here) to save the key pair.
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-12
Figure 1-5 Generating the client key (3)
Likewise, to save a private key, click “Save private key” and a warning window pops up
to prompt you whether to save a private key without any precautions. Click “Yes” and
enter a name (private for here) to save the private key.
Figure 1-6 Generating the client key (4)
To generate RSA public key in PKCS format, run SSHKEY.exe, click “Browse” and
select the public key file, and then click “Convert”.
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-13
Figure 1-7 Generating the client key (5)
II. Specifying the IP address of the server
Launch PuTTY.exe and the following window appears.
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-14
Figure 1-8 SSH client interface 1
In the [Host Name (or IP address)] text box, enter the IP address of the server, for
example, 10.110.28.10. Note that the IP address can be the IP address of any interface
on the server that has SSH in the state of up and a route to the client.
III. Selecting the protocol for remote connection
As shown in Figure 1-8, select the [SSH] option from the [Protocol] section.
IV. Selecting the SSH version
From the category on the left of the window, click [Connection/SSH]. The window as
shown in
Figure 1-9 appears.
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-15
Figure 1-9 SSH client interface 2
In the [Protocol options] field, select [2] from the [Preferred SSH protocol version]
section.
V. Open an SSH Connection with RSA
If the client needs to use RSA authentication, you must specify the RSA private key file.
If the client needs to use password authentication, this is not required.
From the category on the left of the window, click [Connection/SSH/Auth]. The following
window appears.
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-16
Figure 1-10 SSH client interface 3
Click <Browse…> to bring up the file selection window, navigate to the private key file
and click <OK>.
VI. Open an SSH Connection with Password
1) Click <Open>. The following SSH client interface appears. If the connection is
normal, you will be prompted to enter the username and password, as shown in
Figure 1-11.
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-17
Figure 1-11 SSH client interface
2) Enter the username and password to create an SSH connection.
3) To log out, enter the quit command.
1.1.4 Configuring the Device as an SSH Client
The following table describes SSH Client configuration tasks.
Table 1-9 SSH Client configuration tasks
Operation Command Description
Enter system view
system-view
Enable the client to
run initial
authentication
ssh client first-time enable
Optional
By default, the client is
enabled to run initial
authentication.
If the client is disabled
from running initial
authentication, you must
assign a public key to the
server on the client.
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-18
Operation Command Description
Assign a public key
to a server
ssh client server-ip
assign
rsa-key
keyname
Optional
This command is used to
configure the public key of
a server on the client, so
that the client can regard
the server as a reliable
server when it connects to
the server.
Start the client to
establish a
connection with an
SSH server
ssh2
{ host-ip | host-name }
[
port-num ] [ prefer_kex
{
dh_group1 |
dh_exchange_group } ]
[
prefer_ctos_cipher { des |
aes128 } ] [ prefer_stoc_cipher
{ des | aes128 } ]
[
prefer_ctos_hmac { sha1 |
sha1_96 | md5 | md5_96 } ]
[
prefer_stoc_hmac { sha1 |
sha1_96 | md5 | md5_96 } ]
Required
In this command, you can
also specify the preferred
key exchange algorithm,
encryption algorithms and
HMAC algorithms
between the server and
client.
HMAC: Hash-based
message authentication
code
Note:
If an SSH client is enabled to run initial authentication, when the SSH client accesses
an SSH server for the first time and it does not have the public key of the server, the
client allows you to select to continue the access and save the public key of the server
to local device; when the client accesses the server at the next time, it authenticates the
server against the public key saved locally.
I. Specifying a source IP address/interface for the SSH client
You can perform the following configuration to specify a source IP address or a source
interface for the SSH2.0 client, thus enhancing traffic manageability.
Table 1-10 Specify a source IP address/interface for the SSH client
Operation Command Description
Enter system view
system-view
Specify a source IP address
for the SSH2.0 client.
ssh2 source-ip ip-address
Optional
Specify a source interface
for the SSH2.0 client
ssh2 source-interface
interface-type interface-number
Optional
Operation Manual – SSH Terminal Service
H3C S3100-52P Ethernet Switch Chapter 1
SSH Terminal Service
1-19
1.1.5 Displaying SSH Configuration
After the above configuration, you can execute the display command in any view to
display the configuration information and running status of SSH, so as to verify your
configuration.
Table 1-11 Display SSH configuration
Operation Command Description
Display host and server
public keys
display rsa
local-key-pair public
Display client RSA public
key(s)
display rsa
peer-public-key
[ brief |
name keyname ]
Display SSH status and
session information
display ssh server {
status
| session }
Display SSH user
information
display ssh
user-information
[ username ]
Display the current source
IP address or the IP
address of the source
interface specified for the
SSH server.
display ssh-server
source-ip
Display the current source
IP address specified for
the SSH2.0 Client.
display ssh2 source-ip
You can execute the
display command in any
view.
1.1.6 SSH Server Configuration Example
I. Network requirements
As shown in Figure 1-12, The PC (SSH Client) running an SSH2.0-supported client
software, establish a local connection with the switch (SSH Server) to ensure the
security of data exchange.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32

H3C S3100-52P Operating instructions

Type
Operating instructions

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI