Table of Contents

1SSH Configuration·····································································································································1-1SSH Overview·········································································································································1-1 Introduction to SSH ·························································································································1-1 Algorithm and Key ···························································································································1-1 Asymmetric Key Algorithm ··············································································································1-2 SSH Operating Process ··················································································································1-2 Configuring the SSH Server····················································································································1-4 SSH Server Configuration Tasks ····································································································1-5 Configuring the Protocol Support for the User Interface ·································································1-5 Generating/Destroying a RSA or DSA Key Pair··············································································1-6 Exporting the RSA or DSA Public Key ····························································································1-7 Creating an SSH User and Specify an Authentication Type···························································1-7 Specifying a Service Type for an SSH User····················································································1-8 Configuring SSH Management········································································································1-8 Configuring the Client Public Key on the Server ·············································································1-9 Assigning a Public Key to an SSH User························································································1-11 Specifying a Source IP Address/Interface for the SSH Server ·····················································1-11 Configuring the SSH Client ···················································································································1-12 SSH Client Configuration Tasks····································································································1-12 Configuring the SSH Client Using an SSH Client Software ··························································1-12 Configuring the SSH Client on an SSH2-Capable Device ····························································1-19 Specifying a Source IP address/Interface for the SSH client························································1-21 Displaying and Maintaining SSH Configuration ····················································································1-21 SSH Configuration Examples ···············································································································1-22 When the Device Acts as the SSH Server and the Authentication Type is Password ·················1-22 When the Device Acts as an SSH Server and the Authentication Type is Publickey···················1-24 When the Switch Acts as an SSH Client and the Authentication Type is Password ····················1-30 When the Device Acts as an SSH Client and the Authentication Type is Publickey ····················1-31 When the Device Acts as an SSH Client and First-time authentication is not Supported ············1-33

i

Page 497
Image 497
3Com WX3000 operation manual Table of Contents