Operation Manual – SSH
H3C S3100 Series Ethernet Switches Table of Contents
i
Table of Contents
Chapter 1 SSH Configuration....................................................................................................... 1-1
1.1 SSH Overview.................................................................................................................... 1-1
1.1.1 Introduction to SSH................................................................................................. 1-1
1.1.2 Algorithm and Key................................................................................................... 1-1
1.1.3 Asymmetric Key Algorithm...................................................................................... 1-2
1.1.4 SSH Operating Process.......................................................................................... 1-2
1.2 SSH Server and Client Configuration Task List................................................................. 1-5
1.3 Configuring the SSH Server .............................................................................................. 1-5
1.3.1 Configuring the User Interfaces for SSH Clients..................................................... 1-7
1.3.2 Configuring the SSH Management Functions......................................................... 1-7
1.3.3 Configuring the SSH Server to Be Compatible with SSH1 Clients......................... 1-8
1.3.4 Generating/Destroying Key Pairs............................................................................1-9
1.3.5 Creating an SSH User and Specifying an Authentication Type............................ 1-10
1.3.6 Specifying a Service Type for an SSH User ......................................................... 1-11
1.3.7 Configuring the Public Key of a Client on the Server............................................ 1-12
1.3.8 Assigning a Public Key to an SSH User ............................................................... 1-13
1.3.9 Exporting the RSA or DSA Public Key.................................................................. 1-13
1.4 Configuring the SSH Client.............................................................................................. 1-14
1.4.1 SSH Client Configuration Task List....................................................................... 1-14
1.4.2 Configuring an SSH Client that Runs SSH Client Software.................................. 1-15
1.4.3 Configuring an SSH Client Assumed by an SSH2-Capable Switch ..................... 1-22
1.5 Displaying and Maintaining SSH Configuration............................................................... 1-25
1.6 Comparison of SSH Commands with the Same Functions............................................. 1-25
1.7 SSH Configuration Examples .......................................................................................... 1-26
1.7.1 When Switch Acts as Server for Local Password Authentication......................... 1-26
1.7.2 When Switch Acts as Server for Password and RADIUS Authentication............. 1-29
1.7.3 When Switch Acts as Server for Password and HWTACACS Authentication...... 1-34
1.7.4 When Switch Acts as Server for Publickey Authentication................................... 1-37
1.7.5 When Switch Acts as Client for Password Authentication.................................... 1-44
1.7.6 When Switch Acts as Client for Publickey Authentication .................................... 1-46
1.7.7 When Switch Acts as Client and First-Time Authentication is not Supported............ 1-49