EasyManuals Logo

H3C S5120-EI Series User Manual

H3C S5120-EI Series
1166 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #733 background imageLoading...
Page #733 background image
1-3
Before the negotiation, the server must have already generated a DSA or RSA key pair, which is not
only used for generating the session key, but also used by the client to authenticate the identity of the
server. For details about DSA and RSA key pairs, refer to Public Key Configuration in the Security
Volume.
Authentication
SSH provides two authentication methods: password authentication and publickey authentication.
z Password authentication: The server uses AAA for authentication of the client. During password
authentication, the client encrypts its username and password, encapsulates them into a password
authentication request, and sends the request to the server. Upon receiving the request, the server
decrypts the username and password, checks the validity of the username and password locally or
by a remote AAA server, and then informs the client of the authentication result.
z Publickey authentication: The server authenticates the client by the digital signature. During
publickey authentication, the client sends to the server a publickey authentication request that
contains its username, public key, and publickey algorithm information. The server checks whether
the public key is valid. If the public key is invalid, the authentication fails; otherwise, the server
authenticates the client by the digital signature. Finally, the server sends a message to the client to
inform the success or failure of the authentication. Currently, the device supports two publickey
algorithms for digital signature: RSA and DSA.
The following gives the steps of the authentication stage:
1) The client sends to the server an authentication request, which includes the username,
authentication method (password authentication or publickey authentication), and information
related to the authentication method (for example, the password in the case of password
authentication).
2) The server authenticates the client. If the authentication fails, the server informs the client by
sending a message, which includes a list of available methods for re-authentication.
3) The client selects a method from the list to initiate another authentication.
4) The above process repeats until the authentication succeeds or the failed authentication times
exceed the maximum of authentication attempts and the session is torn down.
Besides password authentication and publickey authentication, SSH2.0 provides another two
authentication methods:
z password-publickey: Performs both password authentication and publickey authentication if the
client is using SSH2.0 and performs either if the client is running SSH1.
z any: Performs either password authentication or publickey authentication.

Table of Contents

Other manuals for H3C S5120-EI Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the H3C S5120-EI Series and is the answer not in the manual?

H3C S5120-EI Series Specifications

General IconGeneral
BrandH3C
ModelS5120-EI Series
CategorySwitch
LanguageEnglish

Related product manuals