3Com WX3000 Switch User Manual


 
i
Table of Contents
1 SSH Configuration·····································································································································1-1
SSH Overview·········································································································································1-1
Introduction to SSH ·························································································································1-1
Algorithm and Key ···························································································································1-1
Asymmetric Key Algorithm ··············································································································1-2
SSH Operating Process ··················································································································1-2
Configuring the SSH Server····················································································································1-4
SSH Server Configuration Tasks ····································································································1-5
Configuring the Protocol Support for the User Interface ·································································1-5
Generating/Destroying a RSA or DSA Key Pair··············································································1-6
Exporting the RSA or DSA Public Key ····························································································1-7
Creating an SSH User and Specify an Authentication Type···························································1-7
Specifying a Service Type for an SSH User····················································································1-8
Configuring SSH Management········································································································1-8
Configuring the Client Public Key on the Server ·············································································1-9
Assigning a Public Key to an SSH User························································································1-11
Specifying a Source IP Address/Interface for the SSH Server ·····················································1-11
Configuring the SSH Client ···················································································································1-12
SSH Client Configuration Tasks····································································································1-12
Configuring the SSH Client Using an SSH Client Software ··························································1-12
Configuring the SSH Client on an SSH2-Capable Device ····························································1-19
Specifying a Source IP address/Interface for the SSH client························································1-21
Displaying and Maintaining SSH Configuration ····················································································1-21
SSH Configuration Examples ···············································································································1-22
When the Device Acts as the SSH Server and the Authentication Type is Password ·················1-22
When the Device Acts as an SSH Server and the Authentication Type is Publickey···················1-24
When the Switch Acts as an SSH Client and the Authentication Type is Password ····················1-30
When the Device Acts as an SSH Client and the Authentication Type is Publickey ····················1-31
When the Device Acts as an SSH Client and First-time authentication is not Supported ············1-33