Ssh server configuration examples, Network requirements, Configuration procedure – H3C Technologies H3C SecPath F1000-E User Manual

Page 173

Advertising
background image

162

SSH server configuration examples

Password authentication enabled SSH server configuration
example

Network requirements

As shown in

Figure 72

, a host (the SSH client) and SecPath (the SSH server) are directly connected

through Ethernet interfaces. Configure an SSH user on SecPath so that the host can securely log in to

SecPath after passing password authentication. Configure a username and password for the user on
SecPath.

Figure 72 Network diagram

Configuration procedure

1.

Configure the SSH server.
# Generate the RSA key pairs.

<SecPath> system-view

[SecPath] public-key local create rsa

The range of public key size is (512 ~ 2048).

NOTES: If the key modulus is greater than 512,

It will take a few minutes.

Press CTRL+C to abort.

Input the bits of the modulus[default = 1024]:

Generating Keys...

++++++++

++++++++++++++

+++++

++++++++

# Generate a DSA key pair.

[SecPath] public-key local create dsa

The range of public key size is (512 ~ 2048).

NOTES: If the key modulus is greater than 512,

It will take a few minutes.

Press CTRL+C to abort.

Input the bits of the modulus[default = 1024]:

Generating Keys...

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

+++++++++++++++++++++++++++++++++++

# Enable the SSH server.

[SecPath] ssh server enable

Advertising