HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 138

Configuring the user interfaces for Stelnet clients, Configuring a client's host public key, Command

Page 138 highlights

Step 1. Enter system view. 2. Enable the SFTP server function. Command system-view sftp server enable Remarks N/A By default, the SFTP server function is disabled. Configuring the user interfaces for Stelnet clients Dependent on different SSH applications, an SSH client can be an Stelnet, SFTP, or SCP client. The Stelnet client accesses the device through a VTY user interface. You must configure the user interfaces for SSH clients to allow SSH login. The configuration takes effect only on the clients at next login. The SFTP or SCP client accesses the device without using a VTY user interface. To configure the user interfaces for Stelnet clients: Step 1. Enter system view. Command system-view 2. Enter VTY user interface view. user-interface vty number [ ending-number ] 3. Set the login authentication mode to scheme. authentication-mode scheme Remarks N/A N/A By default, the authentication mode is password. For more information about this command, see Fundamentals Command Reference. Configuring a client's host public key If the server uses publickey authentication to authentication a client, it compares the SSH username and host public key that it receives from the client with those locally saved. If the information is consistent, it checks the digital signature that the client sends. The digital signature is calculated by the client according to the private key that corresponds to the host public key. For SSH servers that use publickey authentication, password-publickey authentication, or any authentication, you must configure the client's DSA or RSA host public key on the server, and specify the corresponding host private key on the client to generate the digital signature, so that the client can pass publickey authentication with correct digital signature. If the device serves as a client, corresponding host private key is specified by the specified public key algorithm. You can manually configure the host public key of an SSH client on the server, or import it from the public key file: • Manually configuring the host public key-You can type or copy the client's host public key from the client to the SSH server. The host public key must be in the DER encoding format without being converted. If you use the device to act as the client, you can use the display public-key local public command to display the host public key and copy its contents to the server. Other ways to display a host public key might result in incorrect format. HP recommends that you import a client's host public key from the public key file of the client. 129

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

129
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enable the SFTP server
function.
sftp server enable
By default, the SFTP server function
is disabled.
Configuring the user interfaces for Stelnet clients
Dependent on different SSH applications, an SSH client can be an Stelnet, SFTP, or SCP client.
The Stelnet client accesses the device through a VTY user interface. You must configure the user interfaces
for SSH clients to allow SSH login. The configuration takes effect only on the clients at next login.
The SFTP or SCP client accesses the device without using a VTY user interface.
To configure the user interfaces for Stelnet clients:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter VTY user interface view.
user-interface
vty
number
[
ending-number
]
N/A
3.
Set the login authentication
mode to
scheme
.
authentication-mode
scheme
By default, the authentication
mode is
password
.
For more information about this
command, see
Fundamentals
Command Reference
.
Configuring a client's host public key
If the server uses publickey authentication to authentication a client, it compares the SSH username and
host public key that it receives from the client with those locally saved. If the information is consistent, it
checks the digital signature that the client sends. The digital signature is calculated by the client
according to the private key that corresponds to the host public key.
For SSH servers that use publickey authentication, password-publickey authentication, or any
authentication, you must configure the client's DSA or RSA host public key on the server, and specify the
corresponding host private key on the client to generate the digital signature, so that the client can pass
publickey authentication with correct digital signature. If the device serves as a client, corresponding host
private key is specified by the specified public key algorithm.
You can manually configure the host public key of an SSH client on the server, or import it from the public
key file:
Manually configuring the host public key
—You can type or copy the client's host public key from
the client to the SSH server. The host public key must be in the DER encoding format without being
converted.
If you use the device to act as the client, you can use the
display public-key local public
command
to display the host public key and copy its contents to the server. Other ways to display a host
public key might result in incorrect format. HP recommends that you import a client's host public
key from the public key file of the client.