06-Network

HomeSupportConfigure & DeployConfiguration GuidesH3C SecPath M9000 Comware 7 Web configuration guide(R9153P38 R9724P38 R9001P38 E9153P38)-6W40106-Network
28-SSH
Title Size Download
28-SSH 22.50 KB

SSH

 

This help contains the following topics:

·     Introduction

·     Restrictions and guidelines

·     Configure SSH

Introduction

Secure Shell (SSH) is a network security protocol. Using encryption and authentication, SSH can implement secure remote access and file transfer over an insecure network.

SSH uses the typical client-server model to establish a channel for secure data transfer based on TCP.

The device supports the following SSH applications:

·     Secure Telnet—Stelnet provides secure and reliable network terminal access services.

·     Secure File Transfer Protocol—Based on SSH2, SFTP uses SSH connections to provide secure file transfer.

·     Secure Copy—Based on SSH2, SCP offers a secure method to copy files.

SSH includes two versions: SSH1.x and SSH2.0 (hereinafter referred to as SSH1 and SSH2), which are not compatible. SSH2 is better than SSH1 in performance and security.

When the device acts as an SSH server, it uses local password authentication to verify the username and password of the SSH client. After the SSH client passes authentication, the SSH client and the SSH server can establish a session and exchange data using this session.

Restrictions and guidelines

·     To support SSH clients that use different types of key pairs, generate DSA, ECDSA, and RSA key pairs on the SSH server.

·     Local DSA, ECDSA, and RSA key pairs for the SSH server use default names. You cannot assign names to the key pairs.

·     The key modulus length must be less than 2048 bits when you generate the DSA key pair on the SSH server.

·     After the SSH client passes authentication, attributes (for example, user role or FTP directory) assigned to the SSH client are determined by the administrator configuration on the SSH server.

·     If the ACL that filters SSH clients' connection requests does not exist or contains no rules, all SSH clients can access the device.

·     When acting as an SFTP server, the device does not support SFTP connections initiated by SSH1 clients.

Configure SSH

To enable the SSH server to provide Stelnet, SFTP, or SCP service, perform the following tasks:

·     Generate RSA, DSA or ECDSA key pairs.

·     Enable Stelnet, SFTP, or SCP service.

·     Configure an administrator of the SSH service type.

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网