3com 3031 Instruccion De Instalación

Descargar
Página de 1122
112
C
HAPTER
 11: T
ERMINAL
 S
ERVICES
Figure 25   Establishing SSH channel through WAN
In the whole communication process, the server and client pass through the 
following five steps: negotiation step for version number, negotiation step for key 
algorithm, negotiation step for authentication method, step for session request 
and step for interactive session. In such a way, the server and the client accomplish 
the authentication security connection of SSH.
SSH Configuration
SSH configuration includes:
Set the protocols supported by system in user interface
Configure local RSA key pair
Configure authentication mode for SSH user
Set the update time of server key
Set the time-out time of SSH authentication
Set the re-try times of SSH authentication
Enter public key view
Enter public key edit view to edit the key
Quit public key edit view
Assign public key for SSH user
Monitor and maintain SSH
Setting the Protocols 
Supported by System in 
User Interface
This configuration is used to specify the protocols supported by the system in user 
interface view. By default, the system supports Telnet and SSH. If SSH is enabled 
but the local RSA key is not configured, the user cannot login through SSH. The 
configuration will take effect in next login.
Perform the following operation in User interface view of VTY type.
Local configuration terminal runs
SSH and login router through WAN
Local router
WAN line
LAN
Local PC running SSH
Local LAN
Remote router
LAN
Remote router
PC
PC
PC
PC
PC
WAN
Local router
WAN line
LAN
Local PC running SSH
Local LAN
Remote router
LAN
PC
PC
PC
PC
WAN
PC