客户端配置_交换机作为STelnet客户端登录其他设备配置示例
交換機作為STelnet客戶端登錄其他設備配置示例
1、組網需求
圖1 設備通過STelnet登錄其他設備組網圖
如上圖1所示,用戶希望在服務器端和客戶端進行安全的數據交互,配置兩個登錄用戶為client001和client002,分別使用password認證方式和RSA認證方式登錄SSH服務器,并且配置新的端口號,而不使用缺省端口號。
2、配置思路
1、在SSH服務器端生成本地密鑰對,實現在服務器端和客戶端進行安全的數據交互。
2、在SSH服務器端配置SSH用戶client001和client002分別使用不同的認證方式。
3、在SSH服務器端開啟STelnet服務功能。
4、在SSH服務器端配置SSH用戶client001和client002的服務方式為STelnet。
5、在SSH服務器端配置SSH服務器的端口號,有效防止攻擊者對SSH服務標準端口的訪問,確保安全性。
6、用戶client001和client002分別以STelnet方式實現登錄SSH服務器。
3、操作步驟
3.1、在服務器端生成本地密鑰對
system-view
[HUAWEI] sysname SSH Server
[SSH Server] rsa local-key-pair create
The key name will be: SSH Server_Host
The range of public key size is (512 ~ 2048).
NOTES: If the key modulus is greater than 512,
it will take a few minutes.
Input the bits in the modulus[default = 2048]:2048
Generating keys...
......................++++++++
........................................................++++++++
........+++++++++
.....+++++++++
3.2、在服務器端創建SSH用戶
3.2.1、配置VTY用戶界面。
[SSH Server] user-interface vty 0 4
[SSH Server-ui-vty0-4] authentication-mode aaa
[SSH Server-ui-vty0-4] protocol inbound ssh
[SSH Server-ui-vty0-4] quit
3.2.2、創建SSH用戶client001。 新建用戶名為client001的SSH用戶,且認證方式為password。
[SSH Server] aaa
[SSH Server-aaa] local-user client001 password irreversible-cipher Huawei@123
[SSH Server-aaa] local-user client001 privilege level 3
[SSH Server-aaa] local-user client001 service-type ssh
[SSH Server-aaa] quit
[SSH Server] ssh user client001
[SSH Server] ssh user client001 authentication-type password
3.3.3、創建SSH用戶client002。新建用戶名為client002的SSH用戶,且認證方式為RSA。
[SSH Server] ssh user client002
[SSH Server] ssh user client002 authentication-type rsa
3.4、在STelnet客戶端Client002生成客戶端的本地密鑰對。
system-view
[HUAWEI] sysname client002
[client002] rsa local-key-pair create
The key name will be: client002_Host
The range of public key size is (512 ~ 2048).
NOTES: If the key modulus is greater than 512,
it will take a few minutes.
Input the bits in the modulus[default = 2048]:2048
Generating keys...
......................++++++++
........................................................++++++++
........+++++++++
.....+++++++++
3.5、查看客戶端上生成的RSA密鑰對的公鑰部分。
[client002] display rsa local-key-pair public
=====================================================
Time of Key pair created: 2014-03-03 16:51:28-05:13
Key name: client002_Host
Key type: RSA encryption Key
=====================================================
Key code:
30820109
02820100
CA97BCDE 697CEDE9 D9AB9475 9E004D15 C8B95116
87B79B0C 5698C582 69A9F4D0 45ED0E53 AF2EDEC1
A09DF4BE 459E34B6 6697B85D 2191A00E 92F3A5E7
FB0E73E7 F0212432 E898D979 8EAA491E E2B69727
4B51A2BE CD86A144 16748D1E 4847A814 3FE50862
6EB1AD81 EB49A05E 64F6D186 C4E94CDB 04C53074
B839305A 7F7BCE2C 606F6C91 EA958B6D AC46C12B
8C2B1E03 98F1C09D 3AF2A69D 6867F930 DF992692
9A921682 916273FC 4DD875D4 44BC371E DDBB8F6A
C0A4CDB3 ADDAE853 DB86B9FA DB13CCA9 D8CF6EC1
530CC2F5 697C4707 90829982 4339507F F354FAF9
0F9CD2C2 F7D6FF3D 901D700F F0588104 856B9592
71D773E2 E76E8EEB 431FB60D 60ABC20B
0203
010001
Host public key for PEM format code:
---- BEGIN SSH2 PUBLIC KEY ----
AAAAB3NzaC1yc2EAAAADAQABAAABAQDKl7zeaXzt6dmrlHWeAE0VyLlRFoe3mwxW
mMWCaan00EXtDlOvLt7BoJ30vkWeNLZml7hdIZGgDpLzpef7DnPn8CEkMuiY2XmO
qkke4raXJ0tRor7NhqFEFnSNHkhHqBQ/5QhibrGtgetJoF5k9tGGxOlM2wTFMHS4
OTBaf3vOLGBvbJHqlYttrEbBK4wrHgOY8cCdOvKmnWhn+TDfmSaSmpIWgpFic/xN
2HXURLw3Ht27j2rApM2zrdroU9uGufrbE8yp2M9uwVMMwvVpfEcHkIKZgkM5UH/z
VPr5D5zSwvfW/z2QHXAP8FiBBIVrlZJx13Pi526O60Mftg1gq8IL
---- END SSH2 PUBLIC KEY ----
Public key code for pasting into OpenSSH authorized_keys file :
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKl7zeaXzt6dmrlHWeAE0VyLlRFoe3mwxWmMWCaan00EXtDlOvLt7BoJ30vkWeNLZml7hdIZGgDpLzpef7DnPn8CEkMuiY2XmOqkke4raXJ0tRor7NhqFEFnSNHkhHqBQ/5QhibrGtgetJoF5k9tGGxOlM2wTFMHS4OTBaf3vOLGBvbJHqlYttrEbBK4wrHgOY8cCdOvKmnWhn+TDfmSaSmpIWgpFic/xN2HXURLw3Ht27j2rApM2zrdroU9uGufrbE8yp2M9uwVMMwvVpfEcHkIKZgkM5UH/zVPr5D5zSwvfW/z2QHXAP8FiBBIVrlZJx13Pi526O60Mftg1gq8IL rsa-key
=====================================================
Time of Key pair created: 2014-03-03 16:51:29-05:13
Key name: client002_Server
Key type: RSA encryption Key
=====================================================
Key code:
3081B8
0281B0
BCF579A1 063A03D7 595C1E4F D7252C49 CDB04F32
B9FFEB6F AC0CA862 5033B5BF B05442B4 684D0EB9
F3E2510C C9B55C59 671E6E9A 0E0D1C17 9EE621BD
766774DF AB6EFD70 21D405C9 BD181E53 7F643D82
CA5828DA C9C75455 E87400CB C06D3760 84B765CA
FA4FF828 D1B223BA 8BCB2F93 766D9835 0F011511
CE9041B5 12326069 61DD0352 6D9A80CC C4BB88EC
227C74A5 5AF14AFA 74FE7B98 C3EF723A AFF753F1
9ED3306A CDA857D8 0E90434F 5783A36B
0203
010001
3.6、將客戶端上產生的RSA公鑰配置到服務器端(上面display命令顯示信息中黑體部分即為客戶端產生的RSA公鑰,將其拷貝粘貼至服務器端)。
[SSH Server] rsa peer-public-key rsakey001
[SSH Server-rsa-public-key] public-key-code begin
[SSH Server-rsa-key-code] 30820109
[SSH Server-rsa-key-code] 2820100
[SSH Server-rsa-key-code] CA97BCDE 697CEDE9 D9AB9475 9E004D15 C8B95116
[SSH Server-rsa-key-code] 87B79B0C 5698C582 69A9F4D0 45ED0E53 AF2EDEC1
[SSH Server-rsa-key-code] A09DF4BE 459E34B6 6697B85D 2191A00E 92F3A5E7
[SSH Server-rsa-key-code] FB0E73E7 F0212432 E898D979 8EAA491E E2B69727
[SSH Server-rsa-key-code] 4B51A2BE CD86A144 16748D1E 4847A814 3FE50862
[SSH Server-rsa-key-code] 6EB1AD81 EB49A05E 64F6D186 C4E94CDB 04C53074
[SSH Server-rsa-key-code] B839305A 7F7BCE2C 606F6C91 EA958B6D AC46C12B
[SSH Server-rsa-key-code] 8C2B1E03 98F1C09D 3AF2A69D 6867F930 DF992692
[SSH Server-rsa-key-code] 9A921682 916273FC 4DD875D4 44BC371E DDBB8F6A
[SSH Server-rsa-key-code] C0A4CDB3 ADDAE853 DB86B9FA DB13CCA9 D8CF6EC1
[SSH Server-rsa-key-code] 530CC2F5 697C4707 90829982 4339507F F354FAF9
[SSH Server-rsa-key-code] 0F9CD2C2 F7D6FF3D 901D700F F0588104 856B9592
[SSH Server-rsa-key-code] 71D773E2 E76E8EEB 431FB60D 60ABC20B
[SSH Server-rsa-key-code] 203
[SSH Server-rsa-key-code] 10001
[SSH Server-rsa-key-code] public-key-code end
[SSH Server-rsa-public-key] peer-public-key end
3.7、在SSH服務器端為SSH用戶client002綁定STelnet客戶端的RSA公鑰。
[SSH Server] ssh user client002 assign rsa-key rsakey001
3.8、SSH服務器端開啟STelnet服務功能
[SSH Server] stelnet server enable
3.9、配置SSH用戶client001、client002的服務方式為STelnet
[SSH Server] ssh user client001 service-type stelnet
[SSH Server] ssh user client002 service-type stelnet
3.10、配置SSH服務器端新的端口號
[SSH Server] ssh server port 1025
3.11、STelnet客戶端連接SSH服務器
3.11.1、 第一次登錄,需要使能SSH客戶端首次認證功能。使能客戶端Client001首次認證功能。
system-view
[HUAWEI] sysname client001
[client001] ssh client first-time enable
使能客戶端Client002首次認證功能。
[client002] ssh client first-time enable
3.11.2、STelnet客戶端Client001用password認證方式連接SSH服務器,輸入配置的用戶名和密碼。
[client001] stelnet 10.1.1.1 1025
Please input the username:client001
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1 ...
The server is not authenticated. Continue to access it?[Y/N]:y
Save the server's public key?[Y/N]:y
The server's public key will be saved with the name 10.1.1.1. Please wait...
Enter password:
輸入密碼,顯示登錄成功信息如下:
Info: The max number of VTY users is 8, and the number
of current VTY users on line is 2.
The current login time is 2012-08-16 10:33:18+00:00.
3.11.3、STelnet客戶端Clent002用RSA認證方式連接SSH服務器。
[client002] stelnet 10.1.1.1 1025
Please input the username: client002
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1 ...
The server is not authenticated. Continue to access it?[Y/N]:y
Save the server's public key?[Y/N]:y
The server's public key will be saved with the name 10.1.1.1. Please wait...
Info: The max number of VTY users is 8, and the number
of current VTY users on line is 3.
The current login time is 2012-08-16 11:48:42+00:00.
如果登錄成功,用戶將進入用戶視圖。如果登錄失敗,用戶將收到Session is disconnected的信息。
3.12、驗證配置結果
3.12.1、攻擊者使用原端口號22登錄SSH服務器,不能成功。
[client002] stelnet 10.1.1.1
Please input the username:client002
Trying 10.1.1.1 ...
Press CTRL+K to abort
Error: Failed to connect to the remote host.
在SSH服務器端執行display ssh server status命令可以查看到STelnet服務已經使能。執行display ssh user-information命令可以查看服務器端SSH用戶信息。
3.12.2、查看SSH狀態信息。
[SSH Server] display ssh server status
SSH version :1.99
SSH connection timeout :60 seconds
SSH server key generating interval :0 hours
SSH authentication retries :3 times
SFTP server :Disable
Stelnet server :Enable
Scp server :Disable
SSH server port :1025
SSH server source :0.0.0.0
ACL4 number :0
ACL6 number
:0
3.12.3、查看SSH用戶信息。
[SSH Server] display ssh user-information
User 1:
User Name : client001
Authentication-type : password
User-public-key-name : -
User-public-key-type : -
Sftp-directory : -
Service-type : stelnet
Authorization-cmd : No
User 2:
User Name : client002
Authentication-type : rsa
User-public-key-name : rsaKey001
User-public-key-type : rsa
Sftp-directory : -
Service-type : stelnet
Authorization-cmd : No
4、配置文件
4.1、SSH服務器的配置文件
#
sysname SSH Server
#
rsa peer-public-key rsakey001
public-key-code begin
30820109
02820100
CA97BCDE 697CEDE9 D9AB9475 9E004D15 C8B95116 87B79B0C 5698C582 69A9F4D0
45ED0E53 AF2EDEC1 A09DF4BE 459E34B6 6697B85D 2191A00E 92F3A5E7 FB0E73E7
F0212432 E898D979 8EAA491E E2B69727 4B51A2BE CD86A144 16748D1E 4847A814
3FE50862 6EB1AD81 EB49A05E 64F6D186 C4E94CDB 04C53074 B839305A 7F7BCE2C
606F6C91 EA958B6D AC46C12B 8C2B1E03 98F1C09D 3AF2A69D 6867F930 DF992692
9A921682 916273FC 4DD875D4 44BC371E DDBB8F6A C0A4CDB3 ADDAE853 DB86B9FA
DB13CCA9 D8CF6EC1 530CC2F5 697C4707 90829982 4339507F F354FAF9 0F9CD2C2
F7D6FF3D 901D700F F0588104 856B9592 71D773E2 E76E8EEB 431FB60D 60ABC20B
0203
010001
public-key-code end
peer-public-key end
#
aaa
local-user client001 password irreversible-cipher %@%@HW=5%Mr;:2)/RX$FnU1HLO%-TBMp4wn%;~#%iAut}_~O%0L%@%@
local-user client001 privilege level 3
local-user client001 service-type ssh
#
stelnet server enable
ssh server port 1025
ssh user client001
ssh user client001 authentication-type password
ssh user client001 service-type stelnet
ssh user client002
ssh user client002 authentication-type rsa
ssh user client002 assign rsa-key rsakey001
ssh user client002 service-type stelnet
#
user-interface vty 0 4
authentication-mode aaa
protocol inbound ssh
#
return
4.2、SSH客戶端Client001的配置文件
#
sysname client001
#
ssh client first-time enable
#
return
4.3、SSH客戶端Client002的配置文件
#
sysname client002
#
ssh client first-time enable
#
return
總結
以上是生活随笔為你收集整理的客户端配置_交换机作为STelnet客户端登录其他设备配置示例的全部內容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: Css权重
- 下一篇: 鳗鱼刺多怎么处理图像_怎么在做鱼前去除鳗