F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices System Management and Maintenance Configuration Guide-6PW100

176
Task Command
Remarks
Display information about one or
all SSH users on an SSH server.
display ssh user-information [ username ] [ |
{ begin | exclude | include }
regular-expression ]
Available in any view.
Display the public keys of the local
key pairs.
display public-key local { dsa | rsa } public
[ | { begin | exclude | include }
regular-expression ]
Available in any view.
Display the public keys of the SSH
peers.
display public-key peer [ brief | name
publickey-name ] [ | { begin | exclude |
include } regular-expression ]
Available in any view.
106B
Stelnet configuration examples
This section provides examples of configuring Stelnet.
294BWhen the firewall acts as an Stelnet server for password
authentication
460BNetwork requirements
As shown in 898HFigure 73, you can log in to the firewall through the Stelnet client (SSH2) that runs on the host.
The firewall acts as the Stelnet server and uses password authentication. The username and password of
the client are saved on the firewall.
Figure 73 Network diagram
461BConfiguration procedure
1. Configure the Stelnet server:
# Generate the RSA key pairs.
<Firewall> system-view
[Firewall] public-key local create rsa
The range of public key size is (512 ~ 2048).
NOTES: If the key modulus is greater than 512,
It will take a few minutes.
Press CTRL+C to abort.
Input the bits of the modulus[default = 1024]:
Generating Keys...
++++++++
++++++++++++++
+++++
++++++++
# Generate a DSA key pair.