R3721-F3210-F3171-HP High-End Firewalls System Management and Maintenance Configuration Guide-6PW101
162
Figure 79 Specifying the private key file
In the window shown in Figure 79, click Open to connect to the server. If the connection is normal,
you will be prompted to enter the username. After entering the username (client002), you can enter
the configuration interface of Firewall.
SSH client configuration examples
When the Firewall acts as a client for password authentication
Network requirements
As shown in Figure 80, Firewall (the SSH client) must pass password authentication to log in to Router (the
SSH server) through the SSH protocol. Configure the username client001 and the password aabbcc, for
the SSH client on Router.
Figure 80 Network diagram
Configuration procedure
1. Configure the SSH server
# Generate the RSA key pairs.
<Router> system-view