R0106-HP MSR Router Series Security Configuration Guide(V7)
350
[RouterB-line-vty0-63] quit
# Import the peer public key from the file key.pub, and name it clientkey.
[RouterB] public-key peer clientkey import sshkey key.pub
# Create an SSH user client002 with the authentication method publickey, and assign the public
key clientkey to the user.
[RouterB] ssh user client002 service-type stelnet authentication-type publickey
assign publickey clientkey
# Create a local device management user client002 with the service type ssh and the user role
network-admin.
[RouterB] local-user client002 class manage
[RouterB-luser-manage-client002] service-type ssh
[RouterB-luser-manage-client002] authorization-attribute user-role network-admin
[RouterB-luser-manage-client002] quit
3. Establish an SSH connection to the Stelnet server 192.168.1.40.
<RouterA> ssh2 192.168.1.40
Username: client002
The server is not authenticated. Continue? [Y/N]:y
Do you want to save the server public key? [Y/N]:n
Select Yes to access the server and download the server's host public key. At the next connection
attempt, the client authenticates the server by using the saved server's host public key on the client.
SFTP configuration examples
Unless otherwise noted, devices in the configuration examples operate in non-FIPS mode.
If you configure an SFTP server in FIPS mode, follow these guidelines:
• The modulus length of the key pair must be 2048 bits.
• Do not generate a DSA key pair on the S
• FTP server. Only RSA key pairs are supported.
Password authentication enabled SFTP server configuration
example
Network requirements
As shown in Figu re 101:
• You can log in to the router through the SFTP client that runs on the host.
• After login, you are assigned the user role network-admin to execute file management and transfer
operations.
• The router acts as the SFTP server and uses password authentication.
• The username and password of the client are saved on the router.