HP VPN Firewall Appliances System Management and Maintenance Configuration Guide
183
Stelnet configuration examples
This section provides examples of configuring Stelnet.
Password authentication enabled Stelnet server configuration
example
Network requirements
As shown in Figure 78, you can log in to the firewall through the Stelnet client (SSH2) that runs on the host.
The firewall acts as the Stelnet server and uses password authentication. The username and password of
the client are saved on the firewall.
Figure 78 Network diagram
Configuration procedure
1. Configure the Stelnet server:
# Generate the RSA key pairs.
<Firewall> system-view
[Firewall] public-key local create rsa
The range of public key size is (512 ~ 2048).
NOTES: If the key modulus is greater than 512,
It will take a few minutes.
Press CTRL+C to abort.
Input the bits of the modulus[default = 1024]:
Generating Keys...
++++++++
++++++++++++++
+++++
++++++++
# Generate a DSA key pair.
[Firewall] public-key local create dsa
The range of public key size is (512 ~ 2048).
NOTES: If the key modulus is greater than 512,
It will take a few minutes.
Press CTRL+C to abort.
Input the bits of the modulus[default = 1024]:
Generating Keys...
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++
# Enable the SSH server function.
[Firewall] ssh server enable