服务器的端口号和客户_交换机作为STelnet客户端登录其他设备配置示例

交换机作为STelnet客户端登录其他设备配置示例

1、组网需求

d56992a32b058c075f4c0287f8886def.png

图1 设备通过STelnet登录其他设备组网图

如上图1所示,用户希望在服务器端和客户端进行安全的数据交互,配置两个登录用户为client001和client002,分别使用password认证方式和RSA认证方式登录SSH服务器,并且配置新的端口号,而不使用缺省端口号。

2、配置思路

1、在SSH服务器端生成本地密钥对,实现在服务器端和客户端进行安全的数据交互。

2、在SSH服务器端配置SSH用户client001和client002分别使用不同的认证方式。

3、在SSH服务器端开启STelnet服务功能。

4、在SSH服务器端配置SSH用户client001和client002的服务方式为STelnet。

5、在SSH服务器端配置SSH服务器的端口号,有效防止攻击者对SSH服务标准端口的访问,确保安全性。

6、用户client001和client002分别以STelnet方式实现登录SSH服务器。

3、操作步骤

3.1、在服务器端生成本地密钥对

system-view

[HUAWEI] sysname SSH Server

[SSH Server] rsa local-key-pair create

The key name will be: SSH Server_Host

The range of public key size is (512 ~ 2048).

NOTES: If the key modulus is greater than 512,

it will take a few minutes.

Input the bits in the modulus[default = 2048]:2048

Generating keys...

......................++++++++

........................................................++++++++

........+++++++++

.....+++++++++

3.2、在服务器端创建SSH用户

3.2.1、配置VTY用户界面。

[SSH Server] user-interface vty 0 4

[SSH Server-ui-vty0-4] authentication-mode aaa

[SSH Server-ui-vty0-4] protocol inbound ssh

[SSH Server-ui-vty0-4] quit

3.2.2、创建SSH用户client001。 新建用户名为client001的SSH用户,且认证方式为password。

[SSH Server] aaa

[SSH Server-aaa] local-user client001 password irreversible-cipher Huawei@123

[SSH Server-aaa] local-user client001 privilege level 3

[SSH Server-aaa] local-user client001 service-type ssh

[SSH Server-aaa] quit

[SSH Server] ssh user client001

[SSH Server] ssh user client001 authentication-type password

3.3.3、创建SSH用户client002。新建用户名为client002的SSH用户,且认证方式为RSA。

[SSH Server] ssh user client002

[SSH Server] ssh user client002 authentication-type rsa

3.4、在STelnet客户端Client002生成客户端的本地密钥对。

system-view

[HUAWEI] sysname client002

[client002] rsa local-key-pair create

The key name will be: client002_Host

The range of public key size is (512 ~ 2048).

NOTES: If the key modulus is greater than 512,

it will take a few minutes.

Input the bits in the modulus[default = 2048]:2048

Generating keys...

......................++++++++

........................................................++++++++

........+++++++++

.....+++++++++

3.5、查看客户端上生成的RSA密钥对的公钥部分。

[client002] display rsa local-key-pair public

=====================================================

Time of Key pair created: 2014-03-03 16:51:28-05:13

Key name: client002_Host

Key type: RSA encryption Key

=====================================================

Key code:

30820109

02820100

CA97BCDE 697CEDE9 D9AB9475 9E004D15 C8B95116

87B79B0C 5698C582 69A9F4D0 45ED0E53 AF2EDEC1

A09DF4BE 459E34B6 6697B85D 2191A00E 92F3A5E7

FB0E73E7 F0212432 E898D979 8EAA491E E2B69727

4B51A2BE CD86A144 16748D1E 4847A814 3FE50862

6EB1AD81 EB49A05E 64F6D186 C4E94CDB 04C53074

B839305A 7F7BCE2C 606F6C91 EA958B6D AC46C12B

8C2B1E03 98F1C09D 3AF2A69D 6867F930 DF992692

9A921682 916273FC 4DD875D4 44BC371E DDBB8F6A

C0A4CDB3 ADDAE853 DB86B9FA DB13CCA9 D8CF6EC1

530CC2F5 697C4707 90829982 4339507F F354FAF9

0F9CD2C2 F7D6FF3D 901D700F F0588104 856B9592

71D773E2 E76E8EEB 431FB60D 60ABC20B

0203

010001

Host public key for PEM format code:

---- BEGIN SSH2 PUBLIC KEY ----

AAAAB3NzaC1yc2EAAAADAQABAAABAQDKl7zeaXzt6dmrlHWeAE0VyLlRFoe3mwxW

mMWCaan00EXtDlOvLt7BoJ30vkWeNLZml7hdIZGgDpLzpef7DnPn8CEkMuiY2XmO

qkke4raXJ0tRor7NhqFEFnSNHkhHqBQ/5QhibrGtgetJoF5k9tGGxOlM2wTFMHS4

OTBaf3vOLGBvbJHqlYttrEbBK4wrHgOY8cCdOvKmnWhn+TDfmSaSmpIWgpFic/xN

2HXURLw3Ht27j2rApM2zrdroU9uGufrbE8yp2M9uwVMMwvVpfEcHkIKZgkM5UH/z

VPr5D5zSwvfW/z2QHXAP8FiBBIVrlZJx13Pi526O60Mftg1gq8IL

---- END SSH2 PUBLIC KEY ----

Public key code for pasting into OpenSSH authorized_keys file :

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKl7zeaXzt6dmrlHWeAE0VyLlRFoe3mwxWmMWCaan00EXtDlOvLt7BoJ30vkWeNLZml7hdIZGgDpLzpef7DnPn8CEkMuiY2XmOqkke4raXJ0tRor7NhqFEFnSNHkhHqBQ/5QhibrGtgetJoF5k9tGGxOlM2wTFMHS4OTBaf3vOLGBvbJHqlYttrEbBK4wrHgOY8cCdOvKmnWhn+TDfmSaSmpIWgpFic/xN2HXURLw3Ht27j2rApM2zrdroU9uGufrbE8yp2M9uwVMMwvVpfEcHkIKZgkM5UH/zVPr5D5zSwvfW/z2QHXAP8FiBBIVrlZJx13Pi526O60Mftg1gq8IL rsa-key

=====================================================

Time of Key pair created: 2014-03-03 16:51:29-05:13

Key name: client002_Server

Key type: RSA encryption Key

=====================================================

Key code:

3081B8

0281B0

BCF579A1 063A03D7 595C1E4F D7252C49 CDB04F32

B9FFEB6F AC0CA862 5033B5BF B05442B4 684D0EB9

F3E2510C C9B55C59 671E6E9A 0E0D1C17 9EE621BD

766774DF AB6EFD70 21D405C9 BD181E53 7F643D82

CA5828DA C9C75455 E87400CB C06D3760 84B765CA

FA4FF828 D1B223BA 8BCB2F93 766D9835 0F011511

CE9041B5 12326069 61DD0352 6D9A80CC C4BB88EC

227C74A5 5AF14AFA 74FE7B98 C3EF723A AFF753F1

9ED3306A CDA857D8 0E90434F 5783A36B

0203

010001

3.6、将客户端上产生的RSA公钥配置到服务器端(上面display命令显示信息中黑体部分即为客户端产生的RSA公钥,将其拷贝粘贴至服务器端)。

[SSH Server] rsa peer-public-key rsakey001

[SSH Server-rsa-public-key] public-key-code begin

[SSH Server-rsa-key-code] 30820109

[SSH Server-rsa-key-code] 2820100

[SSH Server-rsa-key-code] CA97BCDE 697CEDE9 D9AB9475 9E004D15 C8B95116

[SSH Server-rsa-key-code] 87B79B0C 5698C582 69A9F4D0 45ED0E53 AF2EDEC1

[SSH Server-rsa-key-code] A09DF4BE 459E34B6 6697B85D 2191A00E 92F3A5E7

[SSH Server-rsa-key-code] FB0E73E7 F0212432 E898D979 8EAA491E E2B69727

[SSH Server-rsa-key-code] 4B51A2BE CD86A144 16748D1E 4847A814 3FE50862

[SSH Server-rsa-key-code] 6EB1AD81 EB49A05E 64F6D186 C4E94CDB 04C53074

[SSH Server-rsa-key-code] B839305A 7F7BCE2C 606F6C91 EA958B6D AC46C12B

[SSH Server-rsa-key-code] 8C2B1E03 98F1C09D 3AF2A69D 6867F930 DF992692

[SSH Server-rsa-key-code] 9A921682 916273FC 4DD875D4 44BC371E DDBB8F6A

[SSH Server-rsa-key-code] C0A4CDB3 ADDAE853 DB86B9FA DB13CCA9 D8CF6EC1

[SSH Server-rsa-key-code] 530CC2F5 697C4707 90829982 4339507F F354FAF9

[SSH Server-rsa-key-code] 0F9CD2C2 F7D6FF3D 901D700F F0588104 856B9592

[SSH Server-rsa-key-code] 71D773E2 E76E8EEB 431FB60D 60ABC20B

[SSH Server-rsa-key-code] 203

[SSH Server-rsa-key-code] 10001

[SSH Server-rsa-key-code] public-key-code end

[SSH Server-rsa-public-key] peer-public-key end

3.7、在SSH服务器端为SSH用户client002绑定STelnet客户端的RSA公钥。

[SSH Server] ssh user client002 assign rsa-key rsakey001

3.8、SSH服务器端开启STelnet服务功能

[SSH Server] stelnet server enable

3.9、配置SSH用户client001、client002的服务方式为STelnet

[SSH Server] ssh user client001 service-type stelnet

[SSH Server] ssh user client002 service-type stelnet

3.10、配置SSH服务器端新的端口号

[SSH Server] ssh server port 1025

3.11、STelnet客户端连接SSH服务器

3.11.1、 第一次登录,需要使能SSH客户端首次认证功能。使能客户端Client001首次认证功能。

system-view

[HUAWEI] sysname client001

[client001] ssh client first-time enable

使能客户端Client002首次认证功能。

[client002] ssh client first-time enable

3.11.2、STelnet客户端Client001用password认证方式连接SSH服务器,输入配置的用户名和密码。

[client001] stelnet 10.1.1.1 1025

Please input the username:client001

Trying 10.1.1.1 ...

Press CTRL+K to abort

Connected to 10.1.1.1 ...

The server is not authenticated. Continue to access it?[Y/N]:y

Save the server's public key?[Y/N]:y

The server's public key will be saved with the name 10.1.1.1. Please wait...

Enter password:

输入密码,显示登录成功信息如下:

Info: The max number of VTY users is 8, and the number

of current VTY users on line is 2.

The current login time is 2012-08-16 10:33:18+00:00.

3.11.3、STelnet客户端Clent002用RSA认证方式连接SSH服务器。

[client002] stelnet 10.1.1.1 1025

Please input the username: client002

Trying 10.1.1.1 ...

Press CTRL+K to abort

Connected to 10.1.1.1 ...

The server is not authenticated. Continue to access it?[Y/N]:y

Save the server's public key?[Y/N]:y

The server's public key will be saved with the name 10.1.1.1. Please wait...

Info: The max number of VTY users is 8, and the number

of current VTY users on line is 3.

The current login time is 2012-08-16 11:48:42+00:00.

如果登录成功,用户将进入用户视图。如果登录失败,用户将收到Session is disconnected的信息。

3.12、验证配置结果

3.12.1、攻击者使用原端口号22登录SSH服务器,不能成功。

[client002] stelnet 10.1.1.1

Please input the username:client002

Trying 10.1.1.1 ...

Press CTRL+K to abort

Error: Failed to connect to the remote host.

在SSH服务器端执行display ssh server status命令可以查看到STelnet服务已经使能。执行display ssh user-information命令可以查看服务器端SSH用户信息。

3.12.2、查看SSH状态信息。

[SSH Server] display ssh server status

SSH version :1.99

SSH connection timeout :60 seconds

SSH server key generating interval :0 hours

SSH authentication retries :3 times

SFTP server :Disable

Stelnet server :Enable

Scp server :Disable

SSH server port :1025

SSH server source :0.0.0.0

ACL4 number :0

ACL6 number

:0

3.12.3、查看SSH用户信息。

[SSH Server] display ssh user-information

User 1:

User Name : client001

Authentication-type : password

User-public-key-name : -

User-public-key-type : -

Sftp-directory : -

Service-type : stelnet

Authorization-cmd : No

User 2:

User Name : client002

Authentication-type : rsa

User-public-key-name : rsaKey001

User-public-key-type : rsa

Sftp-directory : -

Service-type : stelnet

Authorization-cmd : No

4、配置文件

4.1、SSH服务器的配置文件

#

sysname SSH Server

#

rsa peer-public-key rsakey001

public-key-code begin

30820109

02820100

CA97BCDE 697CEDE9 D9AB9475 9E004D15 C8B95116 87B79B0C 5698C582 69A9F4D0

45ED0E53 AF2EDEC1 A09DF4BE 459E34B6 6697B85D 2191A00E 92F3A5E7 FB0E73E7

F0212432 E898D979 8EAA491E E2B69727 4B51A2BE CD86A144 16748D1E 4847A814

3FE50862 6EB1AD81 EB49A05E 64F6D186 C4E94CDB 04C53074 B839305A 7F7BCE2C

606F6C91 EA958B6D AC46C12B 8C2B1E03 98F1C09D 3AF2A69D 6867F930 DF992692

9A921682 916273FC 4DD875D4 44BC371E DDBB8F6A C0A4CDB3 ADDAE853 DB86B9FA

DB13CCA9 D8CF6EC1 530CC2F5 697C4707 90829982 4339507F F354FAF9 0F9CD2C2

F7D6FF3D 901D700F F0588104 856B9592 71D773E2 E76E8EEB 431FB60D 60ABC20B

0203

010001

public-key-code end

peer-public-key end

#

aaa

local-user client001 password irreversible-cipher %@%@HW=5%Mr;:2)/RX$FnU1HLO%-TBMp4wn%;~#%iAut}_~O%0L%@%@

local-user client001 privilege level 3

local-user client001 service-type ssh

#

stelnet server enable

ssh server port 1025

ssh user client001

ssh user client001 authentication-type password

ssh user client001 service-type stelnet

ssh user client002

ssh user client002 authentication-type rsa

ssh user client002 assign rsa-key rsakey001

ssh user client002 service-type stelnet

#

user-interface vty 0 4

authentication-mode aaa

protocol inbound ssh

#

return

4.2、SSH客户端Client001的配置文件

#

sysname client001

#

ssh client first-time enable

#

return

4.3、SSH客户端Client002的配置文件

#

sysname client002

#

ssh client first-time enable

#

return

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值