站长统计推荐网络推广方式有哪几种
news/
2025/9/26 5:29:18/
文章来源:
站长统计推荐,网络推广方式有哪几种,高端人士,做网站的空间是啥交换机作为STelnet客户端登录其他设备配置示例1、组网需求图1 设备通过STelnet登录其他设备组网图如上图1所示#xff0c;用户希望在服务器端和客户端进行安全的数据交互#xff0c;配置两个登录用户为client001和client002#xff0c;分别使用password认证方式和RSA认证方式…交换机作为STelnet客户端登录其他设备配置示例1、组网需求 图1 设备通过STelnet登录其他设备组网图 如上图1所示用户希望在服务器端和客户端进行安全的数据交互配置两个登录用户为client001和client002分别使用password认证方式和RSA认证方式登录SSH服务器并且配置新的端口号而不使用缺省端口号。2、配置思路1、在SSH服务器端生成本地密钥对实现在服务器端和客户端进行安全的数据交互。2、在SSH服务器端配置SSH用户client001和client002分别使用不同的认证方式。3、在SSH服务器端开启STelnet服务功能。4、在SSH服务器端配置SSH用户client001和client002的服务方式为STelnet。5、在SSH服务器端配置SSH服务器的端口号有效防止攻击者对SSH服务标准端口的访问确保安全性。6、用户client001和client002分别以STelnet方式实现登录SSH服务器。3、操作步骤3.1、在服务器端生成本地密钥对 system-view[HUAWEI] sysname SSH Server[SSH Server] rsa local-key-pair createThe key name will be: SSH Server_HostThe range of public key size is (512 ~ 2048).NOTES: If the key modulus is greater than 512, it will take a few minutes.Input the bits in the modulus[default 2048]:2048Generating keys..............................................................................................3.2、在服务器端创建SSH用户3.2.1、配置VTY用户界面。[SSH Server] user-interface vty 0 4[SSH Server-ui-vty0-4] authentication-mode aaa[SSH Server-ui-vty0-4] protocol inbound ssh[SSH Server-ui-vty0-4] quit3.2.2、创建SSH用户client001。 新建用户名为client001的SSH用户且认证方式为password。[SSH Server] aaa[SSH Server-aaa] local-user client001 password irreversible-cipher Huawei123[SSH Server-aaa] local-user client001 privilege level 3[SSH Server-aaa] local-user client001 service-type ssh[SSH Server-aaa] quit[SSH Server] ssh user client001[SSH Server] ssh user client001 authentication-type password3.3.3、创建SSH用户client002。新建用户名为client002的SSH用户且认证方式为RSA。[SSH Server] ssh user client002[SSH Server] ssh user client002 authentication-type rsa3.4、在STelnet客户端Client002生成客户端的本地密钥对。system-view[HUAWEI] sysname client002[client002] rsa local-key-pair createThe key name will be: client002_HostThe range of public key size is (512 ~ 2048).NOTES: If the key modulus is greater than 512, it will take a few minutes.Input the bits in the modulus[default 2048]:2048Generating keys..............................................................................................3.5、查看客户端上生成的RSA密钥对的公钥部分。[client002] display rsa local-key-pair publicTime of Key pair created: 2014-03-03 16:51:28-05:13Key name: client002_HostKey type: RSA encryption KeyKey code:30820109 02820100 CA97BCDE 697CEDE9 D9AB9475 9E004D15 C8B95116 87B79B0C 5698C582 69A9F4D0 45ED0E53 AF2EDEC1 A09DF4BE 459E34B6 6697B85D 2191A00E 92F3A5E7 FB0E73E7 F0212432 E898D979 8EAA491E E2B69727 4B51A2BE CD86A144 16748D1E 4847A814 3FE50862 6EB1AD81 EB49A05E 64F6D186 C4E94CDB 04C53074 B839305A 7F7BCE2C 606F6C91 EA958B6D AC46C12B 8C2B1E03 98F1C09D 3AF2A69D 6867F930 DF992692 9A921682 916273FC 4DD875D4 44BC371E DDBB8F6A C0A4CDB3 ADDAE853 DB86B9FA DB13CCA9 D8CF6EC1 530CC2F5 697C4707 90829982 4339507F F354FAF9 0F9CD2C2 F7D6FF3D 901D700F F0588104 856B9592 71D773E2 E76E8EEB 431FB60D 60ABC20B 0203 010001 Host public key for PEM format code:---- BEGIN SSH2 PUBLIC KEY ----AAAAB3NzaC1yc2EAAAADAQABAAABAQDKl7zeaXzt6dmrlHWeAE0VyLlRFoe3mwxWmMWCaan00EXtDlOvLt7BoJ30vkWeNLZml7hdIZGgDpLzpef7DnPn8CEkMuiY2XmOqkke4raXJ0tRor7NhqFEFnSNHkhHqBQ/5QhibrGtgetJoF5k9tGGxOlM2wTFMHS4OTBaf3vOLGBvbJHqlYttrEbBK4wrHgOY8cCdOvKmnWhnTDfmSaSmpIWgpFic/xN2HXURLw3Ht27j2rApM2zrdroU9uGufrbE8yp2M9uwVMMwvVpfEcHkIKZgkM5UH/zVPr5D5zSwvfW/z2QHXAP8FiBBIVrlZJx13Pi526O60Mftg1gq8IL---- END SSH2 PUBLIC KEY ----Public key code for pasting into OpenSSH authorized_keys file :ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDKl7zeaXzt6dmrlHWeAE0VyLlRFoe3mwxWmMWCaan00EXtDlOvLt7BoJ30vkWeNLZml7hdIZGgDpLzpef7DnPn8CEkMuiY2XmOqkke4raXJ0tRor7NhqFEFnSNHkhHqBQ/5QhibrGtgetJoF5k9tGGxOlM2wTFMHS4OTBaf3vOLGBvbJHqlYttrEbBK4wrHgOY8cCdOvKmnWhnTDfmSaSmpIWgpFic/xN2HXURLw3Ht27j2rApM2zrdroU9uGufrbE8yp2M9uwVMMwvVpfEcHkIKZgkM5UH/zVPr5D5zSwvfW/z2QHXAP8FiBBIVrlZJx13Pi526O60Mftg1gq8IL rsa-keyTime of Key pair created: 2014-03-03 16:51:29-05:13Key name: client002_ServerKey type: RSA encryption KeyKey code:3081B8 0281B0 BCF579A1 063A03D7 595C1E4F D7252C49 CDB04F32 B9FFEB6F AC0CA862 5033B5BF B05442B4 684D0EB9 F3E2510C C9B55C59 671E6E9A 0E0D1C17 9EE621BD 766774DF AB6EFD70 21D405C9 BD181E53 7F643D82 CA5828DA C9C75455 E87400CB C06D3760 84B765CA FA4FF828 D1B223BA 8BCB2F93 766D9835 0F011511 CE9041B5 12326069 61DD0352 6D9A80CC C4BB88EC 227C74A5 5AF14AFA 74FE7B98 C3EF723A AFF753F1 9ED3306A CDA857D8 0E90434F 5783A36B 0203 0100013.6、将客户端上产生的RSA公钥配置到服务器端(上面display命令显示信息中黑体部分即为客户端产生的RSA公钥将其拷贝粘贴至服务器端)。[SSH Server] rsa peer-public-key rsakey001[SSH Server-rsa-public-key] public-key-code begin[SSH Server-rsa-key-code] 30820109[SSH Server-rsa-key-code] 2820100[SSH Server-rsa-key-code] CA97BCDE 697CEDE9 D9AB9475 9E004D15 C8B95116[SSH Server-rsa-key-code] 87B79B0C 5698C582 69A9F4D0 45ED0E53 AF2EDEC1[SSH Server-rsa-key-code] A09DF4BE 459E34B6 6697B85D 2191A00E 92F3A5E7[SSH Server-rsa-key-code] FB0E73E7 F0212432 E898D979 8EAA491E E2B69727[SSH Server-rsa-key-code] 4B51A2BE CD86A144 16748D1E 4847A814 3FE50862[SSH Server-rsa-key-code] 6EB1AD81 EB49A05E 64F6D186 C4E94CDB 04C53074[SSH Server-rsa-key-code] B839305A 7F7BCE2C 606F6C91 EA958B6D AC46C12B[SSH Server-rsa-key-code] 8C2B1E03 98F1C09D 3AF2A69D 6867F930 DF992692[SSH Server-rsa-key-code] 9A921682 916273FC 4DD875D4 44BC371E DDBB8F6A[SSH Server-rsa-key-code] C0A4CDB3 ADDAE853 DB86B9FA DB13CCA9 D8CF6EC1[SSH Server-rsa-key-code] 530CC2F5 697C4707 90829982 4339507F F354FAF9[SSH Server-rsa-key-code] 0F9CD2C2 F7D6FF3D 901D700F F0588104 856B9592[SSH Server-rsa-key-code] 71D773E2 E76E8EEB 431FB60D 60ABC20B[SSH Server-rsa-key-code] 203[SSH Server-rsa-key-code] 10001[SSH Server-rsa-key-code] public-key-code end[SSH Server-rsa-public-key] peer-public-key end3.7、在SSH服务器端为SSH用户client002绑定STelnet客户端的RSA公钥。[SSH Server] ssh user client002 assign rsa-key rsakey0013.8、SSH服务器端开启STelnet服务功能[SSH Server] stelnet server enable3.9、配置SSH用户client001、client002的服务方式为STelnet[SSH Server] ssh user client001 service-type stelnet[SSH Server] ssh user client002 service-type stelnet3.10、配置SSH服务器端新的端口号[SSH Server] ssh server port 10253.11、STelnet客户端连接SSH服务器3.11.1、 第一次登录需要使能SSH客户端首次认证功能。使能客户端Client001首次认证功能。system-view[HUAWEI] sysname client001[client001] ssh client first-time enable使能客户端Client002首次认证功能。[client002] ssh client first-time enable3.11.2、STelnet客户端Client001用password认证方式连接SSH服务器输入配置的用户名和密码。[client001] stelnet 10.1.1.1 1025Please input the username:client001Trying 10.1.1.1 ...Press CTRLK to abortConnected to 10.1.1.1 ...The server is not authenticated. Continue to access it?[Y/N]:ySave the servers public key?[Y/N]:yThe servers public key will be saved with the name 10.1.1.1. Please wait...Enter password: 输入密码显示登录成功信息如下Info: The max number of VTY users is 8, and the number of current VTY users on line is 2. The current login time is 2012-08-16 10:33:1800:00.3.11.3、STelnet客户端Clent002用RSA认证方式连接SSH服务器。[client002] stelnet 10.1.1.1 1025Please input the username: client002Trying 10.1.1.1 ...Press CTRLK to abortConnected to 10.1.1.1 ...The server is not authenticated. Continue to access it?[Y/N]:ySave the servers public key?[Y/N]:yThe servers public key will be saved with the name 10.1.1.1. Please wait...Info: The max number of VTY users is 8, and the number of current VTY users on line is 3. The current login time is 2012-08-16 11:48:4200:00.如果登录成功用户将进入用户视图。如果登录失败用户将收到Session is disconnected的信息。3.12、验证配置结果3.12.1、攻击者使用原端口号22登录SSH服务器不能成功。[client002] stelnet 10.1.1.1Please input the username:client002Trying 10.1.1.1 ...Press CTRLK to abortError: Failed to connect to the remote host. 在SSH服务器端执行display ssh server status命令可以查看到STelnet服务已经使能。执行display ssh user-information命令可以查看服务器端SSH用户信息。3.12.2、查看SSH状态信息。[SSH Server] display ssh server status SSH version :1.99 SSH connection timeout :60 seconds SSH server key generating interval :0 hours SSH authentication retries :3 times SFTP server :Disable Stelnet server :Enable Scp server :Disable SSH server port :1025 SSH server source :0.0.0.0 ACL4 number :0 ACL6 number :03.12.3、查看SSH用户信息。[SSH Server] display ssh user-information User 1: User Name : client001 Authentication-type : password User-public-key-name : - User-public-key-type : - Sftp-directory : - Service-type : stelnet Authorization-cmd : No User 2: User Name : client002 Authentication-type : rsa User-public-key-name : rsaKey001 User-public-key-type : rsa Sftp-directory : - Service-type : stelnet Authorization-cmd : No4、配置文件4.1、SSH服务器的配置文件#sysname SSH Server#rsa peer-public-key rsakey001 public-key-code begin 30820109 02820100 CA97BCDE 697CEDE9 D9AB9475 9E004D15 C8B95116 87B79B0C 5698C582 69A9F4D0 45ED0E53 AF2EDEC1 A09DF4BE 459E34B6 6697B85D 2191A00E 92F3A5E7 FB0E73E7 F0212432 E898D979 8EAA491E E2B69727 4B51A2BE CD86A144 16748D1E 4847A814 3FE50862 6EB1AD81 EB49A05E 64F6D186 C4E94CDB 04C53074 B839305A 7F7BCE2C 606F6C91 EA958B6D AC46C12B 8C2B1E03 98F1C09D 3AF2A69D 6867F930 DF992692 9A921682 916273FC 4DD875D4 44BC371E DDBB8F6A C0A4CDB3 ADDAE853 DB86B9FA DB13CCA9 D8CF6EC1 530CC2F5 697C4707 90829982 4339507F F354FAF9 0F9CD2C2 F7D6FF3D 901D700F F0588104 856B9592 71D773E2 E76E8EEB 431FB60D 60ABC20B 0203 010001 public-key-code endpeer-public-key end#aaa local-user client001 password irreversible-cipher %%HW5%Mr;:2)/RX$FnU1HLO%-TBMp4wn%;~#%iAut}_~O%0L%% local-user client001 privilege level 3 local-user client001 service-type ssh#stelnet server enablessh server port 1025ssh user client001ssh user client001 authentication-type passwordssh user client001 service-type stelnetssh user client002ssh user client002 authentication-type rsassh user client002 assign rsa-key rsakey001ssh user client002 service-type stelnet#user-interface vty 0 4 authentication-mode aaa protocol inbound ssh#return4.2、SSH客户端Client001的配置文件#sysname client001#ssh client first-time enable#return4.3、SSH客户端Client002的配置文件#sysname client002#ssh client first-time enable#return
本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/917885.shtml
如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!