当前位置:网站首页>Login Huawei device in SSH mode
Login Huawei device in SSH mode
2022-07-24 20:05:00 【tlucky1】
1. requirement
establish user1 account number , password [email protected], User level 3, Only with ssh How to log in
2. Topology

3. To configure
AR1
sys
[Huawei]int g0/0/0
[Huawei-GigabitEthernet0/0/0]ip address 1.1.1.2 24
[Huawei-GigabitEthernet0/0/0]q
[Huawei]un in en
[Huawei]aaa
[Huawei-aaa]local-user user1 password cipher [email protected] privilege level 3
[Huawei-aaa]local-user user1 service-type ssh
[Huawei-aaa]q
[Huawei]rsa l
[Huawei]rsa local-key-pair create
The key name will be: Host
% RSA keys defined for Host already exist.
Confirm to replace them? (y/n)[n]:y
The range of public key size is (512 ~ 2048).
NOTES: If the key modulus is greater than 512,
It will take a few minutes.
Input the bits in the modulus[default = 512]:y
% Invalid number, the range is (512 ~ 2048).
[Huawei]rsa local-key-pair create
The key name will be: Host
% RSA keys defined for Host already exist.
Confirm to replace them? (y/n)[n]:y
The range of public key size is (512 ~ 2048).
NOTES: If the key modulus is greater than 512,
It will take a few minutes.
Input the bits in the modulus[default = 512]:1024
Generating keys…
…++++++
…++++++
…++++++++
…++++++++
[Huawei]user vty 0 4
[Huawei-ui-vty0-4]authentication-mode aaa
[Huawei-ui-vty0-4]protocol inbound ssh
[Huawei-ui-vty0-4]q
[Huawei]ssh user user1 authentication-type pass
[Huawei]ssh user user1 authentication-type password
[Huawei]stelnet server enable
Info: Succeeded in starting the STELNET server.
[Huawei]
pc
sys
[Huawei]int g0/0/0
[Huawei-GigabitEthernet0/0/0]ip address 1.1.1.1 24
[Huawei]ssh client first-time enable
[Huawei]stelnet 1.1.1.2
Please input the username:user1
Trying 1.1.1.2 …
Press CTRL+K to abort
Connected to 1.1.1.2 …
The server is not authenticated. Continue to access it? (y/n)[n]:y
Save the server’s public key? (y/n)[n]:y
The server’s public key will be saved with the name 1.1.1.2. Please wait…
Enter password:
Enter password:
Enter password:
Info: The connection was closed by the remote host.
Login successful
边栏推荐
- Student achievement management system based on PHP
- Day 6 (array example)
- 02 | 环境准备:如何在windows下安装和配置一个基本的php开发环境?
- 2019 Hangzhou Electric Multi School Game 9 6684 Rikka with game [game question]
- Redisgraph graphic database multi activity design scheme
- Codeforces round 580 (Div. 2) c- almost equal [Law]
- 6.0 holes stepped by fragment request permission in the system
- Usage and introduction of MySQL binlog
- Maya coffee machine modeling
- Prevent static decompilation, dynamic debugging and plug-in
猜你喜欢

Istio二之流量劫持过程

Xiaomi 12s ultra products are so powerful, but foreigners can't buy Lei Jun: first concentrate on the Chinese market

Thymeleaf application notes

Pix2seq: Google brain proposes a unified interface for CV tasks!

Analysis and Simulation of strlen function
![2019 Hangdian multi school first 6581 vacation [thinking]](/img/38/5a74d3ef346d6801f9da8fd3a4b23a.png)
2019 Hangdian multi school first 6581 vacation [thinking]

Choose the appropriate container runtime for kubernetes

Stop using UUID indiscriminately. Have you tested the performance gap between self incrementing ID and UUID?

How to use the interface control telerik UI for WinForms development step progress bar?

C # shelling tool for code encryption protection
随机推荐
MySQL stored procedure
Introduction to WDK development 1- basic environment construction and the first driver (VS2010)
Jedi survive and eat chicken F12 screenshot save path reference
Functional test of redisgraph multi active design scheme
Please ask a question. Follow the quick start method. After creating the table, the Flink SQL queries and displays the table structure, but there is an error when it exceeds the limit. What should we
[FreeRTOS] 10 event flag group
Elastomer simulation (elasticity)
Rotation matrix derivation process
Sword finger offer 40. minimum number of K
Create a life cycle aware MVP architecture
聊下自己转型测试开发的历程
Pure C implementation -------- Nicolas theorem
[German flavor] safety: how to provide more protection for pedestrians
Sword finger offer 42. maximum sum of continuous subarrays
Introduction and advanced tutorial of Albert duilib
Decorator of function
"Six pillars of self esteem" self esteem comes from one's own feelings
871. Sum of divisors
147-利用路由元信息设置是否缓存——include和exclude使用——activated和deactivated的使用
Sword finger offer 47. the maximum value of gifts