举例:配置IPv4用户通过STelnet登录设备(本地认证)

组网图形

图1 配置用户通过STelnet登录设备组网图
  • 组网需求
  • 配置思路
  • 数据准备
  • 操作步骤
  • 检查配置结果
  • 配置脚本

组网需求

图1所示,在作为SSH服务器的设备上开启STelnet服务器功能后,SSH客户端PC可以通过不同的认证方式登录SSH服务器,这里以RSA认证方式为例介绍客户端通过STelnet登录服务器的配置过程。

为了提升系统安全性,防止非法用户登录到SSH服务器,用户可以在SSH服务器上配置ACL规则。

配置思路

采用如下的思路配置SSH用户通过STelnet登录设备:

  1. 配置SSH服务器的管理网口IP地址。

  2. 在SSH服务器端生成本地密钥对。
  3. 配置SSH服务器的VTY用户界面。

  4. 创建本地用户,并配置用户的接入类型。

  5. 创建SSH用户,并配置认证方式。

  6. SSH客户端根据配置的SSH用户认证类型创建相应的密钥对,并将公钥拷贝至SSH服务器。
  7. SSH服务器端编辑公钥,并将编辑好的公钥分配给用户。
  8. 开启SSH服务器的STelnet功能,配置SSH用户的服务类型为STelnet。

  9. 在SSH服务器上配置允许STelnet客户端登录的ACL规则。
  10. 配置客户端登录软件的参数,STelnet至服务器。

数据准备

为完成此配置示例,需准备如下数据:

为了保证更好的安全性,建议使用3072位及以上的RSA密钥对。

  • SSH客户端已安装OpenSSH软件。
  • SSH服务器的管理网口IP地址为10.248.103.194/24。
  • 本地用户的认证方式为password,用户名为“admin123”,密码为“YsHsjx_202206”。
  • SSH用户的认证方式为RSA。
  • 配置基本的ACL 2000,允许10.248.103.0/24网段的客户端合法接入SSH服务器。

操作步骤

  1. 配置SSH服务器的管理网口IP地址。
    <HUAWEI> system-view
    [HUAWEI] sysname SSH Server
    [SSH Server] interface meth 0/0/0
    [SSH Server-MEth0/0/0] ip address 10.248.103.194 255.255.255.0
    [SSH Server-MEth0/0/0] quit
  2. 在SSH服务器端生成本地密钥对。
    [SSH Server] rsa local-key-pair create
    The key name will be:Host
    The range of public key size is (2048, 4096).
    NOTE: Key pair generation will take a short while.
    Please input the modulus [default = 3072]:3072
  3. 配置SSH服务器的VTY用户界面。
    [SSH Server] user-interface vty 0 4
    [SSH Server-ui-vty0-4] authentication-mode aaa
    [SSH Server-ui-vty0-4] protocol inbound ssh
    [SSH Server-ui-vty0-4] quit

    若配置登录协议为SSH,则设备将自动禁止Telnet功能。

  4. 在服务器端创建本地用户,并配置用户的接入类型。
    [SSH Server] aaa
    [SSH Server-aaa] local-user admin123 password
    Please configure the login password (8-128)
    It is recommended that the password consist of at least 2 types of characters, including lowercase letters, uppercase letters, numerals and special characters. 
    Please enter password:                                      
    Please confirm password:                               
    [SSH Server-aaa] local-user admin123 service-type ssh
    [SSH Server-aaa] local-user admin123 privilege level 3
    [SSH Server-aaa] quit
  5. 在服务器端创建SSH用户,并配置认证方式。
    [SSH Server] ssh user admin123
    [SSH Server] ssh user admin123 authentication-type rsa
  6. 配置SSH服务器的公钥算法、加密算法、密钥交换算法列表、HMAC认证算法和最小密钥长度。
    [SSH Server] ssh server cipher aes128_ctr aes256_ctr aes192_ctr aes128_gcm aes256_gcm
    [SSH Server] ssh server hmac sha2_256 sha2_512
    [SSH Server] ssh server key-exchange dh_group_exchange_sha256 dh_group16_sha512
    [SSH Server] ssh server publickey rsa_sha2_256 rsa_sha2_512
    [SSH Server] ssh server dh-exchange min-len 3072
  7. SSH客户端使用OpenSSH创建RSA密钥对,并将密钥对中的公钥拷贝至SSH服务器。

    进入Windows的命令行提示符,创建RSA密钥对,并保存到本地id_rsa.pub文件中(以下内容仅为示例)。

    C:\Users\User1> ssh-keygen -t rsa
    Generating public/private rsa key pair.
    Enter file in which to save the key (C:\Users\User1/.ssh/id_rsa):
    Enter passphrase (empty for no passphrase):
    Enter same passphrase again:
    Your identification has been saved in C:\Users\User1/.ssh/id_rsa.
    Your public key has been saved in C:\Users\User1/.ssh/id_rsa.pub.
    The key fingerprint is:
    SHA256:c43yubJjCUjY3JqH0aVZwJFM3gWJcH4YI5+4HUDAIqo 
    The key's randomart image is:
    +---[RSA 3072]----+
    | ..o==B=.o.      |
    |o .  O=*+.       |
    |o. +.oB=o        |
    |. . =o=o   o     |
    |.  ..*. S o .    |
    |E   = o  = .     |
    |     . . .o      |
    |        =  .     |
    |       ..+.      |
    +----[SHA256]-----+
  8. SSH服务器编辑SSH客户端OpenSSH生成的公钥,并将编辑后的公钥分配给SSH用户。
    [SSH Server] rsa peer-public-key rsa01 encoding-type openssh
    [SSH Server-rsa-public-key] public-key-code begin
    [SSH Server-rsa-public-key-rsa-key-code] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCg5Ag490i6ilB7QuCVb35B8RJEh1DIYB88h2p1qjdh7qdMQv8rpJaVAgQWxwzKZO0XdFuz4ReGQzTCSf7Det7Ajicddw3qi+6P8hRqZj6MPdLg/o3RN4aPCfr/LFWCwqJ3gWGHlOC7qqjRk+6pySVoiWcSk5/elBkU7WVk/cSWrt4qFXJV373OCesKcEVeDvAa1Tvx6L3LQroBqUO0EXzDgOthPCmOqiqvS5h3JipzqVsesdSKjeInooCQzSOv5eePpBcFcIvU6wFiLIZ5vnf6YtypgTVzHuje/sh4xM7Iuuon7AYXKHT8NpO9jd9zA/lKaRPXyDtei1O1Bt/5lxnn 
    [SSH Server-rsa-public-key-rsa-key-code] public-key-code end
    [SSH Server-rsa-public-key] peer-public-key end
    [SSH Server] ssh user admin123 assign rsa-key rsa01
  9. 开启STelnet功能,并配置用户的服务类型为STelnet。
    [SSH Server] stelnet server enable
    [SSH Server] ssh server-source all-interface
    [SSH Server] ssh user admin123 service-type stelnet
  10. 配置ACL规则。
    [SSH Server] acl 2000
    [SSH Server-acl4-basic-2000] rule permit source 10.248.103.0 24
    [SSH Server-acl4-basic-2000] quit
    [SSH Server] ssh server acl 2000

检查配置结果

客户端通过OpenSSH软件登录SSH服务器。进入Windows的命令行提示符,执行OpenSSH命令,通过STelnet方式访问设备。

C:\Users\User1> ssh admin123@10.248.103.194
Enter passphrase for key 'C:\Users\User/.ssh/id_rsa':
Info: The max number of VTY users is 21, the number of current VTY users online is 4, and total number of terminal users online is 4.
      The current login time is 2020-12-15 15:58:03.
<SSH Server>

配置脚本

#
sysname SSH Server
#
acl number 2000
 rule 5 permit source 10.248.103.0 0.0.0.255
#
rsa peer-public-key rsa01 encoding-type openssh
 public-key-code begin
  ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCg5Ag490i6ilB7QuCVb35B8RJEh1DIYB88h2p1qjdh7qdMQv8rpJaVAgQWxwzKZO0XdFuz4ReGQzTCSf7Det7Ajicddw3qi+6P8hRqZj6MPdLg/o3RN4aPCfr/LFWCwqJ3gWGHlOC7qqjRk+6pySVoiWcSk5/elBkU7WVk/cSWrt4qFXJV373OCesKcEVeDvAa1Tvx6L3LQroBqUO0EXzDgOthPCmOqiqvS5h3JipzqVsesdSKjeInooCQzSOv5eePpBcFcIvU6wFiLIZ5vnf6YtypgTVzHuje/sh4xM7Iuuon7AYXKHT8NpO9jd9zA/lKaRPXyDtei1O1Bt/5lxnn rsa-key
 public-key-code end
 peer-public-key end
#
aaa
 local-user admin123 password irreversible-cipher $1d$+,JS+))\\2$KVNj(.3`_5x0FCKGv}H&.kUTI`Ff&H*eBqO.ua>)$
 local-user admin123 service-type terminal ssh
 local-user admin123 privilege level 3
#
interface MEth0/0/0
 ip address 10.248.103.194 255.255.255.0
#
stelnet server enable
ssh user admin123
ssh user admin123 authentication-type rsa
ssh user admin123 assign rsa-key rsa01
ssh user admin123 service-type stelnet
ssh server-source all-interface
ssh server acl 2000
#
ssh server cipher aes128_ctr aes256_ctr aes192_ctr aes128_gcm aes256_gcm
ssh server hmac sha2_256 sha2_512
ssh server key-exchange dh_group_exchange_sha256 dh_group16_sha512
ssh server publickey rsa_sha2_256 rsa_sha2_512
ssh server dh-exchange min-len 3072
#
user-interface vty 0 4
 authentication-mode aaa
 protocol inbound ssh
#
return
阅读剩余
THE END