I am Zhao Jiexu, a lecturer at 51CTO Academy. On the occasion of the 51CTO Academy "4.20 IT Recharge Festival" (April 19-20), I would like to share with you my experience of Huawei Telnet and stelnet login methods. The reasons why various authentication and login methods feel confusing can be summarized as follows: 1. Complex configuration commands (objective reasons) 2. Not really understanding the configuration ideas (subjective reasons) So today, let’s experience various authentication and login methods through experiments so that everyone can have clear ideas while learning. The experimental topology is relatively simple. The two routers R2 and R3 are connected to the two ports of the switch respectively. The interface addresses on the routers are as shown in the figure, so that both sides can ping through! 1. Simple Telnet 1. Let's start with Telnet. Enable Telnet service on R3. To log in to R3, you must enable the telnet channel, set the login method to password and set the password to huawei.
Telnet R3 on R2 and enter the password huawei to log in to R3, as shown below:
2. The problem is that in this R3 mode, typing system-view does not enter the system view mode. What is the reason? Use the question mark to view the available commands, and the result is that there is no such command (as shown below). The reason is that the user permissions are not set, so when configuring user login, the user permissions are generally configured .
3. Configure the user level on R3 to a maximum of 15
It's that simple to do it, just understand the whole process! 2. Telnet based on aaa authentication The above configuration is easy to implement, but the problem is here! All administrators who use the same password to Telnet to R3 are still not safe. One day, an administrator is dissatisfied with the company and changes the login password "huawei", which makes other login passwords unusable! Solution: Each administrator is assigned a user name and password, and each uses his or her own account and password to log in. The authentication method is AAA authentication, and each user is assigned an account and password.
Set up a second account and password.
Configure the authentication mode on the vty channel to aaa.
Note that aaa is a local management. The created username and password can be used for Telnet service as well as other services. Therefore, the authentication mode should be specified as aaa on the vty channel. vty 0 4 (allows 5 users to access the device at the same time). If the sixth user Telnet accesses the device, the connection will fail. 3. stelnet Continue to explore the problem. Telnet uses AAA authentication to set different users and passwords, which enhances security. However, by capturing and analyzing Telnet's data packets, you will find that the username and password can be captured, so these usernames and passwords are not safe. How to solve it? Use stelnet digital certificate authentication and SSH protocol to solve the problem of Telnet transmitting plain text. First, create a key pair.
At this time, the SSH protocol is used for authentication, so the protocol type SSH for inbound traffic is defined in the vty channel.
The user is still the user managed by aaa before. You can add SSH service type. The password level has been configured before. If you have a new configuration, you must remember to set it . Remember to assign permission level as long as the user is set.
After configuring aaa, confirm that ssh uses a password for authentication. This should be the default and you don't need to type it.
Check the status of ssh server is closed.
So you need to enable the stelnet server service on the server side.
After the server configuration is complete, return to R2 to start the first connection and load the certificate on the server.
Login successful. 51CTO Academy 4.20 IT Charging Festival (On the 19th and 20th, 100 video courses are free to grab, and members can enjoy a 40% discount on video courses, non-members can enjoy a 30% discount, and packages can enjoy an additional 20% discount, and micro-jobs can enjoy a huge discount of 2,000 yuan) Activity link: http://edu..com/activity/lists/id-47.html?wenzhang Related video tutorials: IT technology exchanges at 51CTO Forum http://bbs..com/thread-1491072-1.html Learn Network ACL Technology Online Course http://edu..com/course/course_id-8148.html Learn site-to-site VPN technology online course http://edu..com/course/course_id-7485.html Learn Policy Routing Technology Online Course http://edu..com/course/course_id-8103.html |
<<: "Internet +" activates new driving force for Nong'an's development
>>: 5G mobile network is accelerating and may be commercially available in 2019
After the rapid development in 2020, 2021 is a cr...
Review the above: Multi-access Edge Computing – P...
At a special ceremony held last night, GSMA prese...
As science and technology develops at an increasi...
If you want to modify the configuration of the wi...
We have shared product information of many data c...
Recently, the Ministry of Industry and Informatio...
As more employees work remotely from home during ...
80VPS is an early-established Chinese hosting com...
When checking the eligibility for number portabil...
For years, it seemed like the hype about 5G would...
VPSMS is shared in the blog for the first time. I...
[51CTO.com original article] On June 21, the WOT2...
[Updated on February 27, 2024] Bandwagonhost has ...
After several twists and turns, China's three...