充齐治堡垒机修改SSH版本

充齐治堡垒机修改SSH版本,第1张

概述由于产品版本原因,登录的设备只能使用SSH Version 1进行登录 ,经过与TAC确认,需要后台修改参数,修改过程如下: [ [email protected] ~]# ssh shterm21 FIPS integrity verification test failed. Warning: Permanently added ‘shterm21,10.0.0.21‘ (RSA) to th 由于产品版本原因,登录的设备只能使用SSH Version 1进行登录 ,经过与TAC确认,需要后台修改参数,修改过程如下:
[ [email protected] ~]# ssh shterm21
FIPS integrity verification test Failed.
Warning: Permanently added ‘shterm21,10.0.0.21‘ (RSA) to the List of kNown hosts.
Last login: Wed Nov 28 11:55:24 2018 from 10.1.13.19

Main Menu

Date and Time Network Configuration Service Management administrators
H. High Availability
S. System Status
T. System Tools
A. Application Server
Enter selection: root
Challenge is 2644853635,enter password to continue: 64575114
[[email protected] ~]#
[[email protected] ~]#
[[email protected] ~]#
[[email protected] ~]#
[[email protected] ~]#
[[email protected] ~]#
[[email protected] ~]#
[[email protected] ~]#
[[email protected] ~]# vim /etc/ssh/ssh_config Host * ForwardAgent no ForwardX11 no RhostsRSAAuthentication no RSAAuthentication yes PasswordAuthentication yes HostbasedAuthentication no BatchMode no CheckHostIP yes AddressFamily any ConnectTimeout 0 Tunnel no TunnelDevice any:any PermitLocalCommand no VisualHostKey no

Host *
EscapeChar none
ServerAliveInterval 60
StrictHostKeyChecking no
UserKNownHostsfile /dev/null
GSSAPIAuthentication no
ForwardX11Trusted yes
SendEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_ColLATE LC_MONETARY LC_MESSAGES
SendEnv LC_PAPER LC_name LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
SendEnv LC_IDENTIFICATION LC_ALL LANGUAGE
SendEnv XMODIFIERS
Cipher des
PreferredAuthentications publickey,password,keyboard-interactive,gssAPI-with-mic,hostbased
Host 10.0.0.253
Protocol 1
"/etc/ssh/ssh_config" 30L,823C written
[[email protected] ~]#
[[email protected] ~]#
[[email protected] ~]#
[[email protected] ~]#
[[email protected] ~]# /etc/init.d/sshd restartStopPing sshd: [ OK ]Starting sshd: [

总结

以上是内存溢出为你收集整理的充齐治堡垒机修改SSH版本全部内容,希望文章能够帮你解决充齐治堡垒机修改SSH版本所遇到的程序开发问题。

如果觉得内存溢出网站内容还不错,欢迎将内存溢出网站推荐给程序员好友。

欢迎分享,转载请注明来源:内存溢出

原文地址: http://outofmemory.cn/yw/1024393.html

(0)
打赏 微信扫一扫 微信扫一扫 支付宝扫一扫 支付宝扫一扫
上一篇 2022-05-23
下一篇 2022-05-23

发表评论

登录后才能评论

评论列表(0条)

保存