Huawei-R&S-网络工程师实验笔记20190530-FTP上传下载、STelnet登录、SFTP登录

》Huawei-R&S-网络工程师实验笔记20190530-FTP上传下载、STelnet登录、SFTP登录

》》实验开始,参考《Huawei-R&S-网络工程师实验笔记20190524-XXX》中的拓扑图,使用 Huawei eNSP、Wireshark、Oracle VM VirtualBox 等工具软件,并开启了左侧、右侧的路由器AR1、AR2。以下将全部使用代码展示实验过程和理解:

<AR2>sy
Enter system view, return user view with Ctrl+Z.
[AR2]int g0/0/0    
[AR2-GigabitEthernet0/0/0]ip address 202.100.1.4 26
[AR2-GigabitEthernet0/0/0]
May 30 2019 16:16:56-08:00 AR2 %%01IFNET/4/LINK_STATE(l)[0]:The line protocol IP
 on the interface GigabitEthernet0/0/0 has entered the UP state. 
[AR2-GigabitEthernet0/0/0]q
[AR2]dis ip int bri    //查看IP是否配置,要保证与AR1可以互通(AR1设备配置同样动作)
*down: administratively down
^down: standby
(l): loopback
(s): spoofing
The number of interface that is UP in Physical is 2
The number of interface that is DOWN in Physical is 2
The number of interface that is UP in Protocol is 2
The number of interface that is DOWN in Protocol is 2

Interface                         IP Address/Mask      Physical   Protocol  
GigabitEthernet0/0/0              202.100.1.4/26       up         up     //在AR1中ping后发现不通   
GigabitEthernet0/0/1              unassigned           down       down      
GigabitEthernet0/0/2              unassigned           down       down      
NULL0                             unassigned           up         up(s)     
[AR2]
[AR2]int g0/0/0
[AR2-GigabitEthernet0/0/0]ip address 202.100.1.2 30     //重新配置IP,并在AR1中ping看看
[AR2-GigabitEthernet0/0/0]q
[AR2]q
[AR2]ftp server enable     //开启FTP功能
Info: Succeeded in starting the FTP server
[AR2]aaa
[AR2-aaa]local-user tangjun password cipher 123       //用户名tangjun和密码123(cipher保密模式)
Info: Add a new user.
[AR2-aaa]local-user tangjun privilege level 15       //该用户的级别15
[AR2-aaa]local-user tangjun ftp ?      //ftp目录是哪,?查询后续命令
  STRING<1-64>  [drive][path]
  flash:        Device name
[AR2-aaa]local-user tangjun ftp flash:   //有版本命令是local-user tangjun ftp-directory flash:
[AR2-aaa]local-user tangjun service-type ftp     //该用户服务于FTP
[AR2-aaa]q
[AR2]q
<AR2>save updatafile.zip     //保存个配置文件,假定为升级文件,用后续FTP实验
 Are you sure to save the configuration to updatafile.zip? (y/n)[n]:y
  It will take several minutes to save configuration file, please wait.......
  Configuration file had been saved successfully
  Note: The configuration file will take effect after being activated
<AR2>dir
Directory of flash:/

  Idx  Attr     Size(Byte)  Date        Time(LMT)  FileName 
    0  drw-              -  May 30 2019 07:25:55   dhcp
    1  -rw-        121,802  May 26 2014 09:20:58   portalpage.zip
    2  -rw-            655  May 30 2019 08:48:53   updatafile.zip    //升级文件成功创建,将会被拷贝至AR1的根目录下
    3  -rw-          2,263  May 30 2019 07:25:50   statemach.efs
    4  -rw-        828,482  May 26 2014 09:20:58   sslvpn.zip
    5  -rw-            249  May 30 2019 08:15:45   private-data.txt
    6  -rw-            533  May 30 2019 08:15:44   vrpcfg.zip

1,090,732 KB total (784,448 KB free)
<AR2>
<AR1>sy
Enter system view, return user view with Ctrl+Z.
[AR1]int g0/0/0
[AR1-GigabitEthernet0/0/0]ip address 202.100.1.1 30
May 30 2019 16:18:46-08:00 AR1 %%01IFNET/4/LINK_STATE(l)[0]:The line protocol IP
 on the interface GigabitEthernet0/0/0 has entered the UP state. 
[AR1-GigabitEthernet0/0/0]q
[AR1]display ip interface brief
*down: administratively down
^down: standby
(l): loopback
(s): spoofing
The number of interface that is UP in Physical is 3
The number of interface that is DOWN in Physical is 1
The number of interface that is UP in Protocol is 2
The number of interface that is DOWN in Protocol is 2

Interface                         IP Address/Mask      Physical   Protocol  
GigabitEthernet0/0/0              202.100.1.1/30       up         up        //接口配置好了IP
GigabitEthernet0/0/1              unassigned           up         down      
GigabitEthernet0/0/2              unassigned           down       down      
NULL0                             unassigned           up         up(s)     
[AR1]ping 202.100.1.4
  PING 202.100.1.4: 56  data bytes, press CTRL_C to break  //无法连通AR2接口,其IP地址配置错误
    Request time out
    Request time out
    Request time out
    Request time out
    Request time out
  --- 202.100.1.4 ping statistics ---
    5 packet(s) transmitted
    0 packet(s) received
    100.00% packet loss

[AR1]ping 202.100.1.2       //对端设备AR2已重新配置IP,现在重新ping
  PING 202.100.1.2: 56  data bytes, press CTRL_C to break
    Reply from 202.100.1.2: bytes=56 Sequence=1 ttl=255 time=100 ms
    Reply from 202.100.1.2: bytes=56 Sequence=2 ttl=255 time=20 ms
    Reply from 202.100.1.2: bytes=56 Sequence=3 ttl=255 time=10 ms
    Reply from 202.100.1.2: bytes=56 Sequence=4 ttl=255 time=20 ms
    Reply from 202.100.1.2: bytes=56 Sequence=5 ttl=255 time=20 ms
  --- 202.100.1.2 ping statistics ---
    5 packet(s) transmitted
    5 packet(s) received
    0.00% packet loss
    round-trip min/avg/max = 10/34/100 ms     //AR1与AR2网络连通了
[AR1]
<AR1>ftp 202.100.1.2    //通过FTP程序连接到服务器
Trying 202.100.1.2 ...

Press CTRL+K to abort
Connected to 202.100.1.2.
220 FTP service ready.
User(202.100.1.2:(none)):tangjun     //输入用户名
331 Password required for tangjun.
Enter password:        //输入密码
230 User logged in.

[AR1-ftp]get updatafile.zip     //获取数据文件
200 Port command okay.
150 Opening ASCII mode data connection for updatafile.zip.
226 Transfer complete.      //传输成功
FTP: 655 byte(s) received in 0.190 second(s) 3.44Kbyte(s)/sec.
[AR1-ftp]
[AR1-ftp]put flash:/dhcp/dhcp-duid.txt        //上传文件至AR2根目录
200 Port command okay.
150 Opening ASCII mode data connection for dhcp-duid.txt.
 100%     
226 Transfer complete.
FTP: 98 byte(s) sent in 0.180 second(s) 544.44byte(s)/sec.
[AR1-ftp]q
221 Server closing.

<AR2>dir
Directory of flash:/

  Idx  Attr     Size(Byte)  Date        Time(LMT)  FileName 
    0  -rw-             98  May 30 2019 16:50:29   dhcp-duid.txt    //验证确实从AR1上传了该文件
    1  drw-              -  May 30 2019 16:19:26   dhcp
    2  -rw-        121,802  May 26 2014 09:20:58   portalpage.zip
    3  -rw-          2,263  May 30 2019 16:19:19   statemach.efs
    4  -rw-        828,482  May 26 2014 09:20:58   sslvpn.zip

1,090,732 KB total (784,460 KB free)
<AR2>

----------------------------分割线---------------------------

[AR1]int g0/0/0
[AR1-GigabitEthernet0/0/0]ip add 10.1.1.1 24     //配置设备AR1的IP
May 31 2019 01:39:17-08:00 AR1 %%01IFNET/4/LINK_STATE(l)[1]:The line protocol IP
 on the interface GigabitEthernet0/0/0 has entered the UP state. 
[AR1-GigabitEthernet0/0/0]

[AR2]int g0/0/0
[AR2-GigabitEthernet0/0/0]ip add 10.1.1.2 24     //配置设备AR2的IP
May 31 2019 01:40:05-08:00 AR2 %%01IFNET/4/LINK_STATE(l)[1]:The line protocol IP
 on the interface GigabitEthernet0/0/0 has entered the UP state. 

[AR2-GigabitEthernet0/0/0]ping 10.1.1.1      //ping命令测试链路连通性
  PING 10.1.1.1: 56  data bytes, press CTRL_C to break
    Reply from 10.1.1.1: bytes=56 Sequence=1 ttl=255 time=80 ms
    Reply from 10.1.1.1: bytes=56 Sequence=2 ttl=255 time=10 ms
    Reply from 10.1.1.1: bytes=56 Sequence=3 ttl=255 time=20 ms
    Reply from 10.1.1.1: bytes=56 Sequence=4 ttl=255 time=10 ms
    Reply from 10.1.1.1: bytes=56 Sequence=5 ttl=255 time=20 ms
  --- 10.1.1.1 ping statistics ---
    5 packet(s) transmitted
    5 packet(s) received
    0.00% packet loss
    round-trip min/avg/max = 10/28/80 ms

[AR2-GigabitEthernet0/0/0]q    
[AR2]rsa local-key-pair create     //生成本地RSA主机秘钥对
The key name will be: Host
% RSA keys defined for Host already exist.
Confirm to replace them? (y/n)[n]:y
The range of public key size is (512 ~ 2048).
NOTES: If the key modulus is greater than 512,
       It will take a few minutes.
Input the bits in the modulus[default = 512]:
Generating keys...
.......++++++++++++
...++++++++++++
................++++++++
..++++++++

[AR2]dis rsa local-key-pair public      //查看本地秘钥对中的公钥信息
=====================================================
Time of Key pair created: 2019-05-31 01:42:10-08:00  //公钥生成的时间
Key name: Host       //公钥的名称
Key type: RSA encryption Key       //公钥的类型
=====================================================
Key code:
3047
  0240
    D9ECDB6E 9EECEFAA 41985FA2 B3E9B851 FEBF8F95
    A0E9AC13 3E76F9DB CCD8C7F6 430C6860 CBA492EC
    5DC2BEE5 3BBDAFE4 B5AADFD9 E67F0750 C9AAA4F9
    1BDA1F4D 
  0203
    010001
=====================================================
Time of Key pair created: 2019-05-31 01:42:12-08:00
Key name: Server
Key type: RSA encryption Key
=====================================================
Key code:
3067
  0260
    D2F5696B 7E37CF47 A0BC83A3 E493B894 07AD556D
    AD009F7A 6B84CAD6 A04D41DA E7E6E681 1F033564
    DCB9D67B C49B168C 894A88A3 CE999F66 02110D8F
    85F1680C D9CD8B18 DF740263 26BFEC8C FBD9D98A
    A26BFBD2 CE71A57F 345BC3A8 7D8E4737 
  0203
    010001
[AR2]
[AR2]user-interface vty 0 1     //配置VTY虚拟用户界面
[AR2-ui-vty0-1]authentication-mode aaa     //配置用户AAA授权验证模式
[AR2-ui-vty0-1]protocol inbound ?     //指定VTY界面只支持?什么协议
  all     All protocols
  ssh     SSH protocol
  telnet  Telnet protocol
[AR2-ui-vty0-1]protocol inbound ssh     //指定VTY用户界面只支持SSH协议
[AR2-ui-vty0-1]aaa
[AR2-aaa]local-user tangjun password cipher 123     //配置本地用户tangjun和密文口令123
Info: Add a new user.
[AR2-aaa]local-user tangjun service-type ssh     //配置本地用户tangjun的接入类型为SSH
[AR2-aaa]local-user tangjun privilege level 15      //配置本地用户tangjun的优先级为15最高级
[AR2-aaa]q        //此处务必要回退至[AR2],方可使用ssh命令
[AR2]ssh user tangjun authentication-type password    //指定用户tangjun为SSH用户,并延续密码认证方式
 Authentication type setted, and will be in effect next time
[AR2]stelnet server enable      //开启设备的STelnet功能(即开启SSH服务器)
Info: Succeeded in starting the STELNET server.

[AR2]dis ssh user-information tangjun      //在SSH服务器查看SSH用户配置信息
 -------------------------------------------------------------------------------
 Username         Auth-type          User-public-key-name
 -------------------------------------------------------------------------------
 tangjun          password           null                       //可以观察所配置的用户名及认证方式    
 -------------------------------------------------------------------------------

[AR2]dis ssh server status       //查看SSH服务器全局配置信息
 SSH version                         :1.99  
 SSH connection timeout              :60 seconds
 SSH server key generating interval  :0 hours
 SSH Authentication retries          :3 times
 SFTP Server                         :Disable
 Stelnet server                      :Enable       //启用状态

[AR1]ssh client first-time enable     //开启SSH用户端AR1首次认证功能
[AR1]stelnet 10.1.1.2    //连接对端的SSH服务器
Please input the username:tangjun    //输入用户名
Trying 10.1.1.2 ...
Press CTRL+K to abort
Connected to 10.1.1.2 ...
The server is not authenticated. Continue to access it? (y/n)[n]:y     //因首次认证,将不对RSA公钥进行有效性检查
May 31 2019 01:52:49-08:00 AR1 %%01SSH/4/CONTINUE_KEYEXCHANGE(l)[0]:The server h
ad not been authenticated in the process of exchanging keys. When deciding wheth
er to continue, the user chose Y. 
[AR1]
Save the server's public key? (y/n)[n]:y      //登录后系统会自动分配RSA公钥,留待下次登录认证
The server's public key will be saved with the name 10.1.1.2. Please wait...
May 31 2019 01:52:55-08:00 AR1 %%01SSH/4/SAVE_PUBLICKEY(l)[1]:When deciding whet
her to save the server's public key 10.1.1.2, the user chose Y. 
[AR1]
Enter password:
<AR2>     //成功远程登录AR2
<AR2>dis ssh server session      //查看当前SSH服务器端的会话连接信息
 --------------------------------------------------------------------
 Conn   Ver   Encry     State  Auth-type        Username
 --------------------------------------------------------------------
 VTY 0  2.0   AES       run    password         tangjun        //可发现:已通过VTY线路0远程登录上了                 
 --------------------------------------------------------------------
<AR2>
[AR2]aaa
[AR2-aaa]local-user tangjun2 password cipher 123    //配置本地用户tangjun2和密文口令123
Info: Add a new user.    
[AR2-aaa]local-user tangjun2 service-type ssh     //配置本地用户tangjun2的接入类型为SSH
[AR2-aaa]local-user tangjun2 privilege level 3    //配置本地用户tangjun2的优先级为3管理级
[AR2-aaa]local-user tangjun2 ftp-directory flash:    
[AR2-aaa]q
[AR2]ssh user tangjun2 authentication-type password     //指定用户tangjun2为SSH用户,并延续密码认证方式
 Authentication type setted, and will be in effect next time
[AR2]sftp server enable       //开启设备的SFTP功能
Info: Succeeded in starting the SFTP server.

[AR2]dis ssh server status 
 SSH version                         :1.99  
 SSH connection timeout              :60 seconds
 SSH server key generating interval  :0 hours
 SSH Authentication retries          :3 times
 SFTP Server                         :Enable
 Stelnet server                      :Enable

<AR1>sy
Enter system view, return user view with Ctrl+Z.
[AR1]sftp 10.1.1.2     //连接对端AR2的SSH服务器(注意在系统视图下敲命令)
Please input the username:tangjun2
Trying 10.1.1.2 ...
Press CTRL+K to abort
Enter password:
sftp-client>        //已成功登录AR2

[AR2]dis ssh server session       //查看SSH服务器全局配置信息
 --------------------------------------------------------------------
 Conn   Ver   Encry     State  Auth-type        Username
 --------------------------------------------------------------------
 VTY 0  2.0   AES       run    password         tangjun2          //可发现:已通过VTY线路0远程登录上了               
 --------------------------------------------------------------------

 

posted @ 2019-05-31 01:28  俊者天下  阅读(1078)  评论(0编辑  收藏  举报