A new box for fun 🙂
Thanks to my colleagues I have opportunity to test Huawei Secospace USG6300.
A rental period is not long, so let’s start from the beginning.
Telnet and SSH
Configure IP address of firewall’s interface and assign it to trust zone:
[USG6300]interface GigabitEthernet 0/0/7 [USG6300-GigabitEthernet0/0/7]ip address 172.16.1.1 24 [USG6300]firewall zone trust [USG6300-zone-trust]add interface GigabitEthernet 0/0/7
Enable telnet and SSH services on that interface:
[USG6300]interface GigabitEthernet 0/0/7 [USG6300-GigabitEthernet0/0/7]service-manage telnet permit [USG6300-GigabitEthernet0/0/7]service-manage ssh permit
Create local users for telnet and SSH access:
[USG6300]aaa [USG6300-aaa]manager-user vty_labnario [USG6300-aaa-manager-user-vty_labnario]password cipher Labnario123 [USG6300-aaa-manager-user-vty_labnario]service-type telnet [USG6300-aaa-manager-user-vty_labnario]level 15 # manager-user ssh_labnario password cipher %@%@*;-$=&1LSK4n^9Tn)Ny!H,#w3&0~LrT%*W@gFyXV4LT,"2)$%@%@ service-type ssh level 15 ftp-directory hda1: ssh authentication-type password ssh service-type stelnet #
Set authentication method for VTY interfaces:
[USG6300]user-interface vty 0 4 [USG6300-ui-vty0-4]authentication-mode aaa
Enable servers for configured services:
[USG6300]telnet server enable [USG6300]stelnet server enable
To complete SSH configuration, create RSA key:
[USG6300]rsa local-key-pair create 12:06:32 2015/03/31 The key name will be: USG6300_Host The range of public key size is (512 ~ 2048). NOTES: A key shorter than 2048 bits may cause security risks. The generation of a key longer than 512 bits may take several minutes. Input the bits in the modulus[default = 2048]: Generating keys... .+++ .............+++ .............++++++++ .............++++++++ [USG6300]
Let’s verify access to the device:
*********************************************************** * All rights reserved 2014 * * Without the owner's prior written consent, * * no decompiling or reverse-engineering shall be allowed. * * Notice: * * This is a private communication system. * * Unauthorized access or use may lead to prosecution. * *********************************************************** Warning: Telnet is not a secure protocol, and it is recommended to use Stelnet. Login authentication Username:vty_labnario Password: Note: The max number of VTY users is 5, and the current number of VTY users on line is 1. NOTICE:This is a private communication system. Unauthorized access or use may lead to prosecution. <USG6300> First time login or password is overtime, Please change your password. Please input new password:********** Please confirm new password:********** Note: The max number of VTY users is 5, and the current number of VTY users on line is 1. NOTICE:This is a private communication system. Unauthorized access or use may lead to prosecution. <USG6300>
login as: ssh_labnario
ssh_labnario@172.16.1.1's password:
***********************************************************
* All rights reserved 2014 *
* Without the owner's prior written consent, *
* no decompiling or reverse-engineering shall be allowed. *
* Notice: *
* This is a private communication system. *
* Unauthorized access or use may lead to prosecution. *
***********************************************************
Note: The max number of VTY users is 5, and the current number
of VTY users on line is 1.
----------------------------------------------------------------------------
User last login information:
----------------------------------------------------------------------------
Access Type: SSH
IP-Address : 172.16.1.10
Time : 2015-03-31 12:08:16 +01:00
State : Login Succeeded
----------------------------------------------------------------------------
<USG6300>
Note: The max number of VTY users is 5, and the current number
of VTY users on line is 1.
NOTICE:This is a private communication system.
Unauthorized access or use may lead to prosecution.
<USG6300>
As you could see, password must be changed after the first login. You can disable modifying the password by the command:
[USG6300-aaa]undo manager-user password-modify enable
SFTP
As secure FTP is related to SSH, let’s try to finish this article with SFTP configuration:
# manager-user sftp_lab password cipher %@%@!siuS<f},>]>IM,2!|,#K!ul&;<u1g4:%'e8[NIfPZF@*'{v%@%@ service-type ssh level 15 ftp-directory hda1: ssh authentication-type password ssh service-type sftp # [USG6300]sftp server enable Info: Succeeded in starting the SFTP server.
To verify, we can use PSFTP software:
psftp> open 172.16.1.1 login as: sftp_lab Using username "sftp_lab". sftp_lab/172.16.1.1's password: Remote working directory is / psftp>