Table 4-15 Secure Shell Commands - SMC Networks SMC TigerStack 1000 SMC8724M Management Manual

Smc networks gigabit ethernet switch management guide
Hide thumbs Also See for SMC TigerStack 1000 SMC8724M:
Table of Contents

Advertisement

The Secure Shell (SSH) includes server/client applications intended as a
secure replacement for the older Berkley remote access tools. SSH can also
provide remote management access to this switch as a secure replacement
for Telnet. When a client contacts the switch via the SSH protocol, the
switch uses a public-key that the client must match along with a local user
name and password for access authentication. SSH also encrypts all data
transfers passing between the switch and SSH-enabled management
station clients, and ensures that data traveling over the network arrives
unaltered.
This section describes the commands used to configure the SSH server.
However, note that you also need to install an SSH client on the
management station when using this protocol to configure the switch.
Note: The switch supports both SSH Version 1.5 and 2.0.
Command
ip ssh server
ip ssh timeout
ip ssh
authentication-retries
ip ssh server-key size Sets the SSH server key size
copy tftp public-key Copies the user's public key from a TFTP
delete public-key
ip ssh crypto
host-key generate
ip ssh crypto zeroize Clear the host key from RAM
ip ssh save host-key
disconnect

Table 4-15 Secure Shell Commands

Function
Enables the SSH server on the switch
Specifies the authentication timeout for the
SSH server
Specifies the number of retries allowed by a
client
server to the switch
Deletes the public key for the specified user PE
Generates the host key
Saves the host key from RAM to flash
memory
Terminates a line connection
S
M
YSTEM
ANAGEMENT
C
OMMANDS
Mode Page
GC
4-48
GC
4-49
GC
4-50
GC
4-50
PE
4-84
4-51
PE
4-51
PE
4-52
PE
4-53
PE
4-23
4-45

Advertisement

Table of Contents
loading

Table of Contents