Secure Shell Commands; Table 4-13. Secure Shell Commands - Enterasys Matrix-V V2H124-24 Configuration Manual

Matrix v-series fast ethernet switch
Hide thumbs Also See for Matrix-V V2H124-24:
Table of Contents

Advertisement

4
Command Line Interface
Example
Console(config)#ip telnet server
Console(config)#
Related Commands
ip telnet port (4-33)

Secure Shell Commands

The Berkley-standard includes remote access tools originally designed for Unix
systems. Some of these tools have also been implemented for Microsoft Windows
and other environments. These tools, including commands such as rlogin (remote
login), rsh (remote shell), and rcp (remote copy), are not secure from hostile attacks.
The Secure Shell (SSH) includes server/client applications intended as a secure
replacement for the older Berkley remote access tools. SSH can also provide
remote management access to this switch as a secure replacement for Telnet.
When a client contacts the switch via the SSH protocol, the switch uses a public-key
that the client must match along with a local user name and password for access
authentication. SSH also encrypts all data transfers passing between the switch and
SSH-enabled management station clients, and ensures that data traveling over the
network arrives unaltered.
This section describes the commands used to configure the SSH server. However,
note that you also need to install a SSH client on the management station when
using this protocol to configure the switch.
Note: The switch supports SSH version 1.5 and 2.0.
Command
ip ssh server
ip ssh timeout
ip ssh
authentication-retries
ip ssh server-key size
copy tftp public-key
delete public-key
ip ssh crypto host-key
generate
ip ssh crypto zeroize
ip ssh save host-key
disconnect
show ip ssh
show ssh
4-34

Table 4-13. Secure Shell Commands

Function
Enables the SSH server on the switch
Specifies the authentication timeout for the SSH server
Specifies the number of retries allowed by a client
Sets the SSH server key size
Copies the user's public key from a TFTP server to the switch
Deletes the public key for the specified user
Generates the host key
Clear the host key from RAM
Saves the host key from RAM to flash memory
Terminates a line connection
Displays the status of the SSH server and the configured values
for authentication timeout and retries
Displays the status of current SSH sessions
Mode
Page
GC
4-36
GC
4-37
GC
4-37
GC
4-38
PE
4-66
PE
4-38
PE
4-39
PE
4-39
PE
4-40
PE
4-18
PE
4-40
PE
4-41

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Matrix-v v2h124-24fxMatrix-v v2h124-24p

Table of Contents