Ssh; Introduction To Ssh - Planet XGS3-42000R User Manual

4-slot layer 3 ipv6/ ipv4 routing chassis switch
Table of Contents

Advertisement

Command
Admin Mode
telnet {<ip-addr> | <ipv6-addr>
<hostname>} [<port>]

4.2.2 SSH

4.2.2.1 Introduction to SSH

SSH (Secure Shell) is a protocol which ensures a secure remote access connection to net work devices. It is
based on the reliable TCP/ IP prot ocol. By conducting the mechanism such as key distribution, authentication
and encryption between SSH server and SSH client, a secure connection is established. The information
transferred on this connection is protected from being intercepted and decrypt ed. The Chassis Switch meets
the requirements of SSH2. 0. It supports SSH2.0 client software s uch as SSH S ecure Client and putty. Users
can run the above software to manage the Chassis Switch remotely.
The Chassis Switch presently supports RSA authentication, 3DES cryptography prot ocol and SS H user
password aut hentication etc.
4.2.2.2 SSH Server Configuration Task List
SSH Server Configuration
Command
Global Mode
ssh-server enable
no ssh-server enable
ssh-user <user-nam e> password {0 | 7}
<password>
no ssh-user <user-nam e>
ssh-server timeout <timeout>
no ssh-server timeout
ssh-server authentication-retire s
<authentication-retires>
no ssh-server authentication-retrie s
ssh-server host-key create rsa modulus
<moduls>
Admin Mode
| host
Login to a remote host with the Telnet client
included in the Chassis Switch.
Enable SSH function on the Chassis Switch; the
"no ssh-server enable" command disables SSH
function.
Configure the username and password of SSH
client software for logging on the Chassis Switch;
the "no ssh-user <user-name>" command
deletes the username.
Configure timeout value for SSH authentication;
the "no ssh-server timeout" command restores
the default timeout value for SSH authentication.
Configure the number of times for retrying SSH
authentication; the "no ssh-server
authentication-retries" command restores the
default number of times for retrying SSH
authentication.
Generat e the new RSA host key on the SSH
server.
4-3
Explanation
Explanation

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents