Example 2: Only allow the network management user to access
the switch from 10.40.92.212 through Telnet SSH SNMP Web.
zte(cfg)#set remote-access specific
zte(cfg)#set remote-access ipaddress 10.40.92.212
zte(cfg)#show remote-access
Whether check remote manage address: YES
Allowable remote manage address(es) and application(s)::
10.40.92.212/255.255.255.255 snmp, telnet, ssh, web
Example 3: Allow the network management user to access the
switch from any IP address through Telnet SSH SNMP Web.
zte(cfg)#set remote-access any
zte(cfg)#show remote-access
Whether check remote manage address: NO
Allowable remote manage address(es) and application(s):
any
SSH
SSH Overview
The secure shell (SSH) is a protocol created by Network Working
Group of the IETF, which is used to offer secure remote access and
other secure network services over an insecure network.
The purpose of the SSH protocol is to solve the security prob-
lems in interconnected networks, and to offer a securer substitute
for Telnet and Rlogin (Although the present development of the
SSH protocol has far exceeded the remote access function scope),
therefore, the SSH connection protocol shall support interactive
session.
The SSH can be used to encrypt all transmitted data. Even if these
data is intercepted, no useful information can be obtained.
At present, the SSH protocol has two incompatible versions: SSH
v1.x and SSH v2.x. This switch only supports SSH v2.0 and uses
the password authentication mode. The SSH uses port 22.
Basic Configuration of SSH
The SSH configuration on the switch includes the following con-
tents:
Command
set ssh {enable|disable}
zte(cfg)#
show ssh
zte(cfg)#
Confidential and Proprietary Information of ZTE CORPORATION
Chapter 8 Network Management
Function
This enables or disables
SSH.
This displays the SSH
configuration and
status.
195