Ssh; Ssh Overview; Basic Configuration Of Ssh - Zte ZXR10 2900 Series User Manual

Intelligent
Table of Contents

Advertisement

Example 2: Only allow the network management user to access
the switch from 10.40.92.212 through Telnet SSH SNMP Web.
zte(cfg)#set remote-access specific
zte(cfg)#set remote-access ipaddress 10.40.92.212
zte(cfg)#show remote-access
Whether check remote manage address: YES
Allowable remote manage address(es) and application(s)::
10.40.92.212/255.255.255.255 snmp, telnet, ssh, web
Example 3: Allow the network management user to access the
switch from any IP address through Telnet SSH SNMP Web.
zte(cfg)#set remote-access any
zte(cfg)#show remote-access
Whether check remote manage address: NO
Allowable remote manage address(es) and application(s):
any

SSH

SSH Overview

The secure shell (SSH) is a protocol created by Network Working
Group of the IETF, which is used to offer secure remote access and
other secure network services over an insecure network.
The purpose of the SSH protocol is to solve the security prob-
lems in interconnected networks, and to offer a securer substitute
for Telnet and Rlogin (Although the present development of the
SSH protocol has far exceeded the remote access function scope),
therefore, the SSH connection protocol shall support interactive
session.
The SSH can be used to encrypt all transmitted data. Even if these
data is intercepted, no useful information can be obtained.
At present, the SSH protocol has two incompatible versions: SSH
v1.x and SSH v2.x. This switch only supports SSH v2.0 and uses
the password authentication mode. The SSH uses port 22.

Basic Configuration of SSH

The SSH configuration on the switch includes the following con-
tents:
Command
set ssh {enable|disable}
zte(cfg)#
show ssh
zte(cfg)#
Confidential and Proprietary Information of ZTE CORPORATION
Chapter 8 Network Management
Function
This enables or disables

SSH.

This displays the SSH
configuration and
status.
195

Advertisement

Table of Contents
loading

Table of Contents