![Planet IGSW-2840 User Manual Download Page 445](http://html1.mh-extra.com/html/planet/igsw-2840/igsw-2840_user-manual_1563287445.webp)
User’s Manual of IGSW-2840
445
5.12.8 Secure Shell Commands
This section describes the commands used to configure the SSH server. However, note that you also need to install a SSH
client on the management station when using this protocol to configure the switch.
The Industrial Managed Switch supports both SSH Version 1.5 and 2.0.
Command
Function
Mode
ip ssh server
Enables the SSH server on the switch
GC
ip ssh timeout
Specifies the authentication timeout for the SSH server
GC
ip ssh authentication-retries
Specifies the number of retries allowed by a client
GC
ip ssh server-key size
Sets the SSH server key size
GC
copy tftp public-key
Copies the user’s public key from a TFTP server to the switch
PE
delete public-key
Deletes the public key for the specified user
PE
ip ssh crypto host-key generate Generates the host key
PE
ip ssh crypto zeroize
Clear the host key from RAM
PE
ip ssh save host-key
Saves the host key from RAM to flash memory
PE
disconnect
Terminates a line connection
PE
show ip ssh
Displays the status of the SSH server and the configured
valuesfor authentication timeout and retries
PE
show ssh
Displays the status of current SSH sessions
PE
show public-key
Shows the public key for the specified user or for the host
PE
show users
Shows SSH users, including privilege level and public key type PE
Table 5-36
Secure Shell Commands
Configuration Guidelines
The SSH server on this Industrial Managed Switch supports both password and public key authentication. If password
authentication is specified by the SSH client, then the password can be authenticated either locally or via a RADIUS or
remote authentication server, as specified by the authentication login command. If public key authentication is
specified by the client, then you must configure authentication keys on both the client and the Industrial Managed Switch as
described in the following section. Note that regardless of whether you use public key or password authentication, you still have
to generate authentication keys on the Industrial Managed Switch and enable the SSH server.
To use the SSH server, complete these steps:
1.
Generate a Host Key Pair – Use the ip ssh crypto host-key generate command to create a host public/private key pair.
2.
Provide Host Public Key to Clients – Many SSH client programs automatically import the host public key during the initial
connection setup with the switch. Otherwise, you need to manually create a known hosts file on the management station
Summary of Contents for IGSW-2840
Page 23: ...User s Manual of IGSW 2840 23 A 2 10 100Mbps 10 100Base TX 665 APPENDEX B GLOSSARY 667 ...
Page 110: ...User s Manual of IGSW 2840 110 Figure 4 3 14 SNMPv3 View Edit screenshot ...
Page 119: ...User s Manual of IGSW 2840 119 Figure 4 4 7 Mirror Port Configuration screenshot ...
Page 205: ...User s Manual of IGSW 2840 205 Multicast Service Multicast flooding ...
Page 216: ...User s Manual of IGSW 2840 216 Figure 4 9 7 IGMP Member Port Table screenshot ...
Page 280: ...User s Manual of IGSW 2840 280 Figure 4 11 19 SSH Host Key Settings screenshot ...
Page 315: ...User s Manual of IGSW 2840 315 Figure 4 11 44 MAC ACL Settings screenshot ...
Page 317: ...User s Manual of IGSW 2840 317 Figure 4 11 46 ACL Port Binding Settings screenshot ...
Page 431: ...User s Manual of IGSW 2840 431 tacacs 1 Console ...