+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
18
2.2.2 SSH
2.2.2.1 Introduction to SSH
SSH (Secure Shell) is a protocol which ensures a secure remote access connection to network
devices. It is based on the reliable TCP/IP protocol. By conducting the mechanism such as key
distribution, authentication and encryption between SSH server and SSH client, a secure
connection is established. The information transferred on this connection is protected from
being intercepted and decrypted. The switch meets the requirements of SSH2.0. It supports
SSH2.0 client software such as SSH Secure Client and putty. Users can run the above
software to manage the switch remotely.
The switch presently supports RSA authentication, 3DES cryptography protocol and SSH user
password authentication etc.
2.2.2.2 SSH Server Configuration Task List
Command
Explanation
Global Mode
ssh-server enable
no ssh-server enable
Enable SSH function on the switch; the no
command disables SSH function.
username
<username>
[privilege
<privilege>
] [password [0 | 7]
<password>
]
no username
<username>
Configure the username and password of SSH
client software for logging on the switch; the no
command deletes the username.
ssh-server timeout
<timeout>
no ssh-server timeout
Configure timeout value for SSH authentication;
the no command restores the default timeout value
for SSH authentication.
ssh-server authentication-retires
<authentication-retires>
no ssh-server authentication-retries
Configure the number of times for retrying SSH
authentication; the no command restores the
default number of times for retrying SSH
authentication.
ssh-server host-key create rsa
modulus
<moduls>
Generate the new RSA host key on the SSH
server.
Admin Mode
terminal monitor
terminal no monitor
Display SSH debug information on the SSH client
side; the no command stops displaying SSH debug
information on the SSH client side.
2.2.2.3 Example of SSH Server Configuration
Summary of Contents for QSW-2800 series
Page 189: ...7 495 797 3311 www qtech ru 18 1 175...